External Compliance
- Buy Link or Shortcode: {j2store}39|cart{/j2store}
- Parent Category Name: Security and Risk
- Parent Category Link: /security-and-risk
Your challenge:
Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and make ongoing adjustments based on an ability to monitor buyer, competitor, and product cost changes.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This Executive Brief will build your skills on how to price new products or adjust pricing for existing products.
This blueprint will build your skills on how to price new products or adjust pricing for existing products with documented key steps to complete the pricing project and use the Excel workbook and customer presentation.
These five organizational workbooks for product pricing priorities, interview tracking, sample questions, and critical competitive information will enable the price team to validate price change data through researching the three pricing schemes (competitor, customer, and cost-based).
This template includes the business case to justify product repricing, contract modifications, and packaging rebuild or removal for launch. This template calls for the critical summarized results from the Optimize Software Pricing in a Volatile Competitive Market blueprint and the Optimize Software Pricing in a Volatile Competitive Market Workbook to complete.
SoftwareReviews — A Division of INFO~TECH RESEARCH GROUP
Product managers without well-documented and repeatable pricing management processes often experience pressure from “Agile” management to make gut-feel pricing decisions, resulting in poor product revenue results. When combined with a lack of customer, competitor, and internal cost understanding, these process and timing limitations drive most product managers into suboptimal software pricing decisions. And, adding insult to injury, the poor financial results from bad pricing decisions aren’t fully measured for months, which further compounds the negative effects of poor decision making.
A successful product pricing strategy aligns finance, marketing, product management, and sales to optimize pricing using a solid understanding of the customer perception of price/value, competitive pricing, and software production costs.
Success for many SaaS product managers requires a reorganization and modernization of pricing tools, techniques, and data. Leaders will develop the science of tailored price changes versus across-the-board price actions and account for inflation exposure and the customers’ willingness to pay.
This blueprint will build your skills on how to price new products or adjust pricing for existing products. The discipline you build using our pricing strategy methodology will strengthen your team’s ability to develop repeatable pricing and will build credibility with senior management and colleagues in marketing and sales.
|
Joanne Morin Correia
|
Organizations struggle to build repeatable pricing processes:
|
Obstacles add friction to the pricing management process:
|
Use SoftwareReviews’ approach for more successful pricing:
|
Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and they will make ongoing adjustments based on an ability to monitor buyers, competitors, and product cost changes.
| “Customer discovery interviews help reduce the chance of failure by testing your hypotheses. Quality customer interviews go beyond answering product development and pricing questions.” (Pricing Strategies, Growth Ramp, March 2022)
Most product managers just research their direct competitors when launching a new SaaS product. While this is essential, competitive pricing intel is insufficient to create a long-term optimized pricing strategy. Leaders will also understand buyer TCO. Your customers are constantly comparing prices and weighing the total cost of ownership as they consider your competition. Why? Implementing a SaaS solution creates a significant time burden as buyers spend days learning new software, making sure tools communicate with each other, configuring settings, contacting support, etc. It is not just the cost of the product or service. |
Optimized Price Strategy Is…
|
Price Strategy Is Not…
|
An optimized pricing strategy establishes the “best” price for a product or service that maximizes profits and shareholder value while considering customer business value vs. the cost to purchase and implement – the total cost of ownership (TCO).
Product managers are currently experiencing the following:
|
Doing nothing is NOT an option!
|
| Among product managers, limited pricing skills are big obstacles that make pricing difficult and under-optimized.
|
The top three weakest product management skills have remained constant over the past five years:
|
Pricing teams can improve software product profitability by:
|
Software pricing leaders will regularly assess:
Has it been over a year since prices were updated? Have customers told you to raise your prices? Do you have the right mix of customers in each pricing plan? Do 40% of your customers say they would be very disappointed if your product disappeared? (Adapted from Growth Ramp, 2021) |
Case StudyMiddleware Vendor |
INDUSTRY
|
SOURCE
|
| A large middleware vendor, who is running on Microsoft Azure, known for quality development and website tools, needed to react strategically to the March 2022 Microsoft price increase.
Key Initiative: Optimize New Pricing Strategy The program’s core objective was to determine if the vendor should implement a price increase and how the product should be packaged within the new pricing model. For this initiative, the company interviewed buyers using three key questions: What are the core capabilities to focus on building/selling? What are the optimal features and capabilities valued by customers that should be sold together? And should they be charging more for their products?Results
|
The Optimize New Pricing Strategy included the following components:
|
| As a collaborative team across product management, marketing, and finance, we see leaders taking a simple yet well-researched approach when setting product pricing.
Iterating to a final price point is best done with research into how product pricing:
|
To arrive at our new product price, we suggest iterating among 3 different views:
New Target Price:
|
Who should care about optimized pricing?Product managers and marketers who:
Finance, sales, and marketing professionals who are pricing stakeholders in:
|
How will they benefit from this research?
|
Is Your Pricing Strategy Optimized?With the right pricing strategy, you can invest more money into your product, service, or growth. A 1% price increase will improv revenues by:
Price monetization will almost double the revenue increases over customer acquisition and retention. (Pricing Strategies, Growth Ramp, March 2022) |
DIAGNOSE PRICE CHALLENGESPrices of today's cloud-based services/products are often misaligned against competition and customers' perceived value, leaving more revenues on the table.
|
|||
OPTIMIZE THESE STEPS
|
||||
|
||||
Steps |
1.1 Establish the Team and Responsibilities
1.2 Educate/Align Team on Pricing Strategy 1.2 Document Portfolio & Target Product(s) for Pricing Updates 1.3 Clarify Product Target Margins 1.4 Establish Customer Price/Value 1.5 Identify Competitive Pricing 1.6 Establish New Price and Gain Buy-In |
Outcomes |
|
Ground pricing against financialsMeet and align with financial stakeholders.
|
Align on pricing strategyLead stakeholders in SaaS product pricing decisions to optimize pricing based on four drivers:
|
Decrease time for approvalDrive price decisions, with the support of the CFO, to the business value of the suggested change:
|
| Develop the skill of pricing products
Increase product revenues and margins by enhancing modern processes and data monetization. Shift from intuitive to information-based pricing decisions. |
Look at other options for revenue
Adjust product design, features, packaging, and contract terms while maintaining the functionality customers find valuable to their business. |
Key deliverable:
New Pricing Strategy Presentation TemplateCapture key findings for your price strategy with the Optimize Your Pricing in a Volatile Competitive Market Strategy Presentation Template
|
Optimize Software Pricing in a Volatile Competitive Market Executive BriefThis executive brief will build your knowledge on how to price new products or adjust pricing for existing products.
|
Optimize Software Pricing in a Volatile Competitive Market WorkbookThis workbook will help you prioritize which products require repricing, hold customer interviews, and capture competitive insights.
|
A Guided Implementation (GI) is a series of calls with a SoftwareReviews analyst to help implement our best practices in your organization.
A typical GI is 4 to 8 calls over the course of 2 to 4 months.
What does a typical GI on optimizing software pricing look like?
Alignment |
Research & Reprice |
Buy-in |
| Call #1: Share the pricing team vision and outline activities for the pricing strategy process. Plan next call – 1 week.
Call #2: Outline products that require a new pricing approach and steps with finance. Plan next call – 1 week. Call #3: Discuss the customer interview process. Plan next call – 1 week. Call #4 Outline competitive analysis. Plan next call – 1 week. |
Call #5: Review customer and competitive results for initial new pricing business case with finance for alignment. Plan next call – 3 weeks.
Call #6: Review the initial business case against financial plans across marketing, sales, and product development. Plan next call – 1 week. |
Call #7 Review the draft executive pricing presentation. Plan next call – 1 week.
Call #8: Discuss gaps in executive presentation. Plan next call – 3 days. |
| Included in Advisory Membership | Optional add-ons | ||
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Workshop overview |
Contact your account representative for more information.
|
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
Align Team, Identify Customers, and Document Current Knowledge |
Validate Initial Insights and Identify Competitors and Market View |
Schedule and Hold Buyer Interviews |
Summarize Findings and Provide Actionable Guidance to Stakeholders |
Present, Go Forward, and Measure Impact and Results |
|
| Activities |
1.1 Identify Team Members, roles, and responsibilities 1.2 Establish timelines and project workflow 1.3 Gather current product and future financial margin expectations 1.4 Review the Optimize Software Executive Brief and Workbook Templates 1.4 Build prioritized pricing candidates hypothesis |
2.1 Identify customer interviewee types by segment, region, etc. 2.2 Hear from industry analysts their perspectives on the competitors, buyer expectations, and price trends 2.3 Research competitors for pricing, contract type, and product attributes |
3.2 Review pricing and attributes survey and interview questionnaires 3.2 Hold interviews and use interview guides (over four weeks) A gap of up to 4 weeks for scheduling of interviews. 3.3 Hold review session after initial 3-4 interviews to make adjustments |
4.1 Review all draft price findings against the market view 4.2 Review Draft Executive Presentation |
5.1 Review finalized pricing strategy plan with analyst for market view 5.2 Review for comments on the final implementation plan |
| Deliverables |
|
|
|
|
|
Our processAlign team, perform research, and gain executive buy-in on updated price points
Optimize Software Pricing in a Volatile Competitive Market |
Our process will help you deliver the following outcomes:
This project involves the following participants:
|
Input: Steering committee roles and responsibilities, Steering committee interest and role
Output: List of new pricing strategy steering committee and workstream members, roles, and timelines, Updated Software Pricing Strategy presentation
Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Participants: CFO, sponsoring executive, Functional leads – development, product marketing, product management, marketing, sales, customer success/support
1-2 hoursDownload the Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Pricing steering committees are needed to steer overall product, pricing, and packaging decisions. Some companies include the CEO and CFO on this committee and designate it as a permanent body that meets monthly to give go/no-go decisions to “all things product and pricing related” across all products and business units.
Input: Typically, a joint recognition that pricing strategies need upgrading and have not been fully documented, Steering committee and working team members
Output: Communication of team members involved and the makeup of the steering committee and working team, Alignment of team members on a shared vision of “why a new price strategy is critical” and what key attributes define both the need and impact on business
Materials: Optimize Your Software Strategy Executive Brief PowerPoint presentation
Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales, SoftwareReviews marketing analyst (optional)
Download the Optimize Software Pricing in a Volatile Competitive Market Executive Brief
Input: List of entire product portfolio
Output: Prioritized list of product candidates that should be repriced
Materials: Optimize Software Pricing in a Volatile Competitive Market Executive Brief presentation, Optimize Software Pricing in a Volatile Competitive Market Workbook
Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales
Download the Optimize Software Pricing in a Volatile Competitive Market Workbook
2-3 sessions of 1 Hour each
Input: Finance partner/CFO knowledge of target product current and future margins, Finance partner/CFO who has information on underlying costs with details that illustrate supplier contributions
Output: Product finance markup target percentage margins and revenues
Materials: Finance data on the product family, Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Participants: Initiative manager, Finance partner/CFO
Download the Optimize Software Pricing in a Volatile Competitive Market Workbook
Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template
1-4 weeks
Input: Identify segments within which you require price-to-value information, Understand your persona insight gaps, Review Sample Interview Guide using the Optimize Software Pricing in a Volatile, Competitive Market Workbook, Tab 4. Interview Guide.
Output: List of interviewees, Updated Interview Guide
Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Participants: Initiative manager, Customer success to help identify interviewees, Customers, prospects
Download the Optimize Software Pricing in a Volatile Competitive Market Workbook
Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template
1-2 weeks
Input: Identify price candidate competitors, Your product pricing, contract type, and product attribute information to compare against, Knowledge of existing competitor information, websites, and technology research sites to guide questions
Output: Competitive product average pricing
Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Participants: Initiative manager, Customers, prospects
Download the Optimize Software Pricing in a Volatile Competitive Market Workbook
Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template
2-3 hours
Input: Findings from competitive, cost-plus, and customer price/value analysis
Output: Approvals for price change
Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Participants: Initiative manager, Steering committee, Working team – typically representatives in product marketing, product management, sales
Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template
Summary of AccomplishmentProblem SolvedWith the help of this blueprint, you have deepened your and your company’s understanding of how to look at new pricing opportunities and what the market and the buyer will pay for your product. You are among the minority of product and marketing leaders that have thoroughly documented their new pricing strategy and processes – congratulations!The benefits of having led your team through the process are significant and include the following:
|
If you would like additional support, contact us and we’ll make sure you get the professional expertise you need. Contact your account representative for more information. info@softwarereviews.com |
“Chapter 4 Reasons for Project Failure.” Kissflow's Guide to Project Management. Kissflow, n.d. Web.
Edie, Naomi. “Microsoft Is Raising SaaS Prices, and Other Vendors Will, Too.” CIO Dive, 8 December 2021. Web.
Gruman, Galen, Alan S. Morrison, and Terril A. Retter. “Software Pricing Trends.” PricewaterhouseCoopers, 2018. Web.
Hargrave, Marshall. “Example of Economic Exposure.” Investopedia, 12 April 2022. Web.
Heaslip, Emily. “7 Smart Pricing Strategies to Attract Customers.” CO—, 17 November 2021. Web.
Higgins, Sean. “How to Price a Product That Your Sales Team Can Sell.” HubSpot, 4 April 2022. Web.
“Pricing Strategies.” Growth Ramp, March 2022. Web.
“Product Management Skills Benchmark Report 2021.” 280 Group, 9 November 2021. Web.
Quey, Jason. “Price Increase: How to Do a SaaS Pricing Change in 8 Steps.” Growth Ramp, 22 March 2021. Web.
Steenburg, Thomas, and Jill Avery. “Marketing Analysis Toolkit: Pricing and Profitability Analysis.” Harvard Business School, 16 July 2010. Web.
“2021 State of Competitive Intelligence.” Crayon and SCIO, n.d. Web.
Valchev, Konstantin. “Cost of Goods Sold (COGS) for Software-as-a-Service (SaaS) Business.” OpenView Venture Partners, OV Blog, 20 April 2020. Web.
“What Is Price Elasticity?” Market Business News, n.d. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Engage stakeholders to develop a vision for the project and perform a comprehensive assessment of existing service desks.
Outline the target state of the consolidated service desk and assess logistics and cost of consolidation.
Build a project roadmap and communication plan.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify and engage key stakeholders.
Conduct an executive visioning session to define the scope and goals of the consolidation.
A list of key stakeholders and an engagement plan to identify needs and garner support for the change.
A common vision for the consolidation initiative with clearly defined goals and objectives.
1.1 Identify key stakeholders and develop an engagement plan.
1.2 Brainstorm desired service desk attributes.
1.3 Conduct an executive visioning session to craft a vision for the consolidated service desk.
1.4 Define project goals, principles, and KPIs.
Stakeholder Engagement Workbook
Executive Presentation
Assess the overall maturity, structure, organizational design, and performance of each service desk.
Assess current ITSM tools and how well they are meeting needs.
A robust current state assessment of each service desk.
An understanding of agent skills, satisfaction, roles, and responsibilities.
An evaluation of existing ITSM tools and technology.
2.1 Review the results of diagnostics programs.
2.2 Map organizational structure and roles for each service desk.
2.3 Assess overall maturity and environment of each service desk.
2.4 Assess current information system environment.
Consolidate Service Desk Assessment Tool
Define the target state for consolidated service desk.
Identify requirements for the service desk and a supporting solution.
Detailed requirements and vision for the consolidated service desk.
Gap analysis of current vs. target state.
Documented standardized processes and procedures.
3.1 Identify requirements for target consolidated service desk.
3.2 Build requirements document and shortlist for ITSM tool.
3.3 Use the scorecard comparison tool to assess the gap between existing service desks and target state.
3.4 Document standardized processes for new service desk.
Consolidate Service Desk Scorecard Tool
Consolidated Service Desk SOP
Break down the consolidation project into specific initiatives with a detailed timeline and assigned responsibilities.
Plan the logistics and cost of the consolidation for process, technology, and facilities.
Develop a communications plan.
Initial analysis of the logistics and cost considerations to achieve the target.
A detailed project roadmap to migrate to a consolidated service desk.
A communications plan with responses to anticipated questions and objections.
4.1 Plan the logistics of the transition.
4.2 Assess the cost and savings of consolidation to refine business case.
4.3 Identify initiatives and develop a project roadmap.
4.4 Plan communications for each stakeholder group.
Consolidation TCO Tool
Consolidation Roadmap
Executive Presentation
Communications Plan
News Bulletin & FAQ Template
Manage the dark side of growth.
"It’s tempting to focus strategic planning on the processes and technology that will underpin the consolidated service desk. Consistent processes and a reliable tool will cement the consolidation, but they are not what will hold you back.
The most common barrier to a successful consolidation is workforce resistance to change. Cultural difference, perceived risks, and organizational inertia can hinder data gathering, deter collaboration, and impede progress from the start.
Building a consolidated service desk is first and foremost an exercise in organizational change. Garner executive support for the project, enlist a team of volunteers to lead the change, and communicate with key stakeholders early and often. The key is to create a shared vision for the project and engage those who will be most affected."
Sandi Conrad
Senior Director, Infrastructure Practice
Info-Tech Research Group
Every organization must grow to survive. Good growth makes an organization more agile, responsive, and competitive, which leads to further growth.
The proliferation of service desks is a hallmark of good growth when it empowers the service of diverse end users, geographies, or technologies.
Growth has its dark side. Bad growth within a business can hinder agility, responsiveness, and competitiveness, leading to stagnation.
Supporting a large number of service desks can be costly and inefficient, and produce poor or inconsistent customer service, especially when each service desk uses different ITSM processes and technologies.
Manage the dark side of growth. Consolidating service desks can help standardize ITSM processes, improve customer service, improve service desk efficiency, and reduce total support costs. A consolidation is a highly visible and mission critical project, and one that will change the public face of IT. Organizations need to get it right.
Building a consolidated service desk is an exercise in organizational change. The success of the project will hinge on how well the organization engages those who will be most affected by the change. Build a guiding coalition for the project, create a shared vision, enlist a team of volunteers to lead the change, and communicate with key stakeholders early and often.
Use a structured approach to facilitate the development of a shared strategic vision, design a detailed consolidated architecture, and anticipate resistance to change to ensure the organization reaps project benefits.
Info-Tech Insight
End-user satisfaction is a more reliable measure of a successful consolidation.
The project will generate many cost savings, but they will take time to manifest, and are best seen as an indirect consequence of the pursuit of customer service.
Info-Tech Insight
Business units facing a service desk consolidation are often concerned that the project will lead to a loss of access to IT resources. Focus on building a customer-focused consolidated service desk to assuage those fears and earn their support.
2nd out of 45
On average, IT leaders and process owners rank the service desk 2nd in terms of importance out of 45 core IT processes. Source: Info-Tech Research Group, Management and Governance Diagnostic (2015, n = 486)
42.1%
On average, end users who were satisfied with service desk effectiveness rated all other IT services 42.1% higher than dissatisfied end users. Source: Info-Tech Research Group, End-User Satisfaction Survey 2015, n = 133)
38.0%
On average, end users who were satisfied with service desk timeliness rated all other IT services 38.0% higher than dissatisfied end users. Source: Info-Tech Research Group, End-User Satisfaction Survey (2015, n = 133)
In most organizations, the greatest hurdles that consolidation projects face are related to people rather than process or technology.
In a survey of 168 service delivery organizations without a consolidated service desk, the Service Desk Institute found that the largest internal barrier to putting in place a consolidated service desk was organizational resistance to change.
Specifically, more than 56% of respondents reported that the different cultures of each service unit would hinder the level of collaboration such an initiative would require.
Service Desk Institute (n = 168, 2007)
Info-Tech Insight
Use a phased approach to overcome resistance to change. Focus on quick-win implementations that bring two or three service desks together in a short time frame and add additional service desks over time.
Every organization must grow to survive, and relies heavily on its IT infrastructure to do that. Good growth makes an organization more agile, responsive, and competitive, and leads to further growth.
However, growth has its dark side. Bad growth hobbles agility, responsiveness, and competitiveness, and leads to stagnation.
As organizations grow organically and through mergers, their IT functions create multiple service desks across the enterprise to support:
A hallmark of bad growth is the proliferation of redundant and often incompatible ITSM services and processes.
Project triggers:
| Challenge | Impact |
|---|---|
| Incompatible Technologies |
|
| Inconsistent Processes |
|
| Lack of Data Integration |
|
| Low Customer Satisfaction |
|
A successful consolidation can significantly reduce cost per transaction, speed up service delivery, and improve the customer experience through:
| Project Outcome |
Expected Benefit |
|---|---|
| Integrated information | The capacity to produce quick, accurate, and segmented reports of service levels across the organization. |
| Integrated staffing | Flexible management of resources that better responds to organizational needs. |
| Integrated technology | Reduced tool procurement costs, improved data integration, and increased information security. |
| Standardized processes | Efficient and timely customer service and a more consistent customer experience. |
The foundation of a successful service desk consolidation initiative is a robust current state assessment. Given the project’s complexity, however, determining the right level of detail to include in the evaluation of existing service desks can be challenging.
The Info-Tech approach to service desk consolidation includes:
The project blueprint walks through a method that helps identify which processes and technologies from each service desk work best, and it draws on them to build a target state for the consolidated service desk.
Inspiring your target state from internal tools and best practices is much more efficient than developing new tools and processes from scratch.
Info-Tech Insight
The two key hurdles that a successful service desk consolidation must overcome are organizational complexity and resistance to change.
Effective planning during the current state assessment can overcome these challenges.
Identify existing best practices for migration to the consolidated service desk to foster agent engagement and get the consolidated service desk up quickly.
Phase 1: Develop a Shared Vision
Phase 2: Design the Consolidation
Phase 3: Plan the Transition
Whether or not your project requires multiple transition waves to complete the consolidation depends on the complexity of the environment.
For a more detailed breakdown of this project’s steps and deliverables, see the next section.
| Phases | Phase 1: Develop a Shared Vision | Phase 2: Design the Consolidated Service Desk | Phase 3: Plan the Transition |
|---|---|---|---|
| Steps | 1.1 - Identify and engage key stakeholders | 2.1 - Design target consolidated service desk | 3.1 - Build the project roadmap |
| 1.2 - Develop a vision to give the project direction | |||
| 1.3 - Conduct a full assessment of each service desk | 2.2 - Assess logistics and cost of consolidation | 3.2 - Communicate the change | |
| Tools & Templates | Executive Presentation | Consolidate Service Desk Scorecard Tool | Service Desk Consolidation Roadmap |
| Consolidate Service Desk Assessment Tool | Consolidated Service Desk SOP | Communications and Training Plan Template | |
| Service Desk Efficiency Calculator | News Bulletin & FAQ Template | ||
| Service Desk Consolidation TCO Comparison Tool |
Facilitate the extension of service management best practices to other business functions to improve productivity and position IT as a strategic partner.
Build essential incident, service request, and knowledge management processes to create a sustainable service desk that meets business needs.
Build a continual improvement plan for the service desk to review and evaluate key processes and services, and manage the progress of improvement initiatives.
Build essential incident, service request, and knowledge management processes to create a sustainable service desk that boosts business value.
Review mid-market and enterprise service desk tools, select an ITSM solution, and build an implementation plan to ensure your investment meets your needs.
Build a strategic roadmap to consolidate service desks to reduce end-user support costs and sustain end-user satisfaction.
Our Approach to the Service Desk
Service desk optimization goes beyond the blind adoption of best practices.
Info-Tech’s approach focuses on controlling support costs and making the most of IT’s service management expertise to improve productivity.
Complete the projects sequentially or in any order.
Industry: Higher Education
Source: Oxford University, IT Services
Background
Until 2011, three disparate information technology organizations offered IT services, while each college had local IT officers responsible for purchasing and IT management.
ITS Service Desk Consolidation Project
Oxford merged the administration of these three IT organizations into IT Services (ITS) in 2012, and began planning for the consolidation of five independent help desks into a single robust service desk.
Complication
The relative autonomy of the five service desks had led to the proliferation of different tools and processes, licensing headaches, and confusion from end users about where to acquire IT service.
Oxford University IT at a Glance
Help Desks:
"IT Services are aiming to provide a consolidated service which provides a unified and coherent experience for users. The aim is to deliver a ‘joined-up’ customer experience when users are asking for any form of help from IT Services. It will be easier for users to obtain support for their IT – whatever the need, service or system." – Oxford University, IT Services
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Diagnostics and consistent frameworks used throughout all four options
| 1. Develop shared vision | 2. Design consolidation | 3. Plan transition | |
|---|---|---|---|
| Best-Practice Toolkit |
1.1 Identify and engage key stakeholders 1.2 Develop a vision to give the project direction 1.3 Conduct a full assessment of each service desk |
2.1 Design target consolidated service desk 2.2 Assess logistics and cost of consolidation |
3.1 Build project roadmap 3.2 Communicate the change |
| Guided Implementations |
|
|
|
| Onsite Workshop |
Module 1: Engage stakeholders to develop a vision for the service desk Module 2: Conduct a full assessment of each service desk |
Module 3: Design target consolidated service desk | Module 4: Plan for the transition |
|
Phase 1 Outcomes:
|
Phase 2 Outcomes:
|
Phase 3 Outcomes:
|
| GI | Measured Value |
|---|---|
| Phase 1: |
|
| Phase 2: |
|
| Phase 3: |
|
| Total savings | $10,800 |
Contact your account representative or email Workshops@InfoTech.com for more information.
| Pre-Workshop | Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | |
|---|---|---|---|---|---|
| Activities |
Module 0: Gather relevant data 0.1 Conduct CIO Business Vision Survey 0.2 Conduct End-User Satisfaction Survey 0.3 Measure Agent Satisfaction |
Module 1: Engage stakeholders to develop a vision for the service desk 1.1 Identify key stakeholders and develop an engagement plan 1.2 Brainstorm desired service desk attributes 1.3 Conduct an executive visioning session to craft a vision for the consolidated service desk 1.4 Define project goals, principles, and KPIs |
Module 2: Conduct a full assessment of each service desk 2.1 Review the results of diagnostic programs 2.2 Map organizational structure and roles for each service desk 2.3 Assess overall maturity and environment of each service desk 2.4 Assess current information system environment |
Module 3: Design target consolidated service desk 3.1 Identify requirements for target consolidated service desk 3.2 Build requirements document and shortlist for ITSM tool 3.3 Use the scorecard comparison tool to assess the gap between existing service desks and target state 3.4 Document standardized processes for new service desk |
Module 4: Plan for the transition 4.1 Plan the logistics of the transition 4.2 Assess the cost and savings of consolidation to refine business case 4.3 Identify initiatives and develop a project roadmap 4.4 Plan communications for each stakeholder group |
| Deliverables |
|
|
|
|
|
Don’t get bogged down in the details. A detailed current state assessment is a necessary first step for a consolidation project, but determining the right level of detail to include in the evaluation can be challenging. Gather enough data to establish a baseline and make an informed decision about how to consolidate, but don’t waste time collecting and evaluating unnecessary information that will only distract and slow down the project, losing management interest and buy-in.
Leverage the Consolidate Service Desk Assessment Tool to gather the data you need to evaluate your existing service desks.
Select the target state that is right for your organization. Don’t feel pressured to move to a complete consolidation with a single point of contact if it wouldn’t be compatible with your organization’s needs and abilities, or if it wouldn’t be adopted by your end users. Design an appropriate level of standardization and centralization for the service desk and reinforce and improve processes moving forward.
Leverage the Consolidate Service Desk Scorecard Tool to analyze the gap between your existing processes and your target state.
Getting people on board is key to the success of the consolidation, and a communication plan is essential to do so. Develop targeted messaging for each stakeholder group, keeping in mind that your end users are just as critical to success as your staff. Know your audience, communicate to them often and openly, and ensure that every communication has a purpose.
Leverage the Communications Plan and Consolidation News Bulletin & FAQ Template to plan your communications.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 4-8
Discuss with an analyst:
Then complete these activities…
With these tools & templates:
Stakeholder Engagement Workbook
Discuss with an analyst:
Then complete these activities…
With these tools & templates:
Consolidate Service Desk Executive Presentation
Discuss with an analyst:
Then complete these activities…
With these tools & templates:
Consolidate Service Desk Assessment Tool
IT Skills Inventory and Gap Assessment Tool
Develop a shared vision
1.1 Identify and engage key stakeholders
1.2 Develop a vision to give the project direction
1.3 Conduct a full assessment of each service desk
Industry: Higher Education
Source: Oxford University, IT Services
The merging of Oxford’s disparate IT organizations was motivated primarily to improve end-user service and efficiency.
Similarly, ITS positioned the SDCP as an “operational change,” not to save costs, but to provide better service to their customers.
"The University is quite unique in the current climate in that reduction in costs was not one of the key drivers behind the project. The goal was to deliver improved efficiencies and offer a single point of contact for their user base." – Peter Hubbard, ITSM Consultant Pink Elephant
Oxford recognized early that they needed an open and collaborative environment to succeed.
Key IT and business personnel participated in a “vision workshop” to determine long- and short-term objectives, and to decide priorities for the consolidated service desk.
"Without key support at this stage many projects fail to deliver the expected outcomes. The workshop involved the key stakeholders of the project and was deemed a successful and positive exercise, delivering value to this stage of the project by clarifying the future desired state of the Service Desk." – John Ireland, Director of Customer Service & Project Sponsor
IT Services introduced a Service Desk Consolidation Project Blog very early into the project, to keep everyone up-to-date and maintain key stakeholder buy-in.
Constant consultation with people at all levels led to continuous improvement and new insights.
"We also became aware that staff are facing different changes depending on the nature of their work and which toolset they use (i.e. RT, Altiris, ITSM). Everyone will have to change the way they do things at least a little – but the changes depend on where you are starting from!" – Jonathan Marks, Project Manager
Service desk consolidation means combining multiple service desks into one centralized, single point of contact.
Consolidation must include people, process, and technology:
Consolidation can take the form of:
Service Desk 1 - Service Desk 2 - Service Desk 3
↓
Consolidated Service Desk
Info-Tech Insight
Consolidation isn’t for everyone.
Before you embark on the project, think about unique requirements for your organization that may necessitate more than one service desk, such as location-specific language. Ask yourself if consolidation makes sense for your organization and would achieve a benefit for the organization, before proceeding.
Use a RACI table (e.g. in the following section) to clarify who is to be accountable, responsible, consulted, and informed.
Info-Tech Insight
The more transformational the change, the more it will affect the organizational chart – not just after the implementation but through the transition.
Take time early in the project to define the reporting structure for the project/transition team, as well as any teams and roles supporting the transition.
RACI = Responsible, Accountable, Consulted, Informed
The RACI chart will provide clarity for overarching roles and responsibilities during the consolidation.
| Task | Project Sponsor | Project Manager | Sr. Executives | SMEs | Business Lead | Service Desk Managers | HR | Trainers | Communications |
|---|---|---|---|---|---|---|---|---|---|
| Meeting project objectives | A | R | A | R | R | ||||
| Identifying risks and opportunities | R | A | A | C | C | C | C | I | I |
| Assessing current state | I | A | I | R | C | R | |||
| Defining target state | I | A | I | C | C | R | |||
| Planning logistics | I | A | I | R | R | C | R | ||
| Building the action plan | I | A | C | R | R | R | R | R | R |
| Planning and delivering communications | I | A | C | C | C | C | R | R | A |
| Planning and delivering training | I | A | C | C | C | C | R | R | C |
| Gathering and analyzing feedback and KPIs | I | A | C | C | C | C | C | R | R |
Why is a stakeholder analysis essential?
Info-Tech Insight
Be diverse and aware. When identifying key stakeholders for the project, make sure to include a rich diversity of stakeholder expertise, geography, and tactics. Also, step back and add silent members to your list. The loudest voices and heaviest campaigners are not necessarily your key stakeholders.
Goal: Create a prioritized list of people who are affected or can affect your project so you can plan stakeholder engagement and communication.
Outcome: A list of key stakeholders to include on your steering committee and your project team, and to communicate with throughout the project.
According to the Project Management Institute, only 25% of individuals fully commit to change. The remaining 75% either resist or simply accept the change. Gathering stakeholder concerns is a powerful way to gain buy-in.
Solicit direct feedback from the organization to gain critical insights into their perceptions of IT.
We recommend completing at least the End-User Satisfaction survey as part of your service desk consolidation assessment and planning. An analyst will help you set up the diagnostic and walk through the report with you.
To book a diagnostic, or get a copy of our questions to inform your own survey, visit Info-Tech’s Benchmarking Tools, contact your account manager, or call toll-free 1-888-670-8889 (US) or 1-844-618-3192 (CAN).
Data-Driven Diagnostics:
End-User Satisfaction Survey
CIO Business Vision
Review the results of your diagnostics in step 1.3
Use Info-Tech’s Stakeholder Engagement Workbook to formalize an engagement strategy
The engagement plan is a structured and documented approach for gathering requirements by eliciting input and validating plans for change and cultivating sponsorship and support from key stakeholders early in the project lifecycle.
The Stakeholder Engagement Workbook situates stakeholders on a grid that identifies which ones have the most interest in and influence on your project, to assist you in developing a tailored engagement strategy.
You can also use this analysis to help develop a communications plan for each type of stakeholder in step 3.2.
| Method | Description | Assessment and Best Practices | Stakeholder Effort | Business Analyst Effort |
|---|---|---|---|---|
| Structured One-on-One Interview | In a structured one-on-one interview, the business analyst has a fixed list of questions to ask the stakeholder and follows up where necessary. | Structured interviews provide the opportunity to quickly hone in on areas of concern that were identified during process mapping or group elicitation techniques. They should be employed with purpose – to receive specific stakeholder feedback on proposed requirements or help identify systemic constraints. Generally speaking, they should be 30 minutes or less. | Low |
Medium |
| Unstructured One-on-One Interview | In an unstructured one-on-one interview, the business analyst allows the conversation to flow freely. The BA may have broad themes to touch on, but does not run down a specific question list. | Unstructured interviews are most useful for initial elicitation, when brainstorming a draft list of potential requirements is paramount. Unstructured interviews work best with senior stakeholders (sponsors or power users), since they can be time consuming if they’re applied to a large sample size. It’s important for BAs not to stifle open dialog and allow the participants to speak openly. They should be 60 minutes or less. | Medium | Low |
Develop a shared vision
1.1 Get buy-in from key stakeholders
1.2 Develop a vision to give the project direction
1.3 Conduct a full assessment of each service desk
A shared vision for the consolidated service desk that:
An executive visioning session can take up to two days of focused effort and activities with the purpose of defining the short and long-term view, objectives, and priorities for the new consolidated service desk.
The session should include the following participants:
The session should include the following tasks:
The activities throughout this step are designed to be included as part of the visioning session
A consolidated service desk should include the following aspects:
Consolidated Service Desk
Document in the Consolidate Service Desk Executive Presentation, slide 6.
| Consolidated Service Desk Model | Level of Consolidation | ||
|---|---|---|---|
| Partial | Complete | ||
| Type of Consolidation | Virtual | ||
| Physical | |||
| Hybrid | ✓ | ||
3. As a group, brainstorm and document a list of attributes that the consolidated service desk should have.
Examples:
Document in the Consolidate Service Desk Executive Presentation, slide 7.
Build desire for change.
In addition to standard high-level scope elements, consolidation projects that require organizational change also need a compelling story or vision to influence groups of stakeholders.
Use the vision table below to begin developing a compelling vision and story of change.
| Why is there a need to consolidate service desks? | |
| How will consolidation benefit the organization? The stakeholders? | |
| How did we determine this is the right change? | |
| What would happen if we didn’t consolidate? | |
| How will we measure success? |
A service desk consolidation project requires a compelling vision to energize staff and stakeholders toward a unified goal over a sustained period of time.
Great visions:
Info-Tech Insight
Tell a story. Stories pack a lot of information into few words. They are easy to write, remember, and most importantly – share. It’s worth spending a little extra time to get the details right.
Stories serve to give the consolidation real-world context by describing what the future state will mean for both staff and users of the service desk. The story should sum up the core of the experience of using the consolidated service desk and reflect how the service desk will fit into the life of the user.
Stories should include:
Imagine if…
… users could access one single online service that allows them to submit a ticket through a self-service portal and service catalog, view the status of their ticket, and receive updates about organization-wide outages and announcements. They never have to guess who to contact for help with a particular type of issue or how to contact them as there is only one point of contact for all types of incidents and service requests.
… all users receive consistent service delivery regardless of their location, and never try to circumvent the help desk or go straight to a particular technician for help as there is only one way to get help by submitting a ticket through a single service desk.
… tickets from any location could be easily tracked, prioritized, and escalated using standardized definitions and workflows to ensure consistent service delivery and allow for one set of SLAs to be defined and met across the organization.
Service Desk Institute (n = 20, 2007)
A survey of 233 service desks considering consolidation found that of the 20 organizations that were in the planning stages of consolidation, the biggest driver was to improve service delivery and/or increase productivity.
This is in line with the recommendation that improved service quality should be the main consolidation driver over reducing costs.
Service Desk Institute (n = 43, 2007)
The drivers were similar among the 43 organizations that had already implemented a consolidated service desk, with improved service delivery and increased productivity again the primary driver.
Aligning with best practice was the second most cited driver.
Use the results of your stakeholder analysis and interviews to facilitate a discussion among recommended participants and document the purpose of the consolidation project, the goals the project aims to achieve, and the guiding principles that must be followed.
Use the following example to guide your discussion:
| Purpose | The purpose of consolidating service desks is to improve service delivery to end users and free up more time and resources to achieve the organization’s core mission. |
|---|---|
| Goals |
|
| Guiding Principles |
The consolidated service desk must:
|
The primary driver for consolidation of service desks is improved service delivery and increased productivity. This should relate to the primary benefits delivered by the consolidation, most importantly, improved end-user satisfaction.
A survey of 43 organizations that have implemented a consolidated service desk identified the key benefits delivered by the consolidation (see chart at right).
Source: Service Desk Institute (n = 43, 2007)
Info-Tech Insight
Cost reduction may be an important benefit delivered by the consolidation effort, but it should not be the most valuable benefit delivered. Focus communications on anticipated benefits for improved service delivery and end-user satisfaction to gain buy-in for the project.
Document in the Executive Presentation, slide 10
| Stop | Start | Continue |
|---|---|---|
|
|
|
| Strengths (Internal) | Weaknesses (Internal) |
|
|
| Opportunities (External) | Threats (External) |
|
|
…to help you conduct your SWOT analysis on the service desk.
| Strengths (Internal) | Weaknesses (Internal) |
|
|
| Opportunities (External) | Threats (External) |
|
|
| Helpful to achieving the objective | Harmful to achieving the objective | |
|---|---|---|
| Internal origin attributes of the organization | Strengths | Weaknesses |
|
External Origin attributes of the environment |
Opportunities | Threats |
Frame the project in terms of the change and impact it will have on:
Service desk consolidation will likely have a significant impact in all three categories by standardizing processes, implementing a single service management tool, and reallocating resources. Framing the project in this way will ensure that no aspect goes forgotten.
For each of the three categories, you will identify:
People
Process
Technology
Complete an executive presentation using the decisions made throughout this step
Develop a shared vision
1.1 Get buy-in from key stakeholders
1.2 Develop a vision to give the project direction
1.3 Conduct a full assessment of each service desk
Industry: Higher Education
Source: Oxford University, IT Services
Oxford ITS instigated the service desk consolidation project in the fall of 2012.
A new ITSM solution was formally acquired in the spring 2014, and amalgamated workflows designed.
Throughout this period, at least 3 detailed process analyses occurred in close consultation with the affected IT units.
Responsibility for understanding each existing process (incident, services, change management, etc.) were assigned to members of the project team.
They determined which of the existing processes were most effective, and these served as the baseline – saving time and effort in the long run by sticking with tested processes that work.
Almost from day one, the Oxford consolidation team made sure to consult closely with each relevant ITS team about their processes and the tools they used to manage their workflows.
This was done both in structured interviews during the visioning stage and informally at periodic points throughout the project.
The result was the discovery of many underlying similarities. This information was then instrumental to determining a realistic baseline from which to design the new consolidated service desk.
"We may give our activities different names or use different tools to manage our work but in all cases common sense has prevailed and it’s perhaps not so surprising that we have common challenges that we choose to tackle in similar ways." – Andrew Goff, Change Management at Oxford ITS
Before you begin planning for the consolidation, make sure you have a clear picture of the magnitude of what you plan on consolidating.
Evaluate the current state of each help desk being considered for consolidation. This should include an inventory of:
Info-Tech Insight
A detailed current state assessment is a necessary first step for a consolidation project, but determining the right level of detail to include in the evaluation can be challenging. Gather enough data to establish a baseline and make an informed decision about how to consolidate, but don’t waste time collecting unnecessary information that will only distract and slow down the project.
| Poor Processes | vs. | Optimized Processes |
|---|---|---|
|
Inconsistent or poor processes affect the business through:
|
Standardized service desk processes increase user and technician satisfaction and lower costs to support through:
|
1. Facilitate a discussion among recommended participants to discuss the structure of each service desk. Decide which model best describes each service desk:
2. Use a flip chart or whiteboard to draw the architecture of each service desk, using the example on the right as a guide.
The Consolidate Service Desk Assessment Tool will provide insight into the overall health of each existing service desk along two vectors:
Together these answers offer a snapshot of the health, efficiency, performance, and perceived value of each service desk under evaluation.
This tool will assist you through the current state assessment process, which should follow these steps:
These activities will be described in more detail throughout this step of the project.
Send a copy of the Consolidate Service Desk Assessment Tool to the Service Desk Manager (or other designated party) of each service desk that will be considered as part of the consolidation.
Instruct them to complete tab 2 of the tool, the Environment Survey:
This assessment will provide an overview of key metrics to assess the performance of each service desk, including:
Use the IT Skills Inventory and Gap Assessment Tool to assess agent skills and identify gaps or overlaps.
Agent Satisfaction
Measure employee satisfaction and engagement to identify strong teams.
Roles and Responsibilities
Gather a clear picture of each service desk’s organizational hierarchy, roles, and responsibilities.
Agent Utilization
Obtain a snapshot of service desk productivity by calculating the average amount of time an agent is handling calls, divided by the average amount of time an agent is at work.
Send the Skills Coverage Tool tab to each Service Desk Manager, who will either send it to the individuals who make up their service desk with instructions to rate themselves, or complete the assessment together with individuals as part of one-on-one meetings for discussing development plans.
IT Skills Inventory and Gap Assessment Tool will enable you to:
| Tier 1 Help Desk Lead | Tier 2 Help Desk Lead | Tier 2 Apps Support Lead | Tier 3 Specialist Support Lead |
| Tier 1 Specialist | Name Title | Name Title | Name Title |
| Tier 1 Specialist | Name Title | Name Title | Name Title |
| Name Title | Name Title | Name Title | |
| Name Title | Name Title | ||
Agent satisfaction forms a key metric within the Consolidate Service Desk Assessment Tool, and it can be evaluated in a variety of ways. Choose the approach that best suits your organization and time restraints for the project.
Determine agent satisfaction on the basis of a robust (and anonymous) survey of service desk agents. Like the end-user satisfaction score, this measure is ideally computed as a percentage.
There are several ways to measure agent satisfaction:
Ideally, your service desks are already on the same ITSM platform, but if not, a comprehensive assessment of current tools is the first step toward a single, consolidated solution.
Include the following in your tools assessment:
Info-Tech Insight
Document not only the service management tools that are used but also any of their unique and necessary functions and configurations that users may have come to rely upon, such as remote support, self-serve, or chat support, in order to inform requirements in the next phase.
Inventory your IT environment, including:
User Devices
Servers
Data centers
In addition to identifying the range of devices you currently support, assess:
Info-Tech Insight
The capabilities and configuration of your existing infrastructure and applications could limit your consolidation plans. A comprehensive technology assessment of not only the service desk tools but also the range of devices and applications your service desks supports will help you to prepare for any potential limitations or obstacles a consolidated service desk may present.
Document information on number of devices supported and number of desktop images associated with each service desk in the section on “Technology Data” of the Consolidate Service Desk Assessment Tool.
Use a RACI chart to assign overarching responsibilities for the consolidation project.
Map out the organizational structure and flow of each service desk and discuss the model that best describes each.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 2-4
Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
Consolidate Service Desk Scorecard Tool
Review findings with analyst:
Then complete these activities…
With these tools & templates:
Service Desk Efficiency Calculator
Service Desk Consolidation TCO Comparison Tool
Phase 2 Results:
Design consolidation
2.1 Design target consolidated service desk
2.2 Assess logistics and cost of consolidation
Industry: Higher Education
Source: Oxford University, IT Services
"Since our last update, a review and re-planning exercise has reassessed the project approach, milestones, and time scales. This has highlighted some significant hurdles to transition which needed to be addressed, resulting primarily from the size of the project and the importance to the department of a smooth and well-planned transition to the new processes and toolset." – John Ireland, Director of Customer Service & Project Sponsor
Despite careful planning and its ultimate success, Oxford’s consolidation effort still encountered some significant hurdles along the way – deadlines were sometimes missed and important processes overlooked.
These bumps can be mitigated by building flexibility into your plan:
Info-Tech Insight
Ensure that the project lead is someone conversant in ITSM, so that they are equipped to understand and react to the unique challenges and expectations of a consolidation and can easily communicate with process owners.
With approval for the project established and a clear idea of the current state of each service desk, narrow down the vision for the consolidated service desk into a specific picture of the target state.
The target state should provide answers to the following types of questions:
Process:
People:
Technology:
Info-Tech Insight
Select the target state that is right for your organization. Don’t feel pressured to select the highest target state or a complete consolidation. Instead select the target state that is most compatible with your organization’s current needs and capabilities.
Identify three primary categories where the consolidation project is expected to yield benefits to the business. Use the example on the right to guide your discussion.
Efficiency and effectiveness are standard benefits for this project, but the third category may depend on your organization.
Identify 1-3 key performance indicators (KPIs) associated with each benefit category, which will be used to measure the success of the consolidation project. Ensure that each has a baseline measure that can be reassessed after the consolidation.
Efficiency
Streamlined processes to reduce duplication of efforts
Resourcing
Improved allocation of human and financial resources
Effectiveness
Service delivery will be more accessible and standardized
| Efficiency | ||||
|---|---|---|---|---|
| Business Value | KPI | Current Metric | Short-Term (6 month) Target | Long-Term (1 year) Target |
| Streamlined processes to reduce duplication of efforts | Improved response time | 2 hours | 1 hour | 30 minutes |
| Effectiveness | ||||
|---|---|---|---|---|
| Business Value | KPI | Current Metric | Short-Term (6 month) Target | Long-Term (1 year) Target |
| Service delivery will be more accessible and standardized | Improved first call resolution (% resolved at Tier 1) | 50% | 60% | 70% |
Service Requests:
Incident Management:
Knowledgebase:
Reporting:
Evaluate how your processes compare with the best practices defined here. If you need further guidance on how to standardize these processes after planning the consolidation, follow Info-Tech’s blueprint, Standardize the Service Desk.
Consider the following unique process considerations for consolidation:
Info-Tech Insight
Don’t do it all at once. Consolidation will lead to some level of standardization. It will be reinforced and improved later through ongoing reengineering and process improvement efforts (continual improvement management).
Example:
Whiteboard:
Consider the following people-related elements when designing your target state:
Consider the following unique people considerations for consolidation:
Info-Tech Insight
Identify SMEs and individuals who are knowledgeable about a particular location, end-user base, technology, or service offering. They may be able to take on a different, greater role due to the reorganization that would make better use of their skills and capabilities and improve morale.
Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.
Example:
Whiteboard:
Info-Tech Insight
Talk to staff at each service desk to ask about their tool needs and requirements to support their work. Invite them to demonstrate how they use their tools to learn about customization, configuration, and functionality in place and to help inform requirements. Engaging staff in the process will ensure that the new consolidated tool will be supported and adopted by staff.
Document internally, or leave on a whiteboard for workshop participants to return to when documenting tasks in the roadmap tool.
Example:
Whiteboard:
| Features | Description |
|---|---|
| Modules |
|
|
Self-Serve |
|
| Enterprise Service Management Needs |
|
| Workflow Automation |
|
| License Maintenance Costs |
|
| Configuration Costs |
|
| Speed / Performance |
|
| Vendor Support |
|
Create a requirements list for the service desk tool.
Create a demo script:
Using information from the requirements list, determine which features will be important for the team to see during a demo. Focus on areas where usability is a concern, for example:
Evaluate current tool:
Consider alternatives:
Info-Tech regularly evaluates ITSM solution providers and ranks each in terms of functionality and affordability. The results are published in the Enterprise and Mid-Market Service Desk Software Vendor Landscapes.
After selecting a solution, follow the Build an ITSM Tool Implementation Plan project to develop an implementation plan to ensure the tool is appropriately designed, installed, and tested and that technicians are sufficiently trained to ensure successful deployment and adoption of the tool.
The purpose of this tool is to organize the data from up to six service desks that are part of a service desk consolidation initiative. Displaying this data in an organized fashion, while offering a robust comparative analysis, should facilitate the process of establishing a new baseline for the consolidated service desk.
Use the results on tab 4 of the Consolidate Service Desk Assessment Tool. Enter the data from each service desk into tab “2. InfoCards” of the Consolidate Service Desk Scorecard Tool.
Data from up to six service desks (up to six copies of the assessment tool) can be entered into this tool for comparison.
The values entered on this tab will be used in calculating the overall metric score for each service desk, allowing you to compare the performance of existing service desks against each other and against your target state.
Develop one set of standard operating procedures to ensure consistent service delivery across locations.
One set of standard operating procedures for the new service desk is essential for a successful consolidation.
Info-Tech’s Consolidated Service Desk SOP Template provides a detailed example of documenting procedures for service delivery, roles and responsibilities, escalation and prioritization rules, workflows for incidents and service requests, and resolution targets to help ensure consistent service expectations across locations.
Use this template as a guide to develop or refine your SOP and define the processes for the consolidated service desk.
Design consolidation
2.1 Design target consolidated state
2.2 Assess logistics and cost
Industry: US Coast Guard
Source: CIO Rear Adm. Robert E. Day, Jr. (retired)
The US Coast Guard was providing internal IT support for 42,000 members on active duty from 11 distinct regional IT service centers around the US.
Pain Points
Admiral Day was the CIO from 2009 to 2014. In 2011, he lead an initiative to consolidate USCG service desks.
Relocating to a new location involved potentially higher implementation costs, which was a significant disadvantage.
Ultimately, the relocation reinforced the national mandate of the consolidated service desk. The new organization would act as a single point of contact for the support of all 42,000 members of the US Coast Guard.
"Before our regional desks tended to take on different flavors and processes. Today, users get the same experience whether they’re in Alaska or Maryland by calling one number: (855) CG-FIX IT." – Rear Adm. Robert E. Day, Jr. (retired)
A detailed project roadmap will help break down the project into manageable tasks to reach the target state, but there is no value to this if the target state is not achievable or realistic.
Don’t forget to assess the logistics of the consolidation that can be overlooked during the planning phase:
Info-Tech Insight
Language barriers can form significant hurdles or even roadblocks for the consolidation project. Don’t overlook the importance of unique language requirements and ensure the consolidated service desk will be able to support end-user needs.
Identify tasks that should form part of the roadmap and document in the roadmap tool.
Identify costs that should be included in the TCO assessment and document in the TCO tool.
Discuss and identify any logistic and cost considerations that will need to form part of the consolidation plan and roadmap. Examples are highlighted below.
Keep in mind that if your target state involves reorganization of resources and the creation of resources, there will be additional staffing tasks that should form part of the consolidation plan. These include:
If new positions will be created, follow these steps to mitigate risks:
For more guidance on hiring help desk staff, see Info-Tech’s blueprint, Manage Help Desk Staffing.
Be sensitive to employee concerns.
Develop guiding principles for the consolidation to ensure that employee satisfaction remains a priority throughout the consolidation.
Examples include:
Info-Tech Insight
The most talented employees can be lost in the migration to a consolidated service desk, resulting in organizational loss of core knowledge. Mitigate this risk using measurement strategies, competency modeling, and knowledge sharing to reduce ambiguity and discomfort of affected employees.
Identify tasks that should form part of the roadmap and document in the roadmap tool.
Identify costs that should be included in the TCO assessment and document in the TCO tool.
Discuss and identify any logistic and cost considerations surrounding resources and staffing that will need to form part of the consolidation plan and roadmap. Examples are highlighted below.
How do organizations calculate the staffing implications of a service desk consolidation?
The Service Desk Efficiency Calculator uses the ITIL Gross Staffing Model to think through the impact of consolidating service desk processes.
To estimate the impact of the consolidation on staffing levels, estimate what will happen to three variables:
All things being equal, a reduction in ticket volume (through outsourcing or the implementation of self-serve options, for example), will reduce your staffing requirements (all things being equal). The same goes for a reduction in the average call resolution rate.
Constraints:
Spare capacity: Many organizations are motivated to consolidate service desks by potential reductions in staffing costs. However, this is only true if your service desk agents have spare capacity to take on the consolidated ticket volume. If they don’t, you will still need the same number of agents to do the work at the consolidated service desk.
Agent capabilities: If your agents have specialised skills that you need to maintain the same level of service, you won’t be able to reduce staffing until agents are cross-trained.
The third tab of the Service Desk Efficiency Calculator will quantify:
Facilitate a discussion around the results.
Evaluate where you are now and where you hope to be. Focus on the efficiency gains expected from the outsourcing project. Review the expected gains in average resolution time, the expected impact on service desk ticket volume, and the associated productivity gains.
Use this information to refine the business case and project plan for the consolidation, if needed.
Typical cost savings for a service desk consolidation are highlighted below:
People 10-20% savings (through resource pooling and reallocation)
Process 5-10% savings (through process simplification and efficiencies gained)
Technology 10-15% savings (through improved call routing and ITSM tool consolidation)
Facilities 5-10% savings (through site selection and redesign)
Cost savings should be balanced against the costs of the consolidation itself (including hiring for consolidation project managers or consultants, moving expenses, legal fees, etc.)
Evaluate consolidation costs using the TCO Comparison Tool described in the next section.
Since completing the executive visioning session in step 1.2, you should have completed the following activities:
The next step will be to develop a project roadmap to achieve the consolidation vision.
Before doing this, check back in with the project sponsor and business executives to refine the business case, obtain necessary approvals, and secure buy-in.
If necessary, add to the executive presentation you completed in step 1.2, copying results of the deliverables you have completed since:
Identify process requirements and desired characteristics for the target consolidated service desk.
Review the results of the Consolidate Service Desk Scorecard Tool to identify top performing service desks and glean best practices.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 2-4
Discuss with an analyst:
Then complete these activities…
With these tools & templates:
Service Desk Consolidation Roadmap
Discuss with an analyst:
Then complete these activities…
With these tools & templates:
Service Desk Consolidation Communications and Training Plan Template
Service Desk Consolidation News Bulletin & FAQ Template
Plan the consolidation
3.1 Build the project roadmap
3.2 Communicate the change
A detailed roadmap to migrate to a single, consolidated service desk, including:
Industry: Healthcare
Source: Organizational insider
A large US healthcare facilities organization implemented a service desk consolidation initiative in early 2013. Only 18 months later, they reluctantly decided to return to their previous service desk model.
Two disparate service desks:
One virtually-consolidated service desk servicing many facilities spread geographically over two distinct locations.
The main feature of the new virtual service desk was a single, pooled ticket queue drawn from all the end users and facilities in the new geographic regions.
Document the list of initiatives in the Service Desk Consolidation Roadmap.
In order to translate your newly made decisions regarding the target state and logistical considerations into a successful consolidation strategy, create an exhaustive list of all the steps and sub-steps that will lead you from your current state to your target state.
Use the next few steps to finish brainstorming the initiative list, identify risks and dependencies, and construct a detailed timeline populated with specific project steps.
Start with the list you have been curating throughout the current and future state assessments. If you are completing this project as a workshop, add to the initiative list you have been developing on the whiteboard.
Try to organize your initiatives into groups of related tasks. Begin arranging your initiatives into people, process, technology, or other categories.
| Whiteboard | People | Process | Technology | Other |
|---|---|---|---|---|
| Risk - degree of impact if activities do not go as planned | High |
A – High Risk, Low Frequency Tasks that are rarely done and are high risk. Focus attention here with careful planning (e.g. consolidation) |
B – High Risk, High Frequency Tasks that are performed regularly and must be watched closely each time (e.g. security authorizations) |
| ↕ |
C – Low Risk, Low Frequency Tasks that are performed regularly with limited impact or risk (e.g. server upgrades) |
D – Low Risk, High Frequency Tasks that are done all the time and are not risky (e.g. password resets) |
|
| Low | ↔ | High | |
| Frequency - how often the activity has been performed | |||
Service desk consolidations fit in category A
The project manager, service desk managers, and subject matter experts (SMEs) of different areas, departments, or locations should identify risks for each of the processes, tools, resource groups (people), and any data exchanges and moves that will be part of the project or impacted by the project.
Process - For each process, validate that workflows can remain intact throughout the consolidation project. If any gaps may occur in the process flows, develop a plan to be implemented in parallel with the consolidation to ensure service isn’t interrupted.
Technology - For a tool consolidation, upgrade, or replacement, verify that there is a plan in place to ensure continuation of service delivery processes throughout the change.
Make a plan for if and how data from the old tool(s) will be migrated to the new tool, and how the new tool will be installed and configured.
People - For movement of staff, particularly with termination, identify any risks that may occur and involve your HR and legal departments to ensure all movement is compliant with larger processes within the organization.
Info-Tech Insight
Don’t overlook the little things. Sometimes the most minor-seeming components of the consolidation can cause the greatest difficulty. For example, don’t assume that the service desk phone number can simply roll over to a new location and support the call load of a combined service desk. Verify it.
Use the outcome of this activity to complete your consolidation roadmap.
Document your initiatives on tab 2 of the Service Desk Consolidation Roadmap or map it out on a whiteboard.
Adjust initiatives in the consolidation roadmap if necessary.
The transition date will be used in communications in the next step.
Info-Tech Insight
Consolidating service desks doesn’t have to be done in one shot, replacing all your help desks, tools, and moving staff all at the same time. You can take a phased approach to consolidating, moving one location, department, or tool at a time to ease the transition.
Design consolidation
3.1 Build the project roadmap
3.2 Communicate the change
Industry: Higher Education
Source: Oxford University, IT Services
ITS ran a one-day ITSM “business simulation” for the CIO and direct reports, increasing executive buy-in.
“ The business simulation was incredibly effective as a way of getting management buy-in – it really showed what we are driving at. It’s a way of making it real, bringing people on board. ” – John Ireland, Director of Customer Service
Detailed use cases were envisioned referencing particular ITIL processes as the backbone of the process framework.
“ The use cases were very helpful, they were used […] in getting a broad engagement from teams across our department and getting buy-in from the distributed IT staff who we work with across the wider University. ” – John Ireland, Director of Customer Service
“ We in the project team would love to hear your view on this project and service management in general, so please feel free to comment on this blog post, contact us using the project email address […] or, for further information visit the project SharePoint site […] ” – Oxford ITS SDCP blog post
A communications plan should address three elements:
Goals of communication:
Email and Newsletters
Email and newsletters are convenient and can be transmitted to large audiences easily, but most users are inundated with email already and may not notice or read the message.
Face-to-Face Communication
Face-to-face communication helps to ensure that users are receiving and understanding a clear message, and allows them to voice their concerns and clarify any confusion or questions.
Internal Website/Drive
Internal sites help sustain change by making knowledge available after the consolidation, but won’t be retained beforehand.
Business units:
Be attentive to the concerns of business unit management about loss of power. Appease worries about the potential risk of reduced service quality and support responsiveness that may have been experienced in prior corporate consolidation efforts.
Make the value of the consolidation clear, and involve business unit management in the organizational change process.
Focus on producing a customer-focused consolidated service desk. It will assuage fears over the loss of control and influence. Business units may be relinquishing control of their service desk, but they should retain the same level of influence.
Employees:
Employees are often fearful of the impact of a consolidation on their jobs. These fears should be addressed and alleviated as soon as possible.
Design a communication plan outlining the changes and the reasons motivating it.
Put support programs in place for displaced and surviving employees.
Motivate employees during the transition and increase employee involvement in the change.
Educate and train employees who make the transition to the new structure and new job demands.
Info-Tech Insight
Know your audience. Be wary of using technical jargon or acronyms that may seem like common knowledge within your department but would not be part of the vocabulary of non-technical audiences. Ensure your communications are suitable for the audience. If you need to use jargon or acronyms, explain what you mean.
Document your decisions in the communications plan template
Section 4 of the communications plan on objections and question handling will be completed in activity 3.2.2.
Optional Activity
If you completed the Stakeholder Engagement Workbook in step 1.1, you may also complete the Communications tab in that workbook to further develop your plan to engage stakeholders.
Communicate and track changes: Identify and communicate changes to all stakeholders affected by the change to ensure they are aware of any downtime and can plan their own activities accordingly.
Isolate testing: Test changes within a safe non-production environment to eliminate the risk of system outages that result from defects discovered during testing.
Document back-out plans: Documented back-out/backup plans enable quick recovery in the event that the change fails.
Organizations that have more mature and defined change management processes experience less unplanned downtime when implementing change across the organization.
| What? |
1. Adapt people to the change
|
2. Adapt processes to the change
|
3. Adapt technologies to the change
|
|---|---|---|---|
| How? | Work with HR on any changes involving job design, personnel changes, or compensation. | Work with enterprise architects or business analysts to manage significant changes to processes that may impact the business and service levels. |
See Info-Tech’s Optimize the Change Management Processblueprint to use a disciplined change control process for technology changes. |
Info-Tech Insight
Organizational change management (OCM) is widely recognized as a key component of project success, yet many organizations struggle to get adoption for new tools, policies, and procedures. Use Info-Tech’s blueprint on driving organizational change to develop a strategy and toolkit to achieve project success.
Leverage the Stakeholder Engagement Workbook from step 1.1 as well as Info-Tech’s blueprint on driving organizational change for more tactics on change management, particularly managing and engaging various personas.
Business
Employees
End Users
Document your questions and responses in section 4 of the communications plan template. This should be continually updated.
| Group | Objection/Question | Response |
|---|---|---|
| Service desk staff | I’m comfortable with the service desk tool we’ve been using here and won’t know how to use the new one. | We carefully evaluated the new solution against our requirements and selected it as the one that will provide the best service to our users and be user friendly. We tested the solution through user-acceptance testing to ensure staff will be comfortable using it, and we will provide comprehensive training to all users of the tool before launching it. |
| End user | I’m used to going to my favorite technician for help. How will I get service now? | We are initiating a single point of contact so that you will know exactly where to go to get help quickly and easily, so that we can more quickly escalate your issue to the appropriate technician, and so that we can resolve it and notify you as soon as possible. This will make our service more effective and efficient than you having to find one individual who may be tied up with other work or unavailable. |
Keep the following in mind when formulating your responses:
The Service Desk Consolidation News Bulletin & FAQ Template is intended to be an example that you can follow or modify for your own organization. It provides a summary of how the consolidation project will change how end users interact with the service desk.
The bulletin is targeted for mass distribution to end users. A similar letter may be developed for service desk staff, though face-to-face communication is recommended.
Instructions:
Industry: Higher Education
Source: Oxford University, IT Services
Oxford’s new consolidated service desk went live April 20, 2015.
They moved from 3 distinct tools and 5 disparate help desks to a single service desk with one robust ITSM solution, all grounded by a unified set of processes and an integrated workflow.
The success of this project hinged upon:
"We have had a few teething issues to deal with, but overall this has been a very smooth transition given the scale of it." – ICTF Trinity Term 2015 IT Services Report
Create a list of specific tasks that will form the consolidation project on sticky notes and organize into people, process, technology, and other categories to inform the roadmap.
Brainstorm anticipated questions and objections that will arise from various stakeholder groups and prepare consistent responses to each.
Standardize the Service Desk - Provide timely and effective responses to user requests and resolutions of all incidents.
Extend the Service Desk to the Enterprise - Position IT as an innovator.
Build a Continual Improvement Plan for the Service Desk - Teach your old service desk new tricks.
Adopt Lean IT to Streamline the Service Desk - Turn your service desk into a Lean, keen, value-creating machine.
Vendor Landscape: Enterprise Service Desk Software - Move past tickets to proactive, integrated service.
Vendor Landscape: Mid-Market Service Desk Software - Ensure the productivity of the help desk with the right platform.
Build an ITSM Tool Implementation Plan - Nail your ITSM tool implementation from the outset.
Drive Organizational Change from the PMO - Don’t let bad change happen to good projects.
Stacey Keener - IT Manager for the Human Health and Performance Directorate, Johnson Space Center, NASA
Umar Reed - Director of IT Support Services US Denton US LLP
Maurice Pryce - IT Manager City of Roswell, Georgia
Ian Goodhart - Senior Business Analyst Allegis Group
Gerry Veugelaers - Service Delivery Manager New Zealand Defence Force
Alisa Salley Rogers - Senior Service Desk Analyst HCA IT&S Central/West Texas Division
Eddie Vidal - IS Service Desk Managers University of Miami
John Conklin - Chief Information Officer Helen of Troy LP
Russ Coles - Senior Manager, Computer Applications York Region District Schoolboard
John Seddon - Principal Vanguard Consulting
Ryan van Biljon - Director, Technical Services Samanage
Rear Admiral Robert E. Day Jr. (ret.) - Chief Information Officer United States Coast Guard
George Bartha - Manager of Information Technology Unifrax
Peter Hubbard - IT Service Management Consultant Pink Elephant
Andre Gaudreau - Manager of School Technology Operations York Region District School Board
Craig Nekola - Manager, Information Technology Anoka County
Hoen, Jim. “The Single Point of Contact: Driving Support Process Improvements with a Consolidated IT Help-Desk Approach.” TechTeam Global Inc. September 2005.
Hubbard, Peter. “Leading University embarks on IT transformation programme to deliver improved levels of service excellence.” Pink Elephant. http://pinkelephant.co.uk/about/case-studies/service-management-case-study/
IBM Global Services. “Service Desk: Consolidation, Relocation, Status Quo.” IBM. June 2005.
Keener, Stacey. “Help Desks: a Problem of Astronomical Proportions.” Government CIO Magazine. 1 February 2015.
McKaughan, Jeff. “Efficiency Driver.” U.S. Coast Guard Forum Jul. 2013. Web. http://www.intergraphgovsolutions.com/documents/CoastGuardForumJuly2013.pdf
Numara Footprints. “The Top 10 Reasons for Implementing a Consolidated Service Desk.” Numara Software.
Roy, Gerry, and Frederieke Winkler Prins. “How to Improve Service Quality through Service Desk Consolidation.” BMC Software.
Smith, Andrew. “The Consolidated Service Desk – An Achievable Goal?” The Service Desk Institute.
Wolfe, Brandon. “Is it Time for IT Service Desk Consolidation?” Samanage. 4 August 2015.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Determine the current security landscape of mobile application development.
Incorporate the various secure development techniques into current development practices.
Create a roadmap for mobile optimization initiatives.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identification of the triggers of your secure mobile development initiatives.
Assessment of the security vulnerabilities in your mobile applications from an end-user perspective.
Identification of the execution of your mobile environment.
Assessment of the mobile threats and vulnerabilities to your systems architecture.
Prioritization of your mobile threats.
Creation of your risk register.
Key opportunity areas where a secure development optimization initiative can provide tangible benefits.
Identification of security requirements.
Prioritized list of security threats.
Initial mobile security risk register created.
1.1 Establish the triggers of your secure mobile development initiatives.
1.2 Assess the security vulnerabilities in your mobile applications from an end-user perspective.
1.3 Understand the execution of your mobile environment with a systems architecture.
1.4 Assess the mobile threats and vulnerabilities to your systems architecture.
1.5 Prioritize your mobile threats.
1.6 Begin building your risk register.
Mobile Application High-Level Design Requirements Document
Systems Architecture Diagram
Discovery of secure development techniques to apply to current development practices.
Discovery of new user stories from applying secure development techniques.
Discovery of new test cases from applying secure development techniques.
Areas within your code that can be optimized for improving mobile application security.
New user stories created in relation to mitigation steps.
New test cases created in relation to mitigation steps.
2.1 Gauge the state of your secure mobile development practices.
2.2 Identify the appropriate techniques to fill gaps.
2.3 Develop user stories from security development gaps identified.
2.4 Develop test cases from user story gaps identified.
Mobile Application High-Level Design Requirements Document
Identification of key metrics used to measure mobile application security issues.
Identification of secure mobile application and development process optimization initiatives.
Identification of enablers and blockers of your mobile security optimization.
Metrics for measuring application security.
Modified triaging process for addressing security issues.
Initiatives for development optimization.
Enablers and blockers identified for mobile security optimization initiatives.
Process for developing your mobile optimization roadmap.
3.1 List the metrics that would be gathered to assess the success of your mobile security optimization.
3.2 Adjust and modify your triaging process to enhance handling of security issues.
3.3 Brainstorm secure mobile application and development process optimization initiatives.
3.4 Identify the enablers and blockers of your mobile security optimization.
3.5 Define your mobile security optimization roadmap.
Mobile Optimization Roadmap
The process of navigating from waterfall to Agile can be incredibly challenging. Even more problematic; how do you operate your requirements management practices once there? There traditionally isn’t a role for a business analyst, the traditional keeper of requirements. It isn’t like switching on a light.
You likely find yourself struggling to deliver high quality solutions and requirements in Agile. This is a challenge for many organizations, regardless of how long they’ve leveraged Agile.
But you aren’t here for assurances. You’re here for answers and help.
Agile and requirements management are complementary, not competitors.
Info-Tech’s advice? Why choose? Why have to pick between traditional waterfall and Agile delivery? If Agile without analysis is a recipe for disaster, Agile with analysis is the solution. How can you leverage the Info-Tech approach to align your Agile and requirements management efforts into a powerful combination?
Manage Requirements in an Agile Environment is your guide.
Use the contents and exercises of this blueprint to gain a shared understanding of the two disciplines, to find your balance in your approach, to define your thresholds, and ultimately, to prepare for new ways of working.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Provides support and guidance for organizations struggling with their requirements management practices in Agile environments.
The Agile Requirements Playbook becomes THE artifact for your Agile requirements practices. Great for onboarding, reviewing progress, and ensuring a shared understanding of your ways of working.
The Documentation Calculator can inform your documentation decison making, ensuring you're investing just the right amount of time, money, and effort.
This workbook is designed to capture the results of your exercises in the Manage Requirements in an Agile Environment Storyboard. Each worksheet corresponds to an exercise in the storyboard. This is a tool for you, so customize the content and layout to best suit your product. The workbook is also a living artifact that should be updated periodically as the needs of your team and organization change.
The Agile Requirements Assessment is a great tool for determining your current capabilities and maturity in Agile and Business Analysis. You can also articulate your target state, which enables the identification of capability gaps, the creation of improvement goals, and a roadmap for maturing your Agile Requirements practice.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Sets the context for the organization, to ensure a shared understanding of the benefits of both Agile and business analysis/requirements management.
Have a shared definition of Agile and business analysis / requirements.
Understand the current state of Agile and business analysis in your organization.
1.1 Define what Agile and business analysis mean in your organization.
1.2 Agile requirements assessment.
Alignment on Agile and business analysis / requirements in your organization.
A current and target state assessment of Agile and business analysis in your organization.
Confirm you’re going the right way for effective solution delivery.
Confirm the appropriate delivery methodology.
2.1 Confirm your selected methodology.
Confidence in your selected project delivery methodology.
Provides the guardrails for your Agile requirements practice, to define a high-level process, roles and responsibilities, governance and decision-making, and how to deal with change.
Clearly defined interactions between the BA and their partners
Define a plan for management and governance at the project team level
3.1 Define your agile requirements process.
3.2 Define your agile requirements RACI.
3.3 Define your governance.
3.4 Define your change and backlog refinement plan.
Agile requirements process.
Agile requirements RACI.
A governance and documentation plan.
A change and backlog refinement approach.
Provides the action plan to achieve your target state maturity
Recognize and prepare for the new ways of working for communication, stakeholder engagement, within the team, and across the organization.
Establish a roadmap for next steps to mature your Agile requirements practice.
4.1 Define your stakeholder communication plan.
4.2 Identify your capability gaps.
4.3 Plan your agile requirements roadmap.
A stakeholder communication plan.
A list of capability gaps to achieve your desired target state.
A prioritized roadmap to achieve the target state.
To provide practical guidance on technique usage, which can enable an improved experience with technical elements of the blueprint.
An opportunity to learn new tools to support your Agile requirements practice.
5.1 Managing requirements' traceability.
5.2 Creating and managing user stories.
5.3 Managing your requirements backlog.
5.4 Maintaining a requirements library.
Support and advice for leveraging a given tool or technique.
Support and advice for leveraging a given tool or technique.
Support and advice for leveraging a given tool or technique.
Support and advice for leveraging a given tool or technique.
Agile and requirements management are complementary, not competitors
The temptation when moving to Agile is to deemphasize good requirements practices in favor of perceived speed. If you're not delivering on the needs of the business then you have failed, regardless of how fast you've gone.
Delivery in Agile doesn't mean you stop needing solid business analysis. In fact, it's even more critical, to ensure your products and projects are adding value. With the rise of Agile, the role of the business analyst has been misunderstood.
As a result, we often throw out the analysis with the bathwater, thinking we'll be just fine without analysis, documentation, and deliberate action, as the speed and dexterity of Agile is enough.
Consequently, what we get is wasted time, money, and effort, with solutions that fail to deliver value, or need to be re-worked to get it right.
The best organizations find balance between these two forces, to align, and gain the benefits of both Agile and business analysis, working in tandem to manage requirements that bring solutions that are "just right".

Vincent Mirabelli
Principal Research Director, Applications Delivery and Management
Info-Tech Research Group
The process of navigating from waterfall to Agile can be incredibly challenging. And even more problematic; how do you operate your requirements management practices once there? Since there traditionally isn't a role for a business analyst; the traditional keeper of requirements. it isn't like switching on a light.
You likely find yourself struggling to deliver high quality solutions and requirements in Agile. This is a challenge for many organizations, regardless of how long they've leveraged Agile.
But you aren't here for assurances. You're here for answers and help.
many organizations and teams face is that there are so busy doing Agile that they fail to be Agile.
Agile was supposed to be the saving grace of project delivery but is misguided in taking the short-term view of "going quickly" at the expense of important elements, such as team formation and interaction, stakeholder engagement and communication, the timing and sequencing of analysis work, decision-making, documentation, and dealing with change.
The idea that good requirements just happen because you have user stories is wrong. So, requirements remain superficial, as you "can iterate later"…but sometimes later never comes, or doesn't come fast enough.
Organizations need to be very deliberate when aligning their Agile and requirements management practices. The work is the same. How the work is done is what changes.
Infotech's advice? Why choose? Why have to pick between traditional waterfall and Agile delivery? If Agile without analysis is a recipe for disaster, Agile with analysis is the solution. And how can you leverage the Info-Tech approach to align your Agile and requirements management efforts into a powerful combination?
Manage Requirements in an Agile Environment is your guide.
Use the contents and exercises of this blueprint to gain a shared understanding of the two disciplines, to find your balance in your approach, to define your thresholds, and ultimately, to prepare for new ways of working.
Agile and requirements management are complementary, not competitors.
The temptation when moving to Agile is to deemphasize good requirements practices in favor of perceived speed. If you're not delivering on the needs of the business, then you have failed, regardless of how fast you've gone.
Agile and requirements management are complementary, not competitors.
The temptation when moving to Agile is to deemphasize good requirements practices in favor of perceived speed. If you're not delivering on the needs of the business, then you have failed, regardless of how fast you've gone
48%
Had project deadlines more than double
85%
Exceeded their original budget by at least 20%
25%
At least doubled their original budget

Source: PPM Express.
The wait for solutions was too long for our business partners. The idea of investing significant time, money, and resources upfront, building an exhaustive and complete vision of the desired state, and then waiting months or even years to get that solution, became unpalatable for them. And rightfully so. Once we cast a light on the pains, it became difficult to stay with the status quo. Given that organizations evolve at a rapid pace, what was a pain at the beginning of an initiative may not be so even 6 months later.
Agile became the answer.
Since its' first appearance nearly 20 years ago, Agile has become the methodology of choice for a many of organizations. According to the 15th Annual State of Agile report, Agile adoption within software development teams increased from 37% in 2020 to 86% in 2021.
Requirements analysis, design maturity, and management are critical for a successful Agile transformation.
"One of the largest sources of failure we have seen on large projects is an immature Agile implementation in the context of poorly defined requirements."
– "Large Scale IT Projects – From Nightmare to Value Creation"
"Requirements maturity is more important to project outcomes than methodology."
– "Business Analysis Benchmark: Full Report"
"Mature Agile practices spend 28% of their time on analysis and design."
– "Quantitative Analysis of Agile Methods Study (2017): Twelve Major Findings"
"There exists a Requirements Premium… organizations using poor practices spent 62% more on similarly sized projects than organizations using the best requirements practices."
– "The Business Case for Agile Business Analysis" - Requirements Engineering Magazine

N= 324 small organizations from Info-Tech Research Group's CIO Business Vision diagnostic.
Note: High satisfaction was classified as organizations with a score greater or equal to eight and low satisfaction was every organization that scored below eight on the same questions.

Many subject matter experts are necessary to create accurate requirements, but their time is limited too.
Stakeholders should be kept informed throughout the requirements gathering process, but you need to get the right information to the right people.
Recording, organizing, and presenting requirements are essential, but excessive documentation will slow time to delivery.
Establishing control points in your requirements gathering process can help confirm, verify, and approve requirements accurately, but stage gates limit delivery.
In Agile, the what of business analysis does not change.
What does change is the how and when that work happens.
Team formation is key, as Agile is a team sport
A business analyst in an Agile team typically interacts with several different roles, including:

Tracking metrics and measuring your progress
As you implement the actions from this Blueprint, you should see measurable improvements in;
Without sacrificing time to delivery
| Metric | Description and motivation |
|---|---|
| Team satisfaction (%) | Expect team satisfaction to increase as a result of clearer role delineation and value contribution. |
| Stakeholder satisfaction (%) | Expect Stakeholder satisfaction to similarly increase, as requirements quality increases, bringing increased value |
| Requirements rework | Measures the quality of requirements from your Agile Projects. Expect that the Requirements Rework will decrease, in terms of volume/frequency. |
| Cost of documentation | Quantifies the cost of documentation, including Elicitation, Analysis, Validation, Presentation, and Management |
| Time to delivery | Balancing Metric. We don't want improvements in other at the expense of time to delivery |
1. Framing Agile and Business Analysis |
2. Tailoring Your Approach |
3. Defining Your Requirements Thresholds |
4. Planning Your Next Steps |
|
|---|---|---|---|---|
Phase Activities |
1.1 Understand the benefits and limitations of Agile and business analysis 1.2 Align Agile and business analysis within your organization |
2.1 Decide the best-fit approach for delivery 2.2 Manage your requirements backlog |
3.1 Define project roles and responsibilities 3.2 Define your level of acceptable documentation 3.3 Manage requirements as an asset 3.4 Define your requirements change management plan |
4.1 Preparing new ways of working 4.2 Develop a roadmap for next steps |
Phase Outcomes |
Recognize the benefits and detriments of both Agile and BA. Understand the current state of Agile and business analysis in your organization. |
Confirm the appropriate delivery methodology. Manage your requirements backlog. Connect the business need to user story. |
Clearly defined interactions between the BA and their partners. Define a plan for management and governance at the project team level. Documentation and tactics that are right-sized for the need. |
Recognize and prepare for the new ways of working for communication, stakeholder engagement, within the team, and across the organization. Establish a roadmap for next steps to mature your Agile requirements practice. |

A practical playbook for aligning your teams and articulating the guidelines for managing your requirements in Agile

A tool to help you answer the question: What is the right level of Agile requirements documentation for my organization?

Establishes your current maturity level, defines your target state, and supports planning to get there.

Supporting tools and templates in advancing your Agile requirements practice, to be used with the Agile Requirements Blueprint and Playbook.
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
| 1. Framing Agile and Business Analysis / 2. Tailoring Your Approach | 3. Defining Your Requirements Thresholds |
3. Defining Your Requirements Thresholds / 4. Planning Your Next Steps | (OPTIONAL) Agile Requirements Techniques (a la carte) | Next Steps and Wrap-Up (Offsite) | |
Activities |
What does Agile mean in your organization? What do requirements mean in your organization? Agile Requirements Assessment Confirm your selected methodology |
Define your Agile requirements process Define your Agile requirements RACI (Optional) Define your Agile requirements governance |
Defining your change management plan Define your communication plan Capability gap list Planning your Agile requirements roadmap |
Managing requirements traceability Creating and managing user stories Managing your requirements backlog Maintaining a requirements library |
Develop Agile Requirements Playbook Complete in-progress deliverables from previous four days. Set up review time for workshop deliverables and next steps |
Outcomes |
Shared definition of Agile and business analysis / requirements Understand the current state of Agile and business analysis in your organization |
Agile requirements process
Agile requirements RACI (Optional) Defined Agile requirements governance and documentation plan |
Change and backlog refinement plan Stakeholder communication plan Action plan and roadmap for maturing your Agile requirements practice |
Practical knowledge and practice about various tactics and techniques in support of your Agile requirements efforts | Completed Agile Requirements Playbook |
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
Call #1: Scope objectives, and your specific challenges. |
Call #4: Define your approach to project delivery. |
Call #6: Define your Agile requirements process. |
Call #9: Identify gaps from current to target state maturity. |
Call #2: Assess current maturity. |
Call #5: Managing your requirements backlog. |
Call #7: Define roles and responsibilities. |
Call #10: Pprioritize next steps to mature your Agile requirements practice. |
Call #3: Identify target-state capabilities. |
Call #8: Define your change and backlog refinement approach. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 10 calls over the course of 4 to 6 months.
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Understand the benefits and limitations of Agile and business analysis 1.2 Align Agile and business analysis within your organization | 2.1 Confirm the best-fit approach for delivery 2.2 manage your requirements backlog | 3.1 Define project roles and responsibilities 3.2 define your level of acceptable documentation 3.3 Manage requirements as an asset 3.4 Define your requirements change management plan | 4.1 Preparing new ways of working 4.2 Develop a roadmap for next steps |
This phase will walk you through the following activities:
This phase involves the following participants:
Understand the benefits and limitations of Agile and business analysis
1.1.1 Define what Agile and business analysis mean in your organization
This step involves the following participants:
Outcomes of this step
48%
Had project deadlines more than double
85%
Exceeded their original budget by at least 20%
25%
At least doubled their original budget

Source: PPM Express.
Business analysts had historically been aligned to specific lines of business, in support of their partners in their respective domains. Somewhere along the way, the function was moved to IT. Conceptually this made sense, in that it allowed BAs to provide technical solutions to complex business problems. This had the unintended result of lost domain knowledge, and connection to the business.
It all starts with the business. IT enables business goals. The closer you can get to the business, the better.
Business analysts were the main drivers of helping to define the business requirements, or needs, and then decompose those into solution requirements, to develop the best option to solve those problems, or address those needs. And the case for good analysis was clear. The later a poor requirement was caught, the more expensive it was to fix. And if requirements were poor, there was no way to know until much later in the project lifecycle, when the cost to correct them was exponentially higher, to the tune of 10-100x the initial cost.

Adapted from PPM Express. "Why Projects Fail: Business Analysis is the Key".
The wait for solutions was too long for our business partners. The idea of investing significant time, money, and resources upfront, building an exhaustive and complete vision of the desired state, and then waiting months or even years to get that solution became unpalatable for them. And rightfully so. Once we cast a light on the pains, it became difficult to stand pat in the current state. And besides, organizations evolve at a rapid pace. What was a pain at the beginning of an initiative may not be so even six months later.
Agile became the answer.
Since its first appearance nearly 20 years ago, Agile has become the methodology of choice for a huge swathe of organizations. According to the 15th Annual State of Agile report, Agile adoption within software development teams increased from 37% in 2020 to 86% in 2021.
To say that's significant is an understatement.
According to the Agile manifesto, "We value. . ."

"…while there is value in the items on the right, we value the items on the left more."
Source: Agilemanifesto, 2001
94% of respondents report using Agile practices in their organization
according to Digital.AI's "The 15th State of Agile Report"
That same report notes a steady expansion of Agile outside of IT, as other areas of the organization seek to benefit from increased agility and responsiveness, including Human Resources, Finance and Marketing.

"Agile projects are 37% faster to market than [the] industry average"
(Requirements Engineering Magazine, 2017)

"One of the largest sources of failure we have seen on large projects is an immature Agile implementation in the context of poorly defined requirements."
– BCG, 2015
"Requirements maturity is more important to project outcomes than methodology."
– IAG Consulting, 2009.
"Mature Agile practices spend 28% of their time on analysis and design."
– InfoQ, 2017."
"There exists a Requirements Premium… organizations using poor practices spent 62% more on similarly sized projects than organizations using the best requirements practices."
– Requirements Engineering Magazine, 2017

N= 324 small organizations from Info-Tech Research Group's CIO Business Vision diagnostic.
Note: High satisfaction was classified as organizations with a score greater or equal to eight and low satisfaction was every organization that scored below eight on the same questions.
Agile is a highly effective tool.
This isn't about discarding Agile. It is being used for things completely outside of what was originally intended. When developing products or code, it is in its element. However, outside of that realm, its being used to bypass business analysis activities, which help define the true customer and business need.
Business analysts were forced to adapt and shift focus. Overnight they morphed into product owners, or no longer had a place on the team. Requirements and analysis took a backseat.
The result?
Increased rework, decreased stakeholder satisfaction, and a lot of wasted money and effort.
"Too often, the process of two-week sprints becomes the thing, and the team never gets the time and space to step back and obsess over what is truly needed to delight customers."
Harvard Business Review, 9 April 2021.
Requirements in Agile are the same, but the purpose of requirements changes.
The stated principles of waterfall say nothing of how work is to be linear.


Source: Royce, Dr. Winston W., 1970.
For more on Agile methodology, check out Info-Tech's Agile Research Centre
Organizations went from engaging business stakeholders up front, and then not until solution delivery, to forcing those partners to give up their resources to the project. From taking years to deliver a massive solution (which may or may not even still fit the need) to delivering in rapid cycles called sprints.
This tug-of-war is costing organizations significant time, money, and effort.
Your approach to requirements management needs to be centered. We can start to make that shift by better aligning our Agile and business analysis practices. Outside of the product space, Agile needs to be combined with other disciplines (Harvard Business Review, 2021) to be effective.
Agility is important. Though it is not a replacement for approach or strategy (RCG Global Services, 2022). In Agile, team constraints are leveraged because of time. There is a failure to develop new capabilities to address the business needs Harvard Business Review, 2021).
Agility needs analysis.
Many subject matter experts are necessary to create accurate requirements, but their time is limited too.
Stakeholders should be kept informed throughout the requirements gathering process, but you need to get the right information to the right people.
Recording, organizing, and presenting requirements are essential, but excessive documentation will slow time to delivery.
Establishing control points in your requirements gathering process can help confirm, verify, and approve requirements accurately, but stage gates limit delivery.
We do this because there isn't even agreement by the experts on what the terms "Agile" and "business analysis" mean, so let's establish a definition within the context of your organization.

Your Agile Requirements Playbook will include
1.2.1 Assess your Agile requirements maturity
This step involves the following participants:
Outcomes of this step
What is the driving force behind that decision?
There are many reasons to leverage the power of Agile within your organization, and specifically as part of your requirements management efforts. And it shouldn't just be to improve productivity. That's only one aspect.
Begin by asking, "Why Agile?" Are you looking to improve:
Or a combination of the above?
Project delivery methodologies aren't either/or. You don't have to be 100% waterfall or 100% Agile. Select the right approach for your project, product, or service.
In the end, your business partners don't want projects delivered faster, they want value faster!
For more on understanding Agile, check out the Implement Agile Practices That Work Blueprint
Responses to a 2019 KPMG survey:
13% said that their top management fully supports Agile transformation.
76% of organizations did not agree that their organization supports Agile culture.
62% of top management believe Agile has no implications for them.
Business analysts need to focus on six key elements when managing requirements in Agile.
In Agile, the what of business analysis does not change.
What does change is the how and when that work happens.

| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Understand the benefits and limitations of Agile and business analysis 1.2 Align Agile and business analysis within your organization | 2.1 Confirm the best-fit approach for delivery 2.2 manage your requirements backlog | 3.1 Define project roles and responsibilities 3.2 define your level of acceptable documentation 3.3 Manage requirements as an asset 3.4 Define your requirements change management plan | 4.1 Preparing new ways of working 4.2 Develop a roadmap for next steps |
This phase will walk you through the following activities:
This phase involves the following participants:
Managing Requirements in an Agile Environment
2.1.1 Confirm your methodology
This step involves the following participants:
Outcomes of this step
Selecting the right approach (or confirming you're on the right track) is easier when you assess two key inputs to your project; your level of certainty about the solution, and the level of complexity among the different variables and inputs to your project, such as team experience and training, the number of impacted stakeholders or context. lines of business, and the organizational
Solution certainty refers to the level of understanding of the problem and the solution at the start of the project. In projects with high solution certainty, the requirements and solutions are well defined, and the project scope is clear. In contrast, projects with low solution certainty have vague or changing requirements, and the solutions are not well understood.
Project complexity refers to the level of complexity of the project, including the number of stakeholders, the number of deliverables, and the level of technical complexity. In projects with high complexity, there are many stakeholders with different priorities, many deliverables, and high technical complexity. In contrast, projects with low complexity have fewer stakeholders, fewer deliverables, and lower technical complexity.
"Agile is a fantastic approach when you have no clue how you're going to solve a problem"
Waterfall methodology is best suited for projects with high solution certainty and high complexity. This is because the waterfall model follows a linear and sequential approach, where each phase of the project is completed before moving on to the next. This makes it ideal for projects where the requirements and solutions are well-defined, and the project scope is clear.
On the other hand, Agile methodology is best suited for projects with low solution certainty. Agile follows an iterative and incremental approach, where the requirements and solutions are detailed and refined throughout the project. This makes it ideal for projects where the requirements and solutions are vague or changing.
Note that there are other models that exist for determining which path to take, should this approach not fit within your organization.
Use info-tech's-methodology-selection-matrix

Adapted from The Chaos Report, 2015 (The Standish Group)
Download the Agile Requirements Workbook
1 = Strongly disagree
2 = Disagree
3 = Neutral
4 = Agree
5 = Strongly agree.
Manage Your Requirements Backlog
2.2.1 Create your user stories
This step involves the following participants:
Outcomes of this step
Tailoring Your Approach
![]() |
|
Defines |
|---|---|---|
Intended benefits and outcomes |
||
|
Why it is needed, and by who |
|
|
What is needed, and how its going to be achieved |
Business requirements describe what a company needs in order to achieve its goals and objectives. Solution requirements describe how those needs will be met. User stories are a way to express the functionality that a solution will provide from the perspective of an end user.
A traceability matrix helps clearly connect and maintain your requirements.
To connect business requirements to solution requirements, you can start by identifying the specific needs that the business has and then determining how those needs can be met through technology or other solutions; or what the solution needs to do to meet the business need. So, if the business requirement is to increase online sales, a solution requirement might include implementing a shopping cart feature on your company website.
Once you have identified the solution requirements, you can then use those to create user stories. A user story describes a specific piece of functionality that the solution will provide from the perspective of a user.
For example, "As a customer, I want to be able to add items to my shopping cart so that I can purchase them." This user story is directly tied to the solution requirement of implementing a shopping cart feature.
Tracing from User Story back up to Business Requirement is essential in ensuring your solutions support your organization's strategic vison and objectives.

Download the Info-Tech Requirements Traceability Matrix
There are several attributes to look for in requirements: |
|||||||
|---|---|---|---|---|---|---|---|
Verifiable |
Unambiguous |
Complete |
Consistent |
Achievable |
Traceable |
Unitary |
Agnostic |
Stated in a way that can be easily tested |
Free of subjective terms and can only be interpreted in one way |
Contains all relevant information |
Does not conflict with other requirements |
Possible to accomplish with budgetary and technological constraints |
Trackable from inception through to testing |
Addresses only one thing and cannot be decomposed into multiple requirements |
Doesn't pre-suppose a specific vendor or product |
For more on developing high quality requirements, check out the Improve Requirements Gathering Blueprint
Prioritization is the process of ranking each requirement based on its importance to project success. Each requirement should be assigned a priority level. The delivery team will use these priority levels to ensure efforts are targeted toward the proper requirements as well as to plan features available on each release. Use the MoSCoW Model of Prioritization to effectively order your requirements.

The MoSCoW model was introduced by Dai Clegg of Oracle UK in 1994
(Source: ProductPlan).
| Criteria | Description |
|---|---|
| Regulatory and legal compliance | These requirements will be considered mandatory. |
| Policy compliance | Unless an internal policy can be altered or an exception can be made, these requirements will be considered mandatory. |
| Business value significance | Give a higher priority to high-value requirements. |
| Business risk | Any requirement with the potential to jeopardize the entire project should be given a high priority and implemented early. |
| Likelihood of success | Especially in proof-of-concept projects, it is recommended that requirements have good odds. |
| Implementation complexity | Give a higher priority to low implementation difficulty requirements. |
| Alignment with strategy | Give a higher priority to requirements that enable the corporate strategy. |
| Urgency | Prioritize requirements based on time sensitivity. |
| Dependencies | A requirement on its own may be low priority, but if it supports a high-priority requirement, then its priority must match it. |
It is easier to prioritize requirements if they have already been collapsed, resolved, and rewritten. There is no point in prioritizing every requirement that is elicited up front when some of them will eventually be eliminated.
Agile teams are familiar with the use of a Sprint Backlog, but in Requirements Management, a Product Backlog is a more appropriate choice.
A product backlog and a Sprint backlog are similar in that they are both lists of items that need to be completed in order to deliver a product or project, but there are some key differences between the two.
A product backlog is a list of all the features, user stories, and requirements that are needed for a product or project. It is typically created and maintained by the business analyst or product owner and is used to prioritize and guide the development of the product.
A Sprint backlog, on the other hand, is a list of items specifically for an upcoming sprint, which is an iteration of work in Scrum. The Sprint backlog is created by the development team and is used to plan and guide the work that will be done during the sprint. The items in the Sprint backlog are typically taken from the product backlog and are prioritized based on their importance and readiness.
For more on building effective product backlogs, visit Deliver on Your Digital Product Vision
Your backlog must give you a holistic understanding of demand for change in the product.
A well-formed backlog can be thought of as a DEEP backlog
Detailed appropriately: Requirements are broken down and refined as necessary
Emergent: The backlog grows and evolves over time as requirements are added and removed.
Estimated: The effort to deliver a requirement is estimated at each tier.
Prioritized: A requirement's value and priority are determined at each tier.

Adapted from Essential Scrum
This will help ensure the value and scope of each functionality and change are clear and well understood by both developers and stakeholders before the start of the sprint. The definition of ready should be two-fold: ready for the backlog, and ready for coding.
Who will be interacting with the product or feature being developed? This will help to focus the user story on the user's needs and goals.
Create the user story using the following template: "As a [user], I want [feature] so that [benefit]."
This helps articulate the user's need and the value that the requirement will provide.
User stories are typically too large to be implemented in a single sprint, so they should be broken down into smaller, more manageable tasks.
User stories are typically too large to be implemented in a single sprint, so they should be broken down into smaller, more manageable tasks.
NOTE: There is not a 1:1 relationship between requirements and user stories.
It is possible that a single requirement will have multiple user stories, and similarly, that a single user story will apply to multiple solution requirements.
At this point your requirements should be high-level stories. The goal is to refine your backlog items, so they are . . .
![]() |
Independent: Ideally your user stories can be built in any order (i.e. independent from each other). This allows you to prioritize based on value and not get caught up in sequencing and prerequisites. |
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Understand the benefits and limitations of Agile and business analysis 1.2 Align Agile and business analysis within your organization | 2.1 Confirm the best-fit approach for delivery 2.2 manage your requirements backlog | 3.1 Define project roles and responsibilities 3.2 define your level of acceptable documentation 3.3 Manage requirements as an asset 3.4 Define your requirements change management plan | 4.1 Preparing new ways of working 4.2 Develop a roadmap for next steps |
This phase will walk you through the following activities:
This phase involves the following participants:
Managing Requirements in an Agile Environment
Define Project Roles and Responsibilities
3.1.1 Define your Agile requirements RACI (optional)
3.1.2 Define your Agile requirements process
Defining Your Requirements Thresholds
This step involves the following participants:
Outcomes of this step
A business analyst in an Agile team typically interacts with several different roles, including the product owner, development team, and many other stakeholders throughout the organization.

Additionally, during the sprint retrospectives, the team will review their performance and find ways to improve for the next sprint. As a team member, the business analyst helps to identify areas where the team could improve how they are working with requirements and understand how the team can improve communication with stakeholders.
Industry: Anonymous Organization in the Energy sector
Source: Interview
Agile teams were struggling to deliver within a defined sprint, as there were consistent delays in requirements meeting the definition of ready for development. As such, sprints were often delayed, or key requirements were descoped and deferred to a future sprint.
During a given two-week sprint cycle, the business analyst assigned to the team would be working along multiple horizons, completing elicitation, analysis, and validation, while concurrently supporting the sprint and dealing with stakeholder changes.
As a part of addressing this ongoing pain, a pilot program was run to add a second business analyst to the team.
The intent was, as one is engaged preparing requirements through elicitation, analysis, and validation for a future sprint, the second is supporting the current sprint cycle, and gaining insights from stakeholders to refine the requirements backlog.
Essentially, these two were leap-frogging each other in time. At all times, one BA was focused on the present, and one on the future.
A happier team, more satisfied stakeholders, and consistent delivery of features and functions by the Agile teams. The pilot team outperformed all other Agile teams in the organization, and the "2 BA" approach was made the new standard.
Short development cycles can make requirements management more difficult because they often result in a higher rate of change to the requirements. In a shorter timeframe, there is less time to gather and verify requirements, leading to a higher likelihood of poor or incomplete requirements. Additionally, there may be more pressure to make decisions quickly, which can lead to less thorough analysis and validation of requirements. This can make it more challenging to ensure that the final solution meets the needs of the stakeholders.
When planning your requirements cycles, it's important to consider;
Sprint N(-1) |
Sprint N |
Sprint N(+1) |
|
|---|---|---|---|
![]() |
![]() |
![]() |
|
Changes from waterfall to Agile |
Gathering and documenting requirements: Requirements are discovered and refined throughout the project, rather than being gathered and documented up front. This can be difficult for business analysts who are used to working in a waterfall environment where all requirements are gathered and documented before development begins. |
Defining acceptance criteria: Acceptance criteria are defined for each user story to ensure that the team understands what needs to be delivered. Business analysts need to understand how to write effective acceptance criteria and how to use them to ensure that the team delivers what the customer needs. |
Managing changing requirements: It is expected that requirements will change throughout the project. Business analysts need to be able to adapt quickly to changing requirements and ensure that the team is aware of the changes and how they will impact the project. |
NOTE: The process is intended to be at a high enough level to leave space and flexibility for team members to adapt and adjust, but at a sufficient depth that everyone understands the process and workflows. In other words, the process will be both flexible and rigid, and the two are not mutually exclusive.
Establishing the right level of governance and decision making is important in Agile requirements because there is a cost to decision making, as time plays an important factor. Even the failure to decide can have significant impacts.
Good governance and decision-making practices can help to minimize risks, ensure that requirements are well understood and managed, and that project progress is tracked and reported effectively.
In Agile environments, this often involves establishing clear roles and responsibilities, implementing effective communication and collaboration practices, and ensuring that decision-making processes are efficient and effective.
Good requirements management practices can help to ensure that projects are aligned with organizational goals and strategy, that stakeholders' needs are understood and addressed, and that deliverables are of high quality and meet the needs of the business.
By ensuring that governance and decision-making is effective, organizations can improve the chances of project success, and deliver value to the business. Risks and costs can be mitigated by staying small and nimble.
Check out Make Your IT Governance Adaptable

Organizations should look to progress in their governance stages. Ad-hoc and controlled governance tends to be slow, expensive, and a poor fit for modern practices.
The goal as you progress through your stages is to delegate governance and empower teams to make optimal decisions in real-time, knowing that they are aligned with the understood best interests of the organization.
Automate governance for optimal velocity, while mitigating risks and driving value.
This puts your organization in the best position to be adaptive and able to react effectively to volatility and uncertainty.

Decision making must be delegated down within the organization, and all resources must be empowered and supported to make effective decisions.
Outcomes and goals must be clearly articulated and understood across the organization to ensure decisions are in line and stay within reasonable boundaries.
Integrated risk information must be available with sufficient data to support decision making and design approaches at all levels of the organization.
Governance standards and activities need to be embedded in processes and practices. Optimal governance reduces its manual footprint while remaining viable. This also allows for more dynamic adaptation.
Standards and policies need to be defined as the foundation for embedding governance practices organizationally. These guardrails will create boundaries to reinforce delegated decision making.
"Push the decision making down as far as possible, down to the point where sprint teams completely coordinate all the integration, development, and design. What I push up the management chain is risk taking. [Management] decides what level of risk they are willing to take and [they] demonstrate that by the amount of decision making you push down."
– Senior Manager, Canadian P&C Insurance Company, Info-Tech Interview
3.2.1 Calculate the cost of documentation
This step involves the following participants:
Outcomes of this step
Before creating any documentation, consider why; why are you creating documentation, and what purpose is it expected to serve?
Is it:
Next, consider what level of documentation would be acceptable and 'enough' for your stakeholders. Recognize that 'enough' will depend on your stakeholder's personal definition and perspective.
There may also be considerations for maintaining documentation for the purposes of compliance, and auditability in some contexts and industries.
The point is not to eliminate all documentation, but rather, to question why we're producing it, so that we can create just enough to deliver value.
"What does the next person need to do their work well, to gain or create a shared understanding?"
- Filip Hendrickx, Innovating BA and Founder, altershape
All things take time, and that would imply that all things have an inherent cost. We often don't think in these terms, as it's just the work we do, and costs are only associated with activities requiring additional capital expenditure. Documentation of requirements can come at a cost in terms of time and resources. Creating and maintaining detailed documentation requires effort from project team members, which could be spent on other aspects of the project such as development or testing. Additionally, there may be costs associated with storing and distributing the documentation.
When creating documentation, we are making a decision. There is an opportunity cost of investing time to create, and concurrently, not working on other activities. Documentation of requirements can come at a cost in terms of time and resources. Creating and maintaining detailed documentation requires effort from project team members, which could be spent on other aspects of the project such as development or testing. Additionally, there may be costs associated with storing and distributing the documentation.
In order to make better informed decisions about the types, quantity and even quality of the documentation we are producing, we need to capture that data. To ensure we are receiving good value for our documentation, we should compare the expected costs to the expected benefits of a sprint or project.
Re-using deliverables (documentation, process, product, etc.) is important in maintaining the velocity of work. If you find yourself constantly recreating your current state documentation at the start of a project, it's hard to deliver with agility.
3.3.1 Discuss your current perspectives on requirements as assets
This step involves the following participants:
Outcomes of this step
In order to delivery with agility, you need to maximize the re-usability of artifacts. These artifacts could take the form of current state documentation, user stories, test cases, and yes, even requirements for re-use.
Think of it like a library for understanding where your organization is today. Understanding the people, processes, and technology, in one convenient location. These artifacts become assets when we choose to retain them, rather than discard them at the end of a project, when we think they'll no longer be needed.
And just like finding a single book in a vast library, we need to ensure our assets can be found when we need them. And this means making them searchable.
We can do this by establishing criteria for requirements and artifact reuse;
When writing requirements for products or services, write them for the need first, and not simply for what is changing.
Retention of knowledge in a knowledge base that allows the team to retain current business requirements, process documentation, business rules, and any other relevant information.
A clearly defined scope to reduce stakeholder, business, and compliance conflicts.
Impact analysis of changes to the current organizational assets.
Source: Requirement Engineering Magazine, 2017.
Industry: Anonymous Organization in the Government sector
Source: Interview
A large government organization faced a challenge with managing requirements, processes, and project artifacts with any consistency.
Historically, their documentation was lacking, with multiple versions existing in email sent folders and manila folders no one could find. Confirming the current state at any given time meant the heavy lift of re-documenting and validating, so that effort was avoided for an excessive period.
Then there was a request for audit and compliance, to review their existing documentation practices. With nothing concrete to show, drastic recommendations were made to ensure this practice would end.
A small but effective team was created to compile and (if not available) document all existing project and product documentation, including processes, requirements, artifacts, business cases, etc.
A single repository was built and demonstrated to key stakeholders to ensure it would satisfy the needs of the audit and compliance group.
A single source of truth for the organization, which was;
Baseline + Release Changes = New Baseline
3.4.1 Triage your requirements
This step involves the following participants:
Outcomes of this step
In Agile development, change is expected and embraced. Instead of trying to rigidly follow a plan that may become outdated, Agile teams focus on regularly reassessing their priorities and adapting their plans accordingly. This means that the requirements can change often, and it's important for the team to have a process in place for managing these changes.
A common approach to managing change in Agile is to use a technique called "backlog refinement." Where previously we populated our backlog with requirements to get them ready for development and deployment, this involves regularly reviewing and updating the list of work to be done. The team will prioritize the items on the evolving backlog, and the prioritized items will be worked on during the next sprint. This allows the team to quickly respond to changes in requirements and stay focused on the most important work.
Another key aspect of managing change in Agile is effective communication. The team should have regular meetings, such as daily stand-up meetings or weekly sprint planning meetings, to discuss any changes in requirements and ensure that everyone is on the same page.
Clearly communicate your change process, criteria, and any techniques, tools, and templates that are part of your approach.
Maintain consistent control and communication and ensure that an impact assessment is completed. This is key to managing risks.
Leverage tools when you have them available. This could be a Requirements Management system, a defect/change log, or even by turning on "track changes" in your documents.
For every change, define the source of the change, the reason for the change, key dates for decisions, and any supporting documentation.
Leaders of successful change spend considerable time developing a powerful change message: a compelling narrative that articulates the desired end state and makes the change concrete and meaningful to staff. They create the change vision with staff to build ownership and commitment.

How will changes to requirements be codified?
How will intake happen?
How will potential changes be triaged and evaluated?
What is the review and approval process?


| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Understand the benefits and limitations of Agile and business analysis 1.2 Align Agile and business analysis within your organization | 2.1 Confirm the best-fit approach for delivery 2.2 manage your requirements backlog | 3.1 Define project roles and responsibilities 3.2 define your level of acceptable documentation 3.3 Manage requirements as an asset 3.4 Define your requirements change management plan | 4.1 Preparing new ways of working 4.2 Develop a roadmap for next steps |
This phase will walk you through the following activities:
This phase involves the following participants:
Managing Requirements in an Agile Environment
4.1.1 Define your communication plan
This step involves the following participants:
Outcomes of this step
|
As a result, you'll need to focus on; Emphasizing flexibility: In Agile organizations, there is a greater emphasis on flexibility and the ability to adapt to change. This means that requirements may evolve over time and may not be fully defined at the beginning of the project. |
Within the team
Within the organization
"Whether in an Agile environment or not, collaboration and relationships are still required and important…how you collaborate, communicate, and how you build relationships are key."
- Paula Bell, CEO, Paula A. Bell Consulting
4.2.1 Develop your Agile requirements action plan
Outcomes of this step
With a mindset of continuous improvement, there is always some way we can get better.
As you mature your Agile requirements practice, recognize that those gaps for improvement can come from multiple levels, from the organizational down to the individual.
Each level will bring challenges and opportunities.
The organization
The team
The individual
![]() |
Learning: Agile is a radical change in how people work doing Agile to being Agile. |
Automation: While Agile is tool-agnostic at its roots, Agile work management tools and DevOps inspired SDLC tools that have become a key part of Agile practices. |
|
Integrated Teams:
|
|
Metrics and Governance: Successful Agile implementations of delivery and operations |
|
Culture: Agile teams believe that value is best created by standing, self-organizing cross-functional teams who deliver sustainably in frequent, |
Agile gaps may only have a short-term, perceived benefit. For example, coding without a team mindset can allow for maximum speed to market for a seasoned developer. Post-deployment maintenance initiatives, however, often lock the single developer as no one else understands the rationale for the decisions that were made.
Note: the feasibility and timing of the ideas will happen in the following "Now, Next, Later" exercise.
![]() |
The "Now, Next, Later" technique is a method for prioritizing and planning improvements or tasks. This involves breaking down a list of tasks or improvements into three categories:
By using this technique, you can prioritize and plan the most important tasks first, while also allowing for flexibility and the ability to adjust plans as necessary. |
Monitoring progress is important in achieving your target state. Be deliberate with your actions, to continue to mature your Agile requirements practice.
As you navigate toward your target state, continue to monitor your progress, your successes, and your challenges. As your Agile requirements practice matures, you should see improvements in the stated metrics below.
Establish a cadence to review these metrics, as well as how you are progressing on your roadmap, against the plan.
This is not about adding work, but rather, about ensuring you're heading in the right direction; finding the balance in your Agile requirements practice.
| Metric | |
|---|---|
| Team satisfaction (%) | Expect team satisfaction to increase as a result of clearer role delineation and value contribution. |
| Stakeholder satisfaction (%) | Expect stakeholder satisfaction to similarly increase, as requirements quality increases, bringing increased value. |
| Requirements rework | Measures the quality of requirements from your Agile projects. Expect that the requirements rework will decrease, in terms of volume/frequency. |
| Cost of documentation | Quantifies the cost of documentation, including elicitation, analysis, validation, presentation, and management. |
| Time to delivery | Balancing metric. We don't want improvements in other at the expense of time to delivery. |

Emal Bariali
Business Architect & Business Analyst
Bariali Consulting
Emal Bariali is a Senior Business Analyst and Business Architect with 17 years of experience, executing nearly 20 projects. He has experience in both waterfall and Agile methodologies and has delivered solutions in a variety of forms, including custom builds and turnkey projects. He holds a Master's degree in Information Systems from the University of Toronto, a Bachelor's degree in Information Technology from York University, and a post-diploma in Software & Database Development from Seneca College.

Paula Bell
Paula A. Bell Consulting, LLC
Paula Bell is the CEO of Paula A Bell Consulting, LLC. She is a Business Analyst, Leadership and Career Development coach, consultant, speaker, and author with 21+ years of experience in corporate America in project roles including business analyst, requirements manager, business initiatives manager, business process quality manager, technical writer, project manager, developer, test lead, and implementation lead. Paula has experience in a variety of industries including media, courts, manufacturing, and financial. Paula has led multiple highly-visible multi-million-dollar technology and business projects to create solutions to transform businesses as either a consultant, senior business analyst, or manager.
Currently she is Director of Operations for Bridging the Gap, where she oversees the entire operation and their main flagship certification program.

Ryan Folster
Consulting Services Manager, Business Analysis
Dimension Data
Ryan Folster is a Business Analyst Lead and Product Professional from Johannesburg, South Africa. His strong focus on innovation and his involvement in the business analysis community have seen Ryan develop professionally from a small company, serving a small number of users, to large multi-national organizations. Having merged into business analysis through the business domain, Ryan has developed a firm grounding and provides context to the methodologies applied to clients and projects he is working on. Ryan has gained exposure to the Human Resources, Asset Management, and Financial Services sectors, working on projects that span from Enterprise Line of Business Software to BI and Compliance.
Ryan is also heavily involved in the local chapter of IIBA®; having previously served as the chapter president, he currently serves as a non-executive board member. Ryan is passionate about the role a Business Analyst plays within an organization and is a firm believer that the role will develop further in the future and become a crucial aspect of any successful business.

Filip Hendrickx
Innovating BA, Visiting Professor @ VUB
altershape
Filip loves bridging business analysis and innovation and mixes both in his work as speaker, trainer, coach, and consultant.
As co-founder of the BA & Beyond Conference and IIBA Brussels Chapter president, Filip helps support the BA profession and grow the BA community in and around Belgium. For these activities, Filip received the 2022 IIBA® EMEA Region Volunteer of the Year Award.
Together with Ian Richards, Filip is the author ofBrainy Glue, a business novel on business analysis, innovation and change. Filip is also co-author of the BCS book Digital Product Management and Cycles, a book, method and toolkit enabling faster innovation.

Fabricio Laguna
Professional Speaker, Consultant, and Trainer
TheBrazilianBA.com
Fabrício Laguna, aka The Brazilian BA, is the main reference on business analysis in Brazil. Author and producer of videos, articles, classes, lectures, and playful content, he can explain complex things in a simple and easy-to-understand way. IIBA Brazil Chapter president between 2012-2022. CBAP, AAC, CPOA, PMP, MBA. Consultant and instructor for more than 25 years working with business analysis, methodology, solution development, systems analysis, project management, business architecture, and systems architecture. His online courses are approved by students from 65 countries.

Ryland Leyton
Business Analyst and Agile Coach
Independent Consultant
Ryland Leyton, CBAP, PMP, CSM, is an avid Agile advocate and coach, business analyst, author, speaker, and educator. He has worked in the technology sector since 1998, starting off with database and web programming, gradually moving through project management and finding his passion in the BA and Agile fields. He has been a core team member of the IIBA Extension to the BABOK and the IIBA Agile Analysis Certification. Ryland has written popular books on agility, business analysis, and career. He can be reached at www.RylandLeyton.com.

Steve Jones
Supervisor, Market Support Business Analysis
ISO New England
Steve is a passionate analyst and BA manager with more than 20 years of experience in improving processes, services and software, working across all areas of software development lifecycle, business change and business analysis. He rejoices in solving complex business problems and increasing process reproducibility and compliance through the application of business analysis tools and techniques.
Steve is currently serving as VP of Education for IIBA Hartford. He is a CBAP, certified SAFe Product Owner/Product Manager, Six Sigma Green Belt, and holds an MS in Information Management and Communications.

Angela Wick
Founder
BA-Squared and BA-Cube
Founder of BA-Squared and BA-Cube.com, Angela is passionate about teaching practical, modern product ownership and BA skills. With over 20 years' experience she takes BA skills to the next level and into the future!
Angela is also a LinkedIn Learning instructor on Agile product ownership and business analysis, an IC-Agile Authorized Trainer, Product Owner and BA highly-rated trainer, highly-rated speaker, sought-after workshop facilitator, and contributor to many industry publications, including:

Rachael Wilterdink
Principal Consultant
Infotech Enterprises
Rachael Wilterdink is a Principal Consultant with Infotech Enterprises. With over 25 years of IT experience, she holds multiple business analysis and Agile certifications. As a consultant, Rachael has served clients in the financial, retail, manufacturing, healthcare, government, non-profit, and insurance industries. Giving back to the professional community, Ms. Wilterdink served on the boards of her local IIBA® and PMI® chapters. As a passionate public speaker, Rachael presents various topics at conferences and user groups across the country and the world. Rachael is also the author of the popular eBook "40 Agile Transformation Pain Points (and how to avoid or manage them)."
"2021 Business Agility Report: Rising to the Challenge." Business Agility, 2021. Accessed 13 June 2022.
Axure. "The Pitfalls of Agile and How We Got Here". Axure. Accessed 14 November 2022.
Beck, Kent, et al. "Manifesto for Agile Software Development." Agilemanifesto. 2001.
Brock, Jon, et al. "Large-Scale IT Projects: From Nightmare to Value Creation." BCG, 25 May 2015.
Bryar, Colin and Bill Carr. "Have We Taken Agile Too Far?" Harvard Business Review, 9 April 2021. Accessed 11 November, 2022.
Clarke, Thomas. "When Agile Isn't Responsive to Business Goals" RCG Global Services, Accessed 14 November 2022.
Digital.ai "The 15th State of Agile Report". Digital.ai. Accessed 21 November 2022.
Hackshall, Robin. "Product Backlog Refinement." Scrum Alliance. 9 Oct. 2014.
Hartman, Bob. "New to Agile? INVEST in good user stories." Agile For All.
IAG Consulting. "Business Analysis Benchmark: Full Report." IAG Consulting, 2009.
Karlsson, Johan. "Backlog Grooming: Must-Know Tips for High-Value Products." Perforce. 18 May 2018
KPMG. Agile Transformation (2019 Survey on Agility). KPMG. Accessed November 29.
Laguna, Fabricio "REQM guidance matrix: A framework to drive requirements management", Requirements Engineering Magazine. 12 September 2017. Accessed 10 November 2022.
Miller, G. J. (2013). Agile problems, challenges, & failures. Paper presented at PMI® Global Congress 2013—North America, New Orleans, LA. Newtown Square, PA: Project Management Institute.
Product Management: MoSCoW Prioritization." ProductPlan, n.d. Web.
Podeswa, Howard "The Business Case for Agile Business Analysis" Requirements Engineering Magazine. 21 February 2017. Accessed 7 November 2022.
PPM Express. "Why Projects Fail: Business Analysis is the Key". PPM Express. Accessed 16 November 2022.
Reifer, Donald J. "Quantitative Analysis of Agile Methods Study: Twelve Major Findings." InfoQ, 6 February, 2017.
Royce, Dr. Winston W. "Managing the Development of Large Software Systems." Scf.usc.edu. 1970. (royce1970.pdf (usc.edu))
Rubin, Kenneth S. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Pearson Education. 2012.
Singer, Michael. "15+ Surprising Agile Statistics: Everything You Need To Know About Agile Management". Enterprise Apps Today. 22 August 2022.
The Standish Group. The Chaos Report, 2015. The Standish Group.
Improve Requirements Gathering
Back to basics: great products are built on great requirements.
Make the Case for Product Delivery
Align your organization on the practices to deliver what matters most.
Requirements for Small and Medium Enterprises
Right-size the guidelines of your requirements gathering process.
Implement Agile Practices that Work
Improve collaboration and transparency with the business to minimize project failure.
Create an Agile-Friendly Gating and Governance Model
Use Info-Tech's Agile Gating Framework as a guide to gating your Agile projects following a "trust but verify" approach.
Make Your IT Governance Adaptable
Governance isn't optional, so keep it simple and make it flexible.
Deliver on Your Digital Product Vision
Build a product vision your organization can take from strategy through execution.
Algorithms are becoming more advanced, data is now richer and easier to collect, and hardware is cheaper and more powerful. All of this is true and contributes to the excitement around enterprise AI applications, but the biggest difference today is that enterprises are redesigning their processes around AI, rather than simply adding AI to their existing processes.
This report outlines six emerging ways AI is being used in the enterprise, with four future scenarios outlining their possible trajectories. These are designed to guide strategic decision making and facilitate future-focused ideation.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This report outlines six emerging ways AI is being used in the enterprise, with four future scenarios outlining their possible trajectories. These are designed to guide strategic decision making and facilitate future-focused ideation.
The saying goes, "as time goes by," but these days, we should say "as speed picks up." We're already in month two, so high time we take a look at the priorities you hopefully already set at the end of last year.
Getting started with customer advocacy (CA) is no easy task. Many customer success professionals carry out ad hoc customer advocacy activities to address immediate needs but lack a more strategic approach.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the strategic benefits and process for building a formal customer advocacy program. To be successful, you must reposition CA as a strategic growth initiative and continually link any CA efforts back to growth.
With the assessment tool and steps outlined in the storyboard, you will be able to understand the gaps and pain points, where and how to improve your efforts, and how to establish program requirements.
Align on pilot goals, key milestones, and program elements using the template and storyboard to effectively communicate with stakeholders and gain executive buy-in for your customer advocacy pilot.
Customer advocacy puts the customer at the center of everything your organization does. By cultivating a deep understanding of customer needs and how they define value and by delivering positive experiences throughout the customer journey, organizations inspire and empower customers to become evangelists for their brands or products. Both the client and solution provider enjoy satisfying and ongoing business outcomes as a result.
Focusing on customer advocacy is critical for software solutions providers. Business-to-business (B2B) buyers are increasingly looking to their peers and third-party resources to arm themselves with information on solutions they feel they can trust before they choose to engage with solution providers. Your satisfied customers are now your most trusted and powerful resource.
Customer advocacy helps build strong relationships with your customers, nurtures brand advocacy, gives your marketing messaging credibility, and differentiates your company from the competition; it’s critical to driving revenue growth. Companies that develop mature advocacy programs can increase Customer Lifetime Value (CLV) by 16% (Wharton Business School, 2009), increase customer retention by 35% (Deloitte, 2011), and give themselves a strong competitive advantage in an increasingly competitive marketplace.
Emily Wright
Senior Research Analyst, Advisory
SoftwareReviews
Ad hoc customer advocacy (CA) efforts and reference programs, while still useful, are not enough to drive growth. Providers increase their chance for success by assessing if they face the following challenges:
Building a strong customer advocacy program must be a high priority for customer service/success leaders in today’s highly competitive software markets.
Getting started with customer advocacy is no easy task. Many customer success professionals carry out ad hoc customer advocacy activities to address immediate needs but lack a more strategic approach. What separates them from success are several nagging obstacles:
This blueprint will help leaders of customer advocacy programs get started with developing a formalized pilot program that will demonstrate the value of customer advocacy and lay a strong foundation to justify rollout. Through SoftwareReviews’ approach, customer advocacy leaders will:
“Customer advocacy is the act of putting customer needs first and working to deliver solution-based assistance through your products and services." – Testimonial Hero, 2021
Customer advocacy is designed to keep customers loyal through customer engagement and advocacy marketing campaigns. Successful customer advocacy leaders experience decreased churn while increasing return on investment (ROI) through retention, acquisition, and cost savings.
Businesses that implement customer advocacy throughout their organizations find new ways of supporting customers, provide additional customer value, and ensure their brands stand unique among the competition.
Customer advocacy has evolved into being a valued company asset versus a simple referral program – success requires an organization-wide customer-first mindset and the recognition that customer advocacy is a strategic growth initiative necessary to succeed in today’s competitive market.
Acquiring a new customer can cost five times more than retaining an existing customer (Huify, 2018).
Increasing customer retention by 5% can increase profits by 25% to 95% (Bain & Company, cited in Harvard Business Review, 2014).
Don’t overlook the value of customer advocacy to retention! Despite the common knowledge that it’s far easier and cheaper to sell to an existing customer than to sell to a new prospect, most companies fail to leverage their customer advocacy programs and continue to put pressure on Marketing to focus their budgets on customer acquisition.
Forty-five percent of businesses rank online reviews as a top source of information for selecting software during this (top of funnel) stage, followed closely by recommendations and referrals at 42%. These sources are topped only by company websites at 54% (Clutch, 2020).
With referrals coming from customer advocates to prospects via your lead gen engine and through seller talk tracks, customer advocacy is central to sales, marketing, and customer experience success.
✓ Advocates can help your new customers learn your solution and ensure higher adoption and satisfaction.
✓ Advocates can provide valuable, honest feedback on new updates and features.
“A customer advocacy program is not just a fancy buzz word or a marketing tool that’s nice to have. It’s a core discipline that every major brand needs to integrate into their overall marketing, sales and customer success strategies if they expect to survive in this trust economy. Customer advocacy arguably is the common asset that runs throughout all marketing, sales and customer success activities regardless of the stage of the buyer’s journey and ties it all together.” – RO Innovation, 2017
Advocacy happens when customers recommend your product. Our research shows that the biggest drivers of likeliness to recommend and acts of customer advocacy are the positive experiences customers have with vendors and their products, not product features or cost savings. Customers want to feel that:
Note that anything above 0.5 indicates a strong driver of satisfaction.
Source: SoftwareReviews buyer reviews (based on 82,560 unique reviews).
True customer satisfaction comes from helping customers innovate, enhancing their performance, inspiring them to continually improve, and being reliable, respectful, trustworthy, and conscious of their time. These true drivers of satisfaction should be considered in your customer advocacy and retention efforts. The experience customers have with your product and brand is what will differentiate your brand from competitors, drive advocacy, and ultimately, power business growth. Talk to a SoftwareReviews advisor to learn how users rate your product on these satisfaction drivers in the SoftwareReviews Emotional Footprint Report.
Marketing, customer success, and sales teams experiencing any one of the above challenges must consider getting started with a more formalized customer advocacy program.
12% of people believe when a company says they put customers first. (Source: HubSpot, 2019)
Brands struggle to follow through on brand promises, and a mismatch between expectations and lived experience emerges. Customer advocacy can help close this gap and help companies live up to their customer-first messaging.
42% of companies don’t conduct any customer surveys or collect feedback. (Source: HubSpot, 2019)
Too many companies are not truly listening to their customers. Companies that don’t collect feedback aren’t going to know what to change to improve customer satisfaction. Customer advocacy will orient companies around their customer and create a reliable feedback loop that informs product and service enhancements.
“84% of B2B decision makers start the buying process with a referral.” (Source: Influitive, Gainsight & Pendo, 2020)
“46% of B2B buyers rely on customer references for information before purchasing.” (Source: RO Innovation, 2017)
“91% of B2B purchasers’ buying decisions are influenced by word-of-mouth recommendations.” (Source: ReferralRock, 2022)
“76% of individuals admit that they’re more likely to trust content shared by ‘normal’ people than content shared by brands.” (Source: TrustPilot, 2020)
By ignoring the importance of customer advocacy, companies and brands are risking stagnation and missing out on opportunities to gain competitive advantage and achieve growth.
1 BUILD
Build the business case
Identify your key stakeholders, steering committee, and working team, understand key customer advocacy principles, and note success barriers and ways to overcome them as your first steps.
2 DEVELOP
Develop your advocacy requirements
Assess your current customer advocacy maturity, identify gaps in your current efforts, and develop your ideal advocate profile.
3 WIN
Win executive approval and implement pilot
Determine goals and success metrics for the pilot, establish a timeline and key project milestones, create advocate communication materials, and finally gain executive buy-in and implement the pilot.
SoftwareReviews Insight
Building and implementing a customer advocacy pilot will help lay the foundation for a full program and demonstrate to executives and key stakeholders the impact on revenue, retention, and CLV that can be achieved through coordinated and well-planned customer advocacy efforts.
"Advocacy is the currency for business and the fuel for explosive growth. Successful marketing executives who understand this make advocacy programs an essential part of their go-to-market strategy. They also know that advocacy isn't something you simply 'turn on': ... ultimately, it's about making human connections and building relationships that have enduring value for everyone involved."
- Dan Cote, Influitive, Dec. 2021
Genesys' Goal
Provide sales team with compelling customer reviews, quotes, stories, videos, and references.
Approach to Advocacy
Advocate Impact on Sales
According to Influitive (2021), the impacts were:
|
Phase Steps |
1. Build the business case
|
2. Develop your advocacy requirements
|
3. Create implementation plan and pitch CA pilot
|
|---|---|---|---|
|
Phase Outcomes |
|
|
|
Customer advocacy is a critical strategic growth initiative
Customer advocacy (CA) has evolved into being a highly valued company asset as opposed to a simple referral program, but not everyone in the organization sees it that way. Customer success leaders must reposition their CA program around growth instead of focusing solely on retention and communicate this to key stakeholders. The recognition that customer advocacy is a strategic growth initiative is necessary to succeed in today’s competitive market.
Get key stakeholders on board early – especially Sales!
Work to bring the CEO and the head of Sales on your side early. Sales is the gatekeeper – they need to open the door to customers to turn them into advocates. Clearly reposition CA for growth and communicate that to the CEO and head of Sales; wider buy-in will follow.
Identify the highest priority segment for generating acts of advocacy
By focusing on the highest priority segment, you accomplish a number of things: generating growth in a critical customer segment, proving the value of customer advocacy to key stakeholders (especially Sales), and setting a strong foundation for customer advocacy to build upon and expand the program out to other segments.
Always link your CA efforts back to retention and growth
By clearly demonstrating the impact that customer advocacy has on not only retention but also overall growth, marketers will gain buy-in from key stakeholders, secure funding for a full CA program, and gain the resources needed to expand customer advocacy efforts.
Focus on providing value to advocates
Many organizations take a transactional approach to customer advocacy, focusing on what their advocates can do for them. To truly succeed with CA, focus on providing your advocates with value first and put them in the spotlight.
Make building genuine relationships with your advocates the cornerstone of your CA program
"57% of small businesses say that having a relationship with their consumers is the primary driver of repeat business" (Factory360).
Build the Business Case
Call #1: Identify key stakeholders. Map out motivations and anticipate any concerns or objections. Determine steering committee and working team. Plan next call – 1 week.
Call #2: Discuss concepts and benefits of customer advocacy as they apply to organizational goals. Plan next call – 1 week.
Call #3: Discuss barriers to success, risks, and risk mitigation tactics. Plan next call – 1 week.
Call #4: Finalize CA goals, opportunities, and risks and develop business case. Plan next call – 2 weeks.
Develop Your Advocacy Requirements
Call #5: Review the SoftwareReviews CA Maturity Assessment Tool. Assess your current level of customer advocacy maturity. Plan next call – 1 week.
Call #6: Review gaps and pains in current CA efforts. Discuss tactics and possible CA pilot program goals. Begin adding tasks to action plan. Plan next call – 2 weeks.
Call #7: Discuss ideal advocate profile and target segments. Plan next call – 2 weeks.
Call #8: Validate and finalize ideal advocate profile. Plan next call – 1 week.
Win Executive Approval and Implement Pilot
Call #9: Discuss CA pilot scope. Discuss performance metrics and KPIs. Plan next call – 3 days.
Call #10: Determine timeline and key milestones. Plan next call –2 weeks.
Call #11: Develop advocate communication materials. Plan next call – 3 days.
Call #12: Review final business case and coach on executive presentation. Plan next call – 1 week.
A Guided Implementation (GI) is series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization. For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst. Your engagement managers will work with you to schedule analyst calls.
| Pre-Workshop | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | Post-Workshop | |
| Activities | Identify Stakeholders & CA Pilot Team | Build the Business Case | Assess Current CA Efforts | Develop Advocacy Goals & Ideal Advocate Profile | Develop Project Timelines, Materials, and Exec Presentation | Next Steps and Wrap-Up (offsite) | Pitch CA Pilot |
| 0.1 Identify key stakeholders to involve in customer advocacy pilot and workshop; understand their motivations and anticipate possible concerns. | 1.1 Review key CA concepts and identify benefits of CA for the organization. 1.2 Outline barriers to success, risks, and risk mitigation tactics. |
2.1 Assess your customer advocacy maturity using the SoftwareReviews CA Maturity Assessment Tool. 2.2 Identify gaps/pains in current CA efforts. 2.3 Prioritize gaps from diagnostic and any other critical pain points. |
3.1 Identify and document the ideal advocate profile and target customer segment for pilot. 3.2 Determine goal(s) and success metrics for program pilot. |
4.1 Develop pilot timelines and key milestones. 4.2 Outline materials needed and possible messaging. 4.3 Build the executive buy-in presentation. |
5.1 Complete in-progress deliverables from the previous four days. | 6.1 Present to executive team and stakeholders. 6.2 Gain executive buy-in and key stakeholder approval. 6.3 Execute CA pilot. |
|
| Deliverables |
|
|
|
|
|
|
Contact your account representative for more information.
workshops@infotech.com
1-888-670-8889
Phase 1
Build the Business Case
Phase 2
Develop Your Advocacy Requirements
Phase 3
Win Executive Approval and Implement Pilot
Steps
1.1 Identify your key stakeholders, steering committee, and working team
1.2 Understand the concepts and benefits of customer advocacy as they apply to your organization
1.3 Outline barriers to success, risks, and risk mitigation tactics
Phase Outcome
Total duration: 2.5-8.0 hours
Objective
Identify, document, and finalize your key stakeholders to know who to involve and how to get them onboard by truly understanding the forces of influence.
Output
Participants
MarTech
None
Tools
1.1.1 Identify Stakeholders
(60-120 min.)
Identify
Using the guidance on slide 28, identify all stakeholders who would be involved or impacted by your customer advocacy pilot by entering names and titles into columns A and B on slide 27 "Stakeholder List Worksheet."
Document
Document as much information about each stakeholder as possible in columns C, D, E, and F into the table on slide 27.
1.1.2 Select Steering Committee & Working Team
(60-90 min.)
Select
Using the guidance on slides 28 and 29 and the information collected in the table on slide 27, identify the stakeholders that are steering committee members, functional workstream leads, or operations; document in column G on slide 27.
Document
Open the Executive Presentation Template to slides 5 and 6 and document your final steering committee and working team selections. Be sure to note the Executive Sponsor and Program Manager on slide 5.
Tips & Reminders
Consult Info-Tech's Manage Stakeholder Relations blueprint for additional guidance on identifying and managing stakeholders, or contact one of our analysts for more personalized assistance and guidance.
| *Possible Roles |
| Executive Sponsor |
| Program Manager |
| Workstream Lead |
| Functional Lead |
| Steering Committee |
| Operations |
| A | B | C | D | E | F | G | |
|---|---|---|---|---|---|---|---|
| Name | Position | Decision Involvement (Driver / Approver / Contributor / Informe |
Direct Benefit? (Yes / No) |
Motivation | Concerns | *Role in Customer Advocacy Pilot | |
| E.g. Jane Doe | VP, Customer Success | A | N |
|
|
Workstream Lead | |
What to consider when identifying stakeholders required for CA:
Customer advocacy should be done as a part of a cross-functional company initiative. When identifying stakeholders, consider:
| Key Roles Supporting an Effective Customer Advocacy Pilot | |
| Executive Sponsor |
|
| Program Manager |
|
| Functional / Workstream Leads |
|
| Steering Committee |
|
| Operations |
|
Consider the skills and knowledge required for planning and executing a customer advocacy pilot.
Workstream leads should have strong project management and collaboration skills and deep understanding of both product and customers (persona, journeys, satisfaction, etc.).
| Required Skills | Suggested Functions |
|
|
Total duration: 2.0-4.0 hours
Objective
Understand customer advocacy and what benefits you seek from your customer advocacy program, and get set up to best communicate them to executives and decision makers.
Output
Participants
MarTech
None
Tools
1.2.1 Discuss Key Concepts
(60-120 min.)
Envision
Schedule a visioning session with key stakeholders and share the Get Started With Customer Advocacy Executive Brief (slides 3-23 in this deck).
Discuss how key customer advocacy concepts can apply to your organization and how CA can contribute to organizational growth.
Document
Determine the top benefits sought from the customer advocacy program pilot and record them on slides 4 and 12 in the Executive Presentation Template.
Finalize
Work with the Executive Sponsor to finalize the "Message from the CMO" on slide 4 in the Executive Presentation Template.
Tips & Reminders
Keep in mind that while we're starting off broadly, the pilot for your customer advocacy program should be narrow and focused in scope.
Total duration: 2.0-8.0 hours
Objective
Anticipate threats to pilot success; identify barriers to success, any possible risks, and what can be done to reduce the chances of a negative pilot outcome.
Output
Participants
MarTech
None
Tools
1.3.1 Brainstorm Barriers to Success & Possible Risks
(60-120 min.)
Identify
Using slide 7 of the Executive Presentation Template, brainstorm any barriers to success that may exist and risks to the customer advocacy program pilot success. Consider the people, processes, and technology that may be required.
Document
Document all information on slide 7 of the Executive Presentation Template.
1.3.2 Develop Risk Mitigation Tactics
(60-300 min.)
Develop
Brainstorm different ways to address any of the identified barriers to success and reduce any risks. Consider the people, processes, and technology that may be required.
Document
Document all risk mitigation tactics on slide 7 of the Executive Presentation Template.
Tips & Reminders
There are several types of risk to explore. Consider the following when brainstorming possible risks:
Steps
2.1 Assess your customer advocacy maturity
2.2 Identify and document gaps and pain points
2.3 Develop your ideal advocate profile
Phase Outcome
Total duration: 2.0-8.0 hours
Objective
Use the Customer Advocacy Maturity Assessment Tool to understand your organization's current level of customer advocacy maturity and what to prioritize in the program pilot.
Output
Participants
MarTech
None
Tools
2.1.1 Diagnose Current Customer Advocacy Maturity
(60-120 min.)
Diagnose
Begin on tab 1 of the Customer Advocacy Maturity Assessment Tool and read all instructions.
Navigate to tab 2. Considering the current state of customer advocacy efforts, answer the diagnostic questions in the Diagnostic tab of the Customer Advocacy Maturity Assessment Tool.
After completing the questions, you will receive a diagnostic result on tab 3 that will identify areas of strength and weakness and make high-level recommendations for your customer advocacy program pilot.
2.1.2 Discuss Results
(60-300 min.)
Discuss
Schedule a call to discuss your customer advocacy maturity diagnostic results with a SoftwareReviews Advisor.
Prioritize the recommendations from the diagnostic, noting which will be included in the program pilot and which require funding and resources to advance.
Transfer
Transfer results into slides 8 and 11 of the Executive Presentation Template.
Tips & Reminders
Complete the diagnostic with a handful of key stakeholders identified in the previous phase. This will help provide a more balanced and accurate assessment of your organization’s current level of customer advocacy maturity.
Total duration: 2.5-8.0 hours
Objective
Understand the current pain points within key customer-related processes and within any current customer advocacy efforts taking place.
Output
Participants
MarTech
None
Tools
2.2.1 Identify Pain Points
(60-120 min.)
Identify
Identify and list current pain points being experienced around customer advocacy efforts and processes around sales, marketing, customer success, and product feedback.
Add any gaps identified in the diagnostic to the list.
Transfer
Transfer key information into slide 9 of Executive Presentation Template.
2.2.2 Prioritize Pain Points
(60-300 min.)
Prioritize
Indicate which pains are the most important and that a customer advocacy program could help improve.
Schedule a call to discuss the outputs of this step with a SoftwareReviews Advisor.
Document
Document priorities on slide 9 of Executive Presentation Template.
Tips & Reminders
Customer advocacy won't solve for everything; it's important to be clear about what pain points can and can't be addressed through a customer advocacy program.
Total duration: 3.0-9.0 hours
Objective
Develop an ideal advocate persona profile that can be used to identify potential advocates, guide campaign messaging, and facilitate advocate engagement.
Output
Participants
MarTech
May require the use of:
Tools
2.3.1 Brainstorm Session Around Ideal Advocate Persona
(60-150 min.)
Brainstorm
Lead the team to prioritize an initial, single, most important persona and to collaborate to complete the template.
Choose your ideal advocate for the pilot based on your most important audience. Start with firmographics like company size, industry, and geography.
Next, consider satisfaction levels and behavioral attributes, such as renewals, engagement, usage, and satisfaction scores.
Identify motivations and possible incentives for advocate activities.
Document
Use slide 10 of the Executive Presentation Template to complete this exercise.
2.3.2 Review and Refine Advocate Persona
(60-300 min.)
Review & Refine
Place the Executive Presentation Template in a shared drive for team collaboration. Encourage the team to share persona knowledge within the shared drive version.
Hold any necessary follow-up sessions to further refine persona.
Validate
Interview advocates that best represent your ideal advocate profile on their type of preferred involvement with your company, their role and needs when it comes to your solution, ways they'd be willing to advocate, and rewards sought.
Confirm
Incorporate feedback and inputs into slide 10 of the Executive Presentation Template. Ensure everyone agrees on persona developed.
Tips & Reminders
| Demographics | Firmographics | Satisfaction & Needs/Value Sought | Behavior | Motivation |
| Role - user, decision-maker, etc. | Company size: # of employees | Satisfaction score | Purchase frequency & repeat purchases (renewals), upgrades | Career building/promotion |
| Department | Company size: revenue | NPS score | Usage | Collaboration with peers |
| Geography | CLV score | Engagement (e.g. email opens, response, meetings) | Educate others | |
| Industry | Value delivered (outcomes, occasions used, etc.) | Social media interaction, posts | Influence (on product, service) | |
| Tenure as client | Benefits sought | |||
| Account size ($) | Minimal and resolved service tickets, escalations | |||
| 1. When identifying potential advocates, choose based on your most important audience/segments. | 2. Ensure you're selecting those with the highest satisfaction, NPS, and CLV scores. | 3. When identifying potential advocates, choose based on high engagement and interaction, regular renewals, and high usage. | 4. Knowing motivations will determine the type of acts of advocacy they would be most willing to perform and incentives for participating in the program. |
Steps
3.1 Determine pilot goals and success metrics
3.2 Establish timeline and create advocate communication materials
3.3 Gain executive buy-in and implement pilot
Phase Outcome
Total duration: 2.0-4.0 hours
Objective
Set goals and determine the scope for the customer advocacy program pilot.
Output
Participants
MarTech
May require to use, set up, or install platforms like:
Tools
3.1.1 Establish Pilot Goals
(60-120 min.)
Set
Organize a meeting with department heads and review organizational and individual department goals.
Using the Venn diagram on slide 39 in this deck, identify customer advocacy goals that align with business goals. Select the highest priority goal for the pilot.
Check that the goal aligns with benefits sought or addresses pain points identified in the previous phase.
Document
Document the goals on slides 9 and 16 of the Executive Presentation Template.
3.1.2 Establish Pilot Success Metrics
(60-120 min.)
Decide
Decide how you will measure the success of your program pilot using slide 40 in this document.
Document
Document metrics on slide 16 of the Executive Presentation Template.
Tips & Reminders
List possible customer advocacy goals, identifying areas of overlap with organizational goals by taking the following steps:
| Organizational Goals | Shared Goals | Customer Advocacy Goals |
|---|---|---|
| Example | Example: Gain customer references to help advance sales and improve win rates | Example: Develop pool of customer references |
| [insert goal] | [insert goal] | Example: Gather customer feedback |
| [insert goal] | [insert goal] | [insert goal] |
| [insert goal] | [insert goal] | [insert goal] |
This table provides a starting point for measuring the success of your customer advocacy pilot depending on the goals you've set.
This list is by no means exhaustive; the metrics here can be used, or new metrics that would better capture success measurement can be created and tracked.
| Metric |
|---|
| Revenue influenced by reference calls ($ / % increase) |
| # of reference calls resulting in closed-won opportunities |
| # of quotes collected |
| % of community growth YoY |
| # of pieces of product feedback collected |
| # of acts of advocacy |
| % membership growth |
| % product usage amongst community members |
| # of social shares, clicks |
| CSAT score for community members |
| % of registered qualified leads |
| # of leads registered |
| # of member sign-ups |
| # of net-new referenceable customers |
| % growth rate of products used by members |
| % engagement rate |
| # of published third-party reviews |
| % increase in fulfilled RFPs |
When selecting metrics, remember:
When choosing metrics for your customer advocacy pilot, be sure to align them to your specific goals. If possible, try to connect your advocacy efforts back to retention, growth, or revenue.
Do not choose too many metrics; one per goal should suffice.
Ensure that you can track the metrics you select to measure - the data is available and measuring won't be overly manual or time-consuming.
Total duration: 2.5-8.0 hours
Objective
Outline who will be involved in what roles and capacities and what tasks and activities need to completed.
Output
Participants
MarTech
None
Tools
3.2.1 Establish Timeline & Milestones
(30-60 min.)
List & Assign
List all key tasks, phases, and milestones on slides 13, 14, and 15 in the Executive Presentation Template.
Include any activities that help close gaps or address pain points from slide 9 in the Executive Presentation Template.
Assign workstream leads on slide 15 in the Executive Presentation Template.
Finalize all tasks and activities with working team.
3.2.2 Design & Build Advocate Program Materials
(180-300 min.)
Decide
Determine materials needed to recruit advocates and explain the program to advocate candidates.
Determine the types of acts of advocacy you are looking for.
Determine incentives/rewards that will be provided to advocates, such as access to new products or services.
Build
Build out all communication materials.
Obtain incentives.
Tips & Reminders
Total duration: 2.5-8.0 hours
Objective
Successfully implement the customer advocacy pilot program and communicate results to gain approval for full-fledged program.
Output
Participants
MarTech
May require the use of:
Tools
3.3.1 Complete & Deliver Executive Presentation
(60-120 min.)
Present
Finalize the Executive Presentation.
Hold stakeholder meeting and introduce the program pilot.
3.3.2 Gain Executive Buy-in
(60-300 min.)
Pitch
Present the final results of the customer advocacy pilot using the Executive Presentation Template and gain approval.
3.3.3 Implement the Customer Advocacy Program Pilot
(30-60 min.)
Launch
Launch the customer advocacy program pilot. Follow the timelines and activities outlined in the Executive Presentation Template. Track/document all advocate outreach, activity, and progress against success metrics.
Communicate
Establish a regular cadence to communicate with steering committee, stakeholders. Use the Executive Presentation Template to present progress and resolve roadblocks if/as they arise.
Tips & Reminders
If you would like additional support, contact us and we'll make sure you get the professional expertise you need.
Contact your account representative for more information.
info@softwarereviews.com
1-888-670-8889
Measure and Manage the Customer Satisfaction Metrics That Matter the Most
Understand what truly keeps your customer satisfied. Measure what matters to improve customer experience and increase satisfaction and advocacy.
Develop the Right Message to Engage Buyers
Sixty percent of marketers find it hard to produce high-quality content consistently. SaaS marketers have an even more difficult job due to the technical nature of content production.
Create a Buyer Persona and Journey
Get deeper buyer understanding and achieve product-market fit, with easier access to market and sales.
"15 Award-Winning Customer Advocacy Success Stories." Influitive, 2021. Accessed 8 June 2023.
"Advocacy Marketing." Influitive, June 2016. Accessed 26 Oct. 2021.
Andrews, Marcus. "42% of Companies Don’t Listen to their Customers. Yikes." HubSpot, June 2019. Accessed 2 Nov. 2021.
"Before you leap! Webcast." Point of Reference, Sept. 2019. Accessed 4 Nov. 2021.
"Brand Loyalty: 5 Interesting Statistics." Factory360, Jan. 2016. Accessed 2 Nov. 2021.
Brenner, Michael. "The Data Driven Guide to Customer Advocacy." Marketing Insider Group, Sept. 2021. Accessed 3 Feb. 2022.
Carroll, Brian. "Why Customer Advocacy Should Be at the Heart of Your Marketing." Marketing Insider Group, Sept. 2017. Accessed 3 Feb. 2022.
Cote, Dan. "Advocacy Blooms and Business Booms When Customers and Employees Engage." Influitive, Dec. 2021. Accessed 3 Feb. 2022.
"Customer Success Strategy Guide." ON24, Jan. 2021. Accessed 2 Nov. 2021.
Dalao, Kat. "Customer Advocacy: The Revenue-Driving Secret Weapon." ReferralRock, June 2017. Accessed 7 Dec. 2021.
Frichou, Flora. "Your guide to customer advocacy: What is it, and why is it important?" TrustPilot, Jan. 2020. Accessed 26 Oct. 2021.
Gallo, Amy. "The Value of Keeping the Right Customers." Harvard Business Review, Oct. 2014. Accessed 10 March 2022.
Huhn, Jessica. "61 B2B Referral Marketing Statistics and Quotes." ReferralRock, March 2022. Accessed 10 March 2022.
Kemper, Grayson. "B2B Buying Process: How Businesses Purchase B2B Services and Software." Clutch, Feb. 2020. Accessed 6 Jan. 2022.
Kettner, Kyle. "The Evolution of Ambassador Marketing." BrandChamp.io, Oct. 2018. Accessed 2 Nov. 2021.
Landis, Taylor. "Customer Retention Marketing vs. Customer Acquisition Marketing." OutboundEngine, April 2022. Accessed 23 April 2022.
Miels, Emily. "What is customer advocacy? Definition and strategies." Zendesk Blog, June 2021. Accessed 27 Oct. 2021.
Mohammad, Qasim. "The 5 Biggest Obstacles to Implementing a Successful B2B Customer Advocacy Program." HubSpot, June 2018. Accessed 6 Jan. 2022.
Murphy, Brandon. "Brand Advocacy and Social Media - 2009 GMA Conference." Deloitte, Dec. 2009. Accessed 8 June 2023.
Patel, Neil. "Why SaaS Brand Advocacy is More Important than Ever in 2021." Neil Patel, Feb. 2021. Accessed 4 Nov. 2021.
Pieri, Carl. "The Plain-English Guide to Customer Advocacy." HubSpot, Apr. 2020. Accessed 27 Oct. 2021.
Schmitt, Philipp; Skiera, Bernd; Van den Bulte, Christophe. "Referral Programs and Customer Value." Wharton Journal of Marketing, Jan. 2011. Accessed 8 June 2023.
"The Complete Guide to Customer Advocacy." Gray Group International, 2020. Accessed 15 Oct. 2021.
"The Customer-powered Enterprise: Playbook." Influitive, Gainsight & Pendo. 2020. Accessed 26 Oct. 2021.
"The Winning Case for a Customer Advocacy Solution." RO Innovation, 2017. Accessed 26 Oct. 2021.
Tidey, Will. "Acquisition vs. Retention: The Importance of Customer Lifetime Value." Huify, Feb. 2018. Accessed 10 Mar. 2022.
"What a Brand Advocate Is and Why Your Company Needs One." RockContent, Jan. 2021. Accessed 7 Feb. 2022.
"What is Customer Advocacy? A Definition and Strategies to Implement It." Testimonial Hero, Oct. 2021. Accessed 26 Jan. 2022.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess current maturity, establish a team, and choose a pilot business unit. Identify business processes, dependencies, and alternatives.
Define an objective impact scoring scale, estimate the impact of downtime, and set recovery targets.
Build a workflow of the current steps for business recovery. Identify gaps and risks to recovery. Brainstorm and prioritize solutions to address gaps and mitigate risks.
Present pilot project results and next steps. Create BCMS teams. Update and maintain BCMS documentation.
Use these tools and templates to assist in the creation of your BCP.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define BCP scope, objectives, and stakeholders.
Prioritize BCP efforts and level-set scope with key stakeholders.
1.1 Assess current BCP maturity.
1.2 Identify key business processes to include in scope.
1.3 Flowchart key business processes to identify business processes, dependencies, and alternatives.
BCP Maturity Scorecard: measure progress and identify gaps.
Business process flowcharts: review, optimize, and allow for knowledge transfer of processes.
Identify workarounds for common disruptions to day-to-day continuity.
Define RTOs and RPOs based on your BIA.
Set recovery targets based business impact, and illustrate the importance of BCP efforts via the impact of downtime.
2.1 Define an objective scoring scale to indicate different levels of impact.
2.2 Estimate the impact of downtime.
2.3 Determine acceptable RTO/RPO targets for business processes based on business impact.
BCP Business Impact Analysis: objective scoring scale to assess cost, goodwill, compliance, and safety impacts.
Apply the scoring scale to estimate the impact of downtime on business processes.
Acceptable RTOs/RPOs to dictate recovery strategy.
Create a recovery workflow.
Build an actionable, high-level, recovery workflow that can be adapted to a variety of different scenarios.
3.1 Conduct a tabletop exercise to determine current recovery procedures.
3.2 Identify and prioritize projects to close gaps and mitigate recovery risks.
3.3 Evaluate options for command centers and alternate business locations (i.e. BC site).
Recovery flow diagram – current and future state
Identify gaps and recovery risks.
Create a project roadmap to close gaps.
Evaluate requirements for alternate business sites.
Extend the results of the pilot BCP and implement governance.
Outline the actions required for the rest of your BCMS, and the required effort to complete those actions, based on the results of the pilot.
4.1 Summarize the accomplishments and required next steps to create an overall BCP.
4.2 Identify required BCM roles.
4.3 Create a plan to update and maintain your overall BCP.
Pilot BCP Executive Presentation
Business Continuity Team Roles & Responsibilities
3. Maintenance plan and BCP templates to complete the relevant documentation (BC Policy, BCP Action Items, Recovery Workflow, etc.)
None of us needs to look very far to find a reason to have an effective business continuity plan.
From pandemics to natural disasters to supply chain disruptions to IT outages, there’s no shortage of events that can disrupt your complex and interconnected business processes. How in the world can anyone build a plan to address all these threats?
Don’t try to boil the ocean. Use these tactics to streamline your BCP project and stay on track:
No one can predict every possible disruption, but by following the guidance in this blueprint, you can build a flexible continuity plan that allows you to withstand the threats your organization may face.
Research Director,
IT Infrastructure & Operations Practice
Info-Tech Research Group
Senior Research Analyst,
IT Infrastructure & Operations Practice
Info-Tech Research Group
IT leaders, because of their cross-functional view and experience with incident management and DR, are often asked to lead BCP efforts.
As an IT leader you have the skill set and organizational knowledge to lead a BCP project, but you must enable business leaders to own their department’s BCP practices and outputs. They know their processes and, therefore, their requirements to resume business operations better than anyone else.
A business continuity plan (BCP) consists of separate but related sub-plans, as illustrated below. This blueprint enables you to:
A plan to restore IT application and infrastructure services following a disruption.
Info-Tech’s disaster recovery planning blueprint provides a methodology for creating the IT DRP. Leverage this blueprint to validate and provide inputs for your IT DRP.
A set of plans to resume business processes for each business unit. This includes:
A plan to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage.
Info-Tech’s Implement Crisis Management Best Practices blueprint provides a framework for planning a response to any crisis, from health and safety incidents to reputational damage.
Back when transactions were recorded on paper and then keyed into the mainframe system later, it was easier to revert to deskside processes. There is very little in the way of paper-based processes anymore, and as a result, it is increasingly difficult to resume business processes without IT.
Think about your own organization. What IT system(s) are absolutely critical to business operations? While you might be able to continue doing business without IT, this requires regular preparation and training. It’s likely a completely offline process and won’t be a viable workaround for long even if staff know how to do the work. If your data center and core systems are down, technology-enabled workarounds (such as collaboration via mobile technologies or cloud-based solutions) could help you weather the outage, and may be more flexible and adaptable for day-to-day work.
The bottom line:
Technology is a critical dependency for business processes. Consider the role IT systems play as process dependencies and as workarounds as part of continuity planning.
BCP for Business Unit A:
Scope → Pilot BIA → Response Plan → Gap Analysis
→ Lessons Learned:
= Ongoing governance, testing, maintenance, improvement, awareness, and training.
By comparison, a traditional BCP approach takes much longer to mitigate risk:
Organizational Risk Assessment and Business Impact Analysis → Solution Design to Achieve Recovery Objectives → Create and Validate Response Plans
A charitable foundation for a major state university engaged Info-Tech to support the creation of their business continuity plan.
With support from Info-Tech analysts and the tools in this blueprint, they worked with their business unit stakeholders to identify recovery objectives, confirm recovery capabilities and business process workarounds, and address gaps in their continuity plans.
The outcome wasn’t a pandemic plan – it was a continuity plan that was applicable to pandemics. And it worked. Business processes were prioritized, gaps in work-from-home and business process workarounds had been identified and addressed, business leaders owned their plan and understood their role in it, and IT had clear requirements that they were able and ready to support.
“The work you did here with us was beyond valuable! I wish I could actually explain how ready we really were for this…while not necessarily for a pandemic, we were ready to spring into action, set things up, the priorities were established, and most importantly some of the changes we’ve made over the past few years helped beyond words! The fact that the groups had talked about this previously almost made what we had to do easy.“ -- VP IT Infrastructure
| Phases | Phase 1: Identify BCP Maturity and Document Process Dependencies | Phase 2: Conduct a BIA to Determine Acceptable RTOs and RPOs | Phase 3: Document the Recovery Workflow and Projects to Close Gaps | Phase 4: Extend the Results of the Pilot BCP and Implement Governance |
|---|---|---|---|---|
| Steps | 1.1 Assess current BCP maturity | 2.1 Define an objective impact scoring scale | 3.1 Determine current recovery procedures | 4.1 Consolidate BCP pilot insights to support an overall BCP project plan |
| 1.2 Establish the pilot BCP team | 2.2 Estimate the impact of downtime | 3.2 Identify and prioritize projects to close gaps | 4.2 Outline a business continuity management (BCM) program | |
| 1.3 Identify business processes, dependencies, and alternatives | 2.3 Determine acceptable RTO/RPO targets | 3.3 Evaluate BC site and command center options | 4.3 Test and maintain your BCP | |
| Tools and Templates | ||||
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
BCP Business Impact Analysis Tool: Conduct and document a business impact analysis using this document.
BCP Recovery Workflows Example: Model your own recovery workflows on this example.
BCP Project Roadmap: Use this tool to prioritize projects that can improve BCP capabilities and mitigate gaps and risks.
BCP Relocation Checklists: Plan for and manage a site relocation – whether to an alternate site or work from home.
Summarize your organization's continuity capabilities and objectives in a 15-page, easy-to-consume template.
This document consolidates data from the supporting documentation and tools to the right.
Download Info-Tech’s BCP Summary Document
Focus less on risk, and more on recovery
Avoid focusing on risk and probability analysis to drive your continuity strategy. You never know what might disrupt your business, so develop a flexible plan to enable business resumption regardless of the event.
Small teams = good pilots
Choose a small team for your BCP pilot. Small teams are better at trialing new techniques and finding new ways to think about problems.
Calculate downtime impact
Develop and apply a scoring scale to develop a more-objective assessment of downtime impact for the organization. This will help you prioritize recovery.
It’s not no, but rather not now…
You can’t address all the organization’s continuity challenges at once. Prioritize high value, low effort initiatives and create a long-term roadmap for the rest.
Show Value Now
Get to value quickly. Start with one business unit with continuity challenges, and a small, focused project team who can rapidly learn the methodology, identify continuity gaps, and define solutions that can also be leveraged by other departments right away.
Lightweight Testing Exercises
Outline recovery capabilities using lightweight, low risk tabletop planning exercises. Our research shows tabletop exercises increase confidence in recovery capabilities almost as much as live exercises, which carry much higher costs and risks.
Info-Tech members told us they save an average of $44,522 and 23 days by working with an Info-Tech analyst on BCP (source: client response data from Info-Tech's Measured Value Survey).
Why do members report value from analyst engagement?
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Diagnostic and consistent frameworks are used throughout all four options.
A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between eight to twelve calls over the course of four to six months.
Call 1: Scope requirements, objectives, and stakeholders. Identify a pilot BCP project.
Calls 2 - 4: Assess current BCP maturity. Create business process workflows, dependencies, alternates, and workarounds.
Calls 5 – 7: Create an impact scoring scale and conduct a BIA. Identify acceptable RTO and RPO.
Calls 8 – 9: Create a recovery workflow based on tabletop planning.
Call 10: Summarize the pilot results and plan next steps. Define roles and responsibilities. Make the case for a wider BCP program.
Contact your account representative for more information.
workshops@infotech.com | 1-888-670-8889
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
| Identify BCP Maturity, Key Processes, and Dependencies | Conduct a BIA to Determine Acceptable RTOs and RPOs | Document the Current Recovery Workflow and Projects to Close Gaps | Identify Remaining BCP Documentation and Next Steps | Next Steps and Wrap-Up (offsite) | |
| Activities |
1.1 Assess current BCP maturity. 1.2 Identify key business processes to include in scope. 1.3 Create a flowchart for key business processes to identify business processes, dependencies, and alternatives. |
2.1 Define an objective scoring scale to indicate different levels of impact. 2.2 Estimate the impact of a business disruption on cost, goodwill, compliance, and health & safety. 2.3 Determine acceptable RTOs/RPOs for selected business processes based on business impact. |
3.1 Review tabletop planning – what is it, how is it done? 3.2 Walk through a business disruption scenario to determine your current recovery timeline, RTO/RPO gaps, and risks to your ability to resume business operations. 3.3 Identify and prioritize projects to close RTO/RPO gaps and mitigate recovery risks. |
4.1 Assign business continuity management (BCM) roles to govern BCP development and maintenance, as well as roles required to execute recovery. 4.2 Identify remaining documentation required for the pilot business unit and how to leverage the results to repeat the methodology for remaining business units. 4.3 Workshop review and wrap-up. |
5.1 Finalize deliverables for the workshop. 5.2 Set up review time for workshop outputs and to discuss next steps. |
| Deliverables |
|
|
|
|
|
1.1 Assess Current BCP Maturity
1.2 Establish the pilot BCP team
1.3 Identify business processes, dependencies, and alternatives
Define the scope for the BCP project: assess the current state of the plan, create a pilot project team and pilot project charter, and map the business processes that will be the focus of the pilot.
This step will walk you through the following activities:
This step involves the following participants:
You'll use the following tools & templates:
Establish current BCP maturity using Info-Tech’s ISO 22301-aligned BCP Maturity Scorecard.
This blueprint primarily addresses the first four sections in the scorecard, which align with the creation of the core components of your business continuity plan.
Info-Tech’s maturity scorecard is aligned with ISO 22301, the international standard that describes the key elements of a functioning business continuity management system or program – the overarching set of documents, practices, and controls that support the ongoing creation and maintenance of your BCP. A fully functional BCMS goes beyond business continuity planning to include crisis management, BCP testing, and documentation management.
Audit tools tend to treat every bullet point in ISO 22301 as a separate requirement – which means there’s almost 400 lines to assess. Info-Tech’s BCP Maturity Scorecard has synthesized key requirements, minimizing repetition to create a high-level self-assessment aligned with the standard.
A high score is a good indicator of likely success with an audit.
Download Info-Tech's BCP Maturity Scorecard
"The fact that this aligns with ISO is huge." - Dr. Bernard Jones MBCI, CBCP
This step will walk you through the following activities:
This step involves the following participants:
In this step, you’ll use these tools and templates:
Assign roles and responsibilities for the BCP pilot project. Set milestones and timelines for the pilot.
Though IT is a critical dependency for most processes, IT shouldn’t own the business continuity plan. IT should be an internal BCP process consultant, and each business unit must own their plan.
IT should be an internal BCP consultant.
Why shouldn’t IT own the plan?
Info-Tech Insight
A goal of the pilot is to seed success for further planning exercises. This is as much about demonstrating the value of continuity planning to the business unit, and enabling them to own it, as it is about implementing the methodology successfully.
Outline roles and responsibilities on the pilot team using a “RACI” exercise. Remember, only one party can be ultimately accountable for the work being completed.
| Board | Executive Team | BCP Executive Sponsor | BCP Team Leader | BCP Coordinator | Pilot Bus. Unit Manager | Expert Bus. Unit Staff | IT Manager | |
|---|---|---|---|---|---|---|---|---|
| Communicate BCP project status | I | I | I | A | R | C | C | I |
| Assign resources to pilot BCP project | A | R | C | R | C | R | ||
| Conduct continuity planning activities | I | A/R | R | R | R | R | ||
| Create pilot BCP deliverables | I | A | R | R | C | C | C | |
| Manage BCP documentation | I | A | C | R | I | C | C | |
| Integrate results into BCMS | I | I | A | R | R | I | C | C |
| Create overall BCP project plan | I | I | A | R | C | C |
R: Responsible for doing the work.
A: Accountable to ensure the activity/work happens.
C: Consulted prior to decision or action.
I: Informed of the decision/action once it’s made.
"Large teams excel at solving problems, but it is small teams that are more likely to come up with new problems for their more sizable counterparts to solve." – Wang & Evans, 2019
Small teams tend to be better at trialing new techniques and finding new ways to think about problems, both of which are needed for a BCP pilot project.
Many organizations begin their BCP project with a target business unit in mind. It’s still worth establishing whether this business unit meets the criteria below.
Good candidates for a pilot project:
These short descriptions establish the functions, expectations, and responsibilities of each role at a more granular level.
The Board and executives have an outsized influence on the speed at which the project can be completed. Ensure that communication with these stakeholders is clear and concise. Avoid involving them directly in activities and deliverable creation, unless it’s required by their role (e.g. as a business unit manager).
| Project Role | Description |
|---|---|
| Board & Executive Team |
|
| Executive Sponsor |
|
| Pilot Business Unit Manager |
|
| BCP Coordinator |
|
| Expert Business Unit Staff |
|
| IT Manager |
|
| Other Business Unit Managers |
|
A skilled and committed coordinator is critical to building an effective and durable BCP.
Structure the role of the BCP Coordinator
The BCP Coordinator works with the pilot business unit as well as remaining business units to provide continuity and resolve discrepancies as they come up between business units.
Specifically, this role includes:
"We found it necessary to have the same person work with each business unit to pass along lessons learned and resolve contingency planning conflicts for common dependencies." – Michelle Swessel, PM and IT Bus. Analyst, Wisconsin Compensation Rating Bureau (WCRB)
This step will walk you through the following activities:
This step involves the following participants:
You'll use the following tools & templates:
Documented workflows, process dependencies, and workarounds when dependencies are unavailable.
Process review often results in discovering informal processes, previously unknown workarounds or breakdowns, shadow IT, or process improvement opportunities.
Note: A more in-depth analysis will be conducted later to refine priorities. The goal here is a high-level order of priority for the next steps in the planning methodology (identify business processes and dependencies).
Download Info-Tech’s Business Process Workflows Example
Policies and procedures manuals, if they exist, are often out of date or incomplete. Use these as a starting point, but don’t stop there. Identify the go-to staff members who are well versed in how a process works.
2.1 Define an objective impact scoring scale
2.2 Estimate the impact of downtime
2.3 Determine acceptable RTO/RPO targets
Assess the impact of business process downtime using objective, customized impact scoring scales. Sort business processes by criticality and by assigning criticality tiers, recovery time, and recovery point objectives.
This step will walk you through the following activities:
This step involves the following participants:
In this step, you’ll use these tools and templates:
Define an impact scoring scale relevant to your business, which allows you to more-objectively assess the impact of business process downtime.
The activities in Phase 2 will help you set appropriate, acceptable recovery objectives based on the business impact of process downtime.
For example:
Create Impact Scoring Scales→Assess the impact of process downtime→Review overall impact of process downtime→Set Criticality Tiers→Set Recovery Time and Recovery Point Objectives
Work with the Business Unit Manager and Executive Sponsor to identify the maximum impact in each category to the entire business. Use a worst-case scenario to estimate the maximum for each scale. In the future, you can use this scoring scale to estimate the impact of downtime for other business units.
Cost estimates are like hand grenades and horseshoes: you don’t need to be exact. It’s much easier to get input and validation from other stakeholders when you have estimates. Even weak estimates are far better than a blank sheet.
Use just the impact scales that are relevant to your organization.
This step involves the following participants:
In this step, you’ll use these tools and templates:
Develop an objective view of the impact of downtime for key business processes.
Example: Highest total Goodwill, Compliance, and Safety impact score is 18.
| Tier | Score Range | % of high score |
|---|---|---|
| Tier 1 - Gold | 9-18 | 50-100% |
| Tier 2 - Silver | 5 to 9 | 25-50% |
| Tier 3 - Bronze | 0 to 5 | 0-25% |
This step involves the following participants:
In this step, you’ll use these tools and templates:
Right-size recovery objectives based on business impact.
The impact of downtime for most business processes tends to look something like the increasing impact curve in the image to the right.
In the moments after a disruption, impact tends to be minimal. Imagine, for example, that your organization was suddenly unable to pay its suppliers (don’t worry about the reason for the disruption, for the moment). Chances are, this disruption wouldn’t affect many payees if it lasted just a few minutes, or even a few hours. But if the disruption were to continue for days, or weeks, the impact of downtime would start to spiral out of control.
In general, we want to target recovery somewhere between the point where impact begins, and the point where impact is intolerable. We want to balance the impact of downtime with the investment required to make processes more resilient.
Account for hard copy files as well as electronic data. If that information is lost, is there a backup? BCP can be the driver to remove the last resistance to paperless processes, allowing IT to apply appropriate data protection.
Set recovery time objectives and recovery point objectives in the “Debate Space”
RTOs and RPOs are business-defined, impact-aligned objectives that you may not be able to achieve today. It may require significant investments of time and capital to enable the organization to meet RTO and RPO.
Set a range for RTO for each Tier.
| Tier | RTO |
|---|---|
| Tier 1 | 4 hrs- 24 hrs |
| Tier 2 | 24 hrs - 72 hrs |
| Tier 3 | 72 hrs - 120 hrs |
3.1 Determine current recovery procedures
3.2 Identify and prioritize projects to close gaps
3.3 Evaluate business continuity site and command center options
Outline business recovery processes. Highlight gaps and risks that could hinder business recovery. Brainstorm ideas to address gaps and risks. Review alternate site and business relocation options.
This step will walk you through the following activities:
This step involves the following participants:
In this step, you’ll use these tools and templates:
Establish steps required for business recovery and current recovery timelines.
Identify risks & gaps that could delay or obstruct an effective recovery.
Step 2 - 2 hours
Establish command center.
Step 2: Risks
Step 2: Gaps
A good scenario is one that helps the group focus on the goal of tabletop planning – to discuss and document the steps required to recover business processes. We suggest choosing a scenario for your first exercise that:
An example: a gas leak at company HQ that requires the area to be cordoned off and power to be shut down. The business must resume processes from another location without access to materials, equipment, or IT services at the primary location.
A plan that satisfies the gas leak scenario should meet the needs of other scenarios that affect your normal workspace. Then use BCP testing to validate that the plan meets a wider range of incidents.
Notification
How will you be notified of a disaster event? How will this be escalated to leadership? How will the team responsible for making decisions coordinate (if they can’t meet on-site)? What emergency response plans are in place to protect health and safety? What additional steps are involved if there’s a risk to health and safety?
Assessment
Who’s in charge of the initial assessment? Who may need to be involved in the assessment? Who will coordinate if multiple teams are required to investigate and assess the situation? Who needs to review the results of the assessment, and how will the results of the assessment be communicated (e.g. phone bridge, written memo)? What happens if your primary mode of communication is unavailable (e.g. phone service is down)?
Declaration
Who is responsible today for declaring a disaster and activating business continuity plans? What are the organization’s criteria for activating continuity plans, and how will BCP activation be communicated? Establish a crisis management team to guide the organization through a wide range of crises by Implementing Crisis Management Best Practices.
Do the following:
Tabletop planning is most effective when you keep it simple.
Create one recovery workflow for all scenarios.
Traditional planning calls for separate plans for different “what-if” scenarios. This is challenging not just because it’s a lot more documentation – and maintenance – but because it’s impossible to predict every possible incident. Use the template, aligned to recovery of process dependencies, to create one recovery workflow for each business unit that can be used in and tested against different scenarios.
Download Info-Tech’s BCP Recovery Workflow Example
"We use flowcharts for our declaration procedures. Flowcharts are more effective when you have to explain status and next steps to upper management." – Assistant Director-IT Operations, Healthcare Industry
"Very few business interruptions are actually major disasters. It’s usually a power outage or hardware failure, so I ensure my plans address ‘minor’ incidents as well as major disasters."- BCP Consultant
Add the following data to your copy of the BCP Business Impact Analysis Tool.
Operating at a minimum acceptable functional level may not be feasible for more than a few days or weeks. Develop plans for immediate continuity first, then develop further plans for long-term continuity processes as required. Recognize that for longer term outages, you will evolve your plans in the crisis to meet the needs of the situation.
Work from and update the soft copy of your recovery workflow.
Info-Tech Insight
Remember that health and safety risks must be dealt with first in a crisis. The business unit recovery workflow will focus on restoring business operations after employees are no longer at risk (e.g. the risk has been resolved or employees have been safely relocated). See Implement Crisis Management Best Practices for ideas on how to respond to and assess a wide range of crises.
For some organizations, it’s not practical or possible to invest in the redundancy that would be necessary to recover in a timely manner from certain major events.
Leverage existing risk management practices to identify key high impact events that could present major business continuity challenges that could cause catastrophic disruptions to facility, IT, staffing, suppliers, or equipment. If you don’t have a risk register, review the scenarios on the next slide and brainstorm risks with the working group.
Work through tabletop planning to identify how you might work through an event like this, at a high level. In step 3.2, you can estimate the effort, cost, and benefit for different ideas that can help mitigate the damage to the business to help decision makers choose between investment in mitigation or accepting the risk.
Document any scenarios that you identify as outside the scope of your continuity plans in the “Scope” section of your BCP Summary document.
For example:
A single location manufacturing company is creating a BCP.
The factory is large and contains expensive equipment; it’s not possible to build a second factory for redundancy. If the factory is destroyed, operations can’t be resumed until the factory is rebuilt. In this case, the BCP outlines how to conduct an orderly business shutdown while the factory is rebuilt.
Contingency planning to resume factory operations after less destructive events, as well as a BCP for corporate services, is still practical and necessary.
| Scenario Type | Considerations |
|---|---|
| Local hazard (gas leak, chemical leak, criminal incident, etc.) |
|
| Equipment/building damage (fire, roof collapse, etc.) |
|
| Regional natural disasters |
|
| Supplier failure (IT provider outage, disaster at supplier, etc.) |
|
| Staff (lottery win, work stoppage, pandemic/quarantine) |
|
This step will walk you through the following activities:
This step involves the following participants:
In this step, you’ll use these tools and templates:
Identify and prioritize projects and action items that can improve business continuity capabilities.
Try to avoid debates about feasibility at this point. The goal is to get ideas on the board.
When you’re brainstorming solutions to problems, don’t stop with the first idea, even if the solution seems obvious. The first idea isn’t always the best or only solution – other ideas can expand on it and improve it.
Step 4: No formal process to declare a disaster and invoke business continuity.
Step 7: Alternate site could be affected by the same regional event as the main office.
Step 12: Need to confirm supplier service-level agreements (SLAs).
With COVID-19, most organizations have experience with mass work-from-home.
Review the following case studies. Do they reflect your experience during the COVID-19 pandemic?
Consider where your own work-from-home plans fell short.
People
→
Site & Facilities
→
External Services & Suppliers
→
Technology & Physical Assets
→
This step will walk you through the following activities:
This step involves the following participants:
In this step, you’ll use these tools and templates:
Identify requirements for an alternate business site.
"There are horror stories about organizations that assumed things about their alternate site that they later found out they weren’t true in practice." – Dr. Bernard Jones, MBCI CBCP
If you choose a shared location as a BCP site, a regional disaster may put you in competition with other tenants for space.
For many organizations, a dedicated command center (TVs on the wall, maps and charts in filing cabinets) isn’t necessary. A conference bridge and collaboration tools allowing everyone to work remotely can be an acceptable offsite command center as long as digital options can meet your command center requirements.
Leverage the methodology and tools in this blueprint to define your return to normal (repatriation) procedures:
For more on supporting a business move back to the office from the IT perspective, see Responsibly Resume IT Operations in the Office
4.1 Consolidate BCP pilot insights to support an overall BCP project plan
4.2 Outline a business continuity management (BCM) program
4.3 Test and maintain your BCP
Summarize and consolidate your initial insights and documentation. Create a project plan for overall BCP. Identify teams, responsibilities, and accountabilities, and assign documentation ownership. Integrate BCP findings in DR and crisis management practices. Set guidelines for testing, plan maintenance, training, and awareness.
Participants
This step will walk you through the following activities:
This step involves the following participants:
In this step, you’ll use these tools and templates:
Present results from the pilot BCP, and outline how you’ll use the pilot process with other business units to create an overall continuity program.
Structure the overall BCP program.
The BCP Summary document is the capstone to business unit continuity planning exercises. It consolidates your findings in a short overview of your business continuity requirements, capabilities, and maintenance procedures.
Info-Tech recommends embedding hyperlinks within the Summary to the rest of your BCP documentation to allow the reader to drill down further as needed. Leverage the following documents:
The same methodology described in this blueprint can be repeated for each business unit. Also, many of the artifacts from the BCP pilot can be reused or built upon to give the remaining business units a head start. For example:
You may need to create some artifacts that are site specific. For example, relocation plans or emergency plans may not be reusable from one site to another. Use your judgement to reuse as much of the templates as you can – similar templates simplify audit, oversight, and plan management.
Adjust the pilot charter to answer the following questions:
As with the pilot, choose a business unit, or business units, where BCP will have the greatest impact and where further BCP activities will have the greatest likelihood of success. Prioritize business units that are critical to many areas of the business to get key results sooner.
Work with one business unit at a time if:
Work with several business units at the same time if:
This step will walk you through the following activities:
This step involves the following participants:
In this step, you’ll use these tools and templates:
Document BCP teams, roles, and responsibilities.
Document contact information, alternates, and succession rules.
A BCM program should:
Develop a Business Continuity Management Program
Phase 4 of this blueprint will focus on the following elements of a business continuity management program:
Schedule a call with an Info-Tech Analyst for help building out these core elements, and for advice on developing the rest of your BCM program.
BC management teams (including the secondary teams such as the emergency response team) have two primary roles:
Crisis leaders require strong crisis management skills:
Collectively, the team must include a broad range of expertise as well as strong planning skills:
Note: For specific BC team roles and responsibilities, including key resources such as Legal, HR, and IT SMEs required to prepare for and execute crisis management plans, see Implement Crisis Management Best Practices.
BCM Team: Govern business continuity, DR, and crisis management planning. Support the organization’s response to a crisis, including the decision to declare a disaster or emergency.
Emergency Response Teams: Assist staff and BC teams during a crisis, with a focus first on health and safety. There’s usually one team per location. Develop and maintain emergency response plans.
Emergency Response Teams: Assist staff and BC teams during a crisis, with a focus first on health and safety. There’s usually one team per location. Develop and maintain emergency response plans.
IT Disaster Recovery Team: Manage the recovery of IT services and data following an incident. Develop and maintain the IT DRP.
Business Unit BCP Teams: Coordinate business process recovery at the business unit level. Develop and maintain business unit BCPs.
“Planning Mode”
Executive Team → BC Management Team ↓
“Crisis Mode”
Executive Team ↔Crisis Management Team↓ ↔ Emergency Response Teams (ERT)
For more details on specific roles to include on these teams, as well as more information on crisis management, review Info-Tech’s blueprint, Implement Crisis Management Best Practices.
Track teams, roles, and contacts in this template. It is pre-populated with roles and responsibilities for business continuity, crisis management, IT disaster recovery, emergency response, and vendors and suppliers critical to business operations.
Track contact information in this template only if you don’t have a more streamlined way of tracking it elsewhere.
Download Info-Tech’s Business Continuity Teams and Roles Tool
Suppliers and vendors might include:
Supplier RTOs and RPOs should align with the acceptable RTOs and RPOs defined in the BIA. Where they do not, explore options for improvement.
Confirm the following:
Your BCP isn’t any one document. It’s multiple documents that work together.
Continue to work through any additional required documentation. Build a repository where master copies of each document will reside and can be updated as required. Assign ownership of document management to someone with an understanding of the process (e.g. the BCP Coordinator).
| Governance | Recovery | ||
|---|---|---|---|
| BCMS Policy | BCP Summary | Core BCP Recovery Workflows | |
| Business Process Workflows | Action Items & Project Roadmap | BCP Recovery Checklists | |
| BIA | Teams, Roles, Contact Information | BCP Business Process Workarounds and Recovery Checklists | |
| BCP Maturity Scorecard | BCP Project Charter | Additional Recovery Workflows | |
| Business Unit Prioritization Tool | BCP Presentation | ||
Recovery documentation has a different audience, purpose, and lifecycle than governance documentation, and keeping the documents separate can help with content management. Disciplined document management keeps the plan current and accessible.
Use the following BCP outputs to inform your DRP:
| PCP Outputs | DRP Activities | |
|---|---|---|
| Business processes defined | Identify critical applications | |
|
Dependencies identified:
|
↗ → |
Identify IT dependencies:
|
|
Recovery objectives defined:
|
→ |
Identify recovery objectives:
|
|
Projects identified to close gaps:
|
→ |
Identify projects to close gaps:
|
Info-Tech Insight
Don’t think of inconsistencies between your DRP and BCP as a problem. Discrepancies between the plans are part of the discovery process, and they’re an opportunity to have a conversation that can improve alignment between IT service capabilities and business needs. You should expect that there will be discrepancies – managing discrepancies is part of the ongoing process to refine and improve both plans.
BC/DR Planning Workflow
1. Collect BCP outputs that impact IT DRP (e.g. technology RTOs/RPOs).
2. As BCPs are done, BCP Coordinator reviews outputs with IT DRP Management Team.
3. Use the RTOs/RPOs from the BCPs as a starting point to determine IT recovery plans.
4. Identify investments required to meet business-defined RTOs/RPOs, and validate with the business.
5. Create a DR technology roadmap to meet validated RTOs/RPOs.
6. Review and update business unit BCPs to reflect updated RTOs/RPOs.
Shadow IT can be a symptom of larger service support issues. There should be a process for requesting and tracking non-standard services from IT with appropriate technical, security, and management oversight.
Assign the BCP Coordinator the task of creating a master list of BC projects, and then work with the BC management team to review and reprioritize this list, as described below:
Improving business continuity capabilities is a marathon, not a sprint. Change for the better is still change and introduces risk – massive changes introduce massive risk. Incremental changes help minimize disruption. Use Info-Tech research to deliver organizational change.
"Developing a BCP can be like solving a Rubik’s Cube. It’s a complex, interdepartmental concern with multiple and sometimes conflicting objectives. When you have one side in place, another gets pushed out of alignment." – Ray Mach, BCP Expert
This step will walk you through the following activities:
This step involves the following participants:
In this step, you’ll use these tools and templates:
Create a plan to maintain the BCP.
Mastery comes through practice and iteration. Iterating on and testing your plan will help you keep up to date with business changes, identify plan improvements, and help your organization’s employees develop a mindset of continuity readiness. Maintenance drives continued success; don’t let your plan become stagnant, messy, and unusable.
Your BCM program should structure BCP reviews and updates by answering the following:
At a minimum, review goals should include:
Who leads reviews and updates documents?
The BCP Coordinator is likely heavily involved in facilitating reviews and updating documentation, at least at first. Look for opportunities to hand off document ownership to the business units over time.
How do we track reviews, tests, and updates?
Keep track of your good work by keeping a log of document changes. If you don’t have one, you can use the last tab on the BCP-DRP Maintenance Checklist.
When do we review the plan?
This tool helps you set a schedule for plan update activities, identify document and exercise owners, and log updates for audit and governance purposes.
Info-Tech Insight
Everyone gets busy. If there’s a meeting you can schedule months in advance, schedule it months in advance! Then send reminders closer to the date. As soon as you’re done the pilot BCP, set aside time in everyone’s calendar for your first review session, whether that’s three months, six months, or a year from now.
Use this template to:
If you require more detail to support your recovery procedures, you can use this template to:
Download Info-Tech’s BCP Process Workarounds & Recovery Checklists Template
Use this template to:
Download Info-Tech’s BCP Notification, Assessment, and Disaster Declaration Plan template
Use this template to:
These HR research resources live on the website of Info-Tech’s sister company, McLean & Company. Contact your Account Manager to gain access to these resources.
This blueprint outlined:
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.
Contact your account representative for more information.
workshops@infotech.com
1-888-670-8889
Dr. Bernard A. Jones, MBCI, CBCP
Professor and Continuity Consultant Berkeley College
Dr. Jones is a professor at Berkeley College within the School of Professional Studies teaching courses in Homeland Security and Emergency Management. He is a member of the National Board of Directors for the Association of Continuity Professionals (ACP) as well as the Information & Publications Committee Chair for the Garden State Chapter of the ACP. Dr. Jones earned a doctorate degree in Civil Security Leadership, Management & Policy from New Jersey City University where his research focus was on organizational resilience.
Kris L. Roberson
Disaster Recovery Analyst Veterans United Home Loans
Kris Roberson is the Disaster Recovery Analyst for Veterans United Home Loans, the #1 VA mortgage lender in the US. Kris oversees the development and maintenance of the Veterans United Home Loans DR program and leads the business continuity program. She is responsible for determining the broader strategies for DR testing and continuity planning, as well as the implementation of disaster recovery and business continuity technologies, vendors, and services. Kris holds a Masters of Strategic Leadership with a focus on organizational change management and a Bachelors in Music. She is a member of Infragard, the National Association of Professional Women, and Sigma Alpha Iota, and holds a Project+ certification.
Trevor Butler
General Manager of Information Technology City of Lethbridge
As the General Manager of Information Technology with the City of Lethbridge, Trevor is accountable for providing strategic management and advancement of the city’s information technology and communications systems consistent with the goals and priorities of the corporation while ensuring that corporate risks are appropriately managed. He has 15+ years of progressive IT leadership experience, including 10+ years with public sector organizations. He holds a B.Mgt. and PMP certification along with masters certificates in both Project Management and Business Analysis.
Robert Miller
Information Services Director Witt/Kieffer
Bob Miller is the Information Services Director at Witt/Kieffer. His department provides end-user support for all company-owned devices and software for Oak Brook, the regional offices, home offices, and traveling employees. The department purchases, implements, manages, and monitors the infrastructure, which includes web hosting, networks, wireless solutions, cell phones, servers, and file storage. Bob is also responsible for the firm’s security planning, capacity planning, and business continuity and disaster preparedness planning to ensure that the firm has functional technology to conduct business and continue business growth.
Create a Right-Sized Disaster Recovery Plan
Close the gap between your DR capabilities and service continuity requirements.
Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind
Go beyond satisfying auditors to drive process improvement, consistent IT operations, and effective knowledge transfer.
Select the Optimal Disaster Recovery Deployment Model
Determine which deployment models, including hybrid solutions, best meet your DR requirements.
“Business Continuity Planning.” IT Examination HandBook. The Federal Financial Institution Examination Council (FFIEC), February 2015. Web.
“Business Continuity Plans and Emergency Contact Information.” FINRA, 12 February 2015. Web.
“COBIT 5: A Business Framework for the Governance and Management of Enterprise IT.” ISACA, n.d. Web.
Disaster Resource GUIDE. Emergency Lifeline Corporation, n.d. Web.
“DR Rules & Regulations.” Disaster Recovery Journal, March 2017. Web.
“Federal Information Security Management Act (FISMA).” Homeland Security, 2014. Web.
FEMA. “Planning & Templates.” FEMA, n.d. Web.
“FINRA-SEC-CFTC Joint Advisory (Regulatory Notice 13-25).” FINRA, August 2013. Web.
Gosling, Mel and Andrew Hiles. “Business Continuity Statistics: Where Myth Meets Fact.” Continuity Central, 24 April 2009. Web.
Hanwacker, Linda. “COOP Templates for Success Workbook.” The LSH Group, 2016. Web.
Potter, Patrick. “BCM Regulatory Alphabet Soup – Part Two.” RSA Link, 28 August 2012. Web.
The Good Practice Guidelines. Business Continuity Institute, 2013. Web.
Wang, Dashun and James A. Evans. “When Small Teams are Better than Big Ones.” Harvard Business Review, 21 February 2019. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify the KPIs that matter to your organization’s goals.
Use the IT Management Dashboard on the Info-Tech website to display your chosen KPIs.
Use the review of your KPIs to build an action plan to drive performance.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine the KPIs that matter to your organization.
Identify organizational goals
Identify IT goals and their organizational goal alignment
Identify business pain points
1.1 Identify organizational goals.
1.2 Identify IT goals and organizational alignment.
1.3 Identify business pain points.
List of goals and pain points to create KPIs for
Learn how to configure and use the IT Management Dashboard.
Configured IT dashboard
Initial IT scorecard report
2.1 Review metrics and KPI best practices.
2.2 Use the IT Metrics Library.
2.3 Select the KPIs for your organization.
2.4 Use the IT Management Dashboard.
Definition of KPIs to be used, data sources, and ownership
Configured IT dashboard
Learn how to review and plan actions based on the KPIs.
Lead KPI review to actions to improve performance
3.1 Create the scorecard report.
3.2 Interpret the results of the dashboard.
3.3 Use the IT Metrics Library to review suggested actions.
Initial IT scorecard report
Action plan with initial actions
Use your KPIs to drive performance.
Improve your metrics program to drive effectiveness
4.1 Develop your action plan.
4.2 Execute the plan and tracking progress.
4.3 Develop new KPIs as your practice matures.
Understanding of how to develop new KPIs using the IT Metrics Library
Ensure all documentation and plans are complete.
Documented next steps
5.1 Complete IT Metrics Library documentation.
5.2 Document decisions and next steps.
IT Metrics Library
Action plan
It’s difficult for CIOs and other top-level leaders of IT to know if everything within their mandate is being managed effectively. Gaining visibility into what’s happening on the front lines without micromanaging is a challenge most top leaders face.
Understanding Info-Tech’s Management and Governance Framework of processes that need to be managed and being able to measure what’s important to their organization's success can give leaders the ability to focus on their key responsibilities of ensuring service effectiveness, enabling increased productivity, and creating the ability for their teams to innovate.
Even if you know what to measure, the measurement alone will lead to minimal improvements. Having the right methods in place to systematically collect, review, and act on those measurements is the differentiator to driving up the maturity of your IT organization.
The tools in this blueprint can help you identify what to measure, how to review it, and how to create effective plans to improve performance.
Tony Denford
Research Director, Info-Tech Research Group
Info-Tech Insight
Mature your IT department by aligning your measures with your organizational goals. Acting early when your KPIs deviate from the goals leads to improved performance.
Build your dashboard quickly using the toolset in this research and move to improvement actions as soon as possible.

Productivity increased by 30%
Fire/smoke incidents decreased by 25% (high priority)
Average work request response time reduced by 64%
Savings of $1.6 million in the first year
(CFI, 2013)
Don’t get overwhelmed by the number of things you can measure. It can take some trial and error to find the measures that best indicate the health of the process.
35% - Only 35% of governing bodies review data at each meeting. (Committee of University Chairs, 2008)
Poor data can lead to incorrect conclusions, limit analysis, and undermine confidence in the value of your dashboard.
Achieving perfect data is extremely time consuming and may not add much value. It can also be an excuse to avoid getting started with metrics and analytics.
Data quality is a struggle for many organizations. Consider how much uncertainty you can tolerate in your analysis and what would be required to improve your data quality to an acceptable level. Consider cost, technological resources, people resources, and time required.
Info-Tech Insight
Analytics are only as good as the data that informs it. Aim for just enough data quality to make informed decisions without getting into analysis paralysis.
Tying KPIs and metrics to performance often leads to undesired behavior. An example of this is the now infamous Wells Fargo cross-selling scandal, in which 3.5 million credit card and savings accounts were opened without customers’ consent when the company incented sales staff to meet cross-selling targets.
Although this is an extreme example, it’s an all-too-common phenomenon.
A focus on the speed of closure of tickets often leads to shortcuts and lower-quality solutions.
Tying customer value to the measures can align the team on understanding the objective rather than focusing on the measure itself, and the team will no longer be able to ignore the impact of their actions.
Surrogation is a phenomenon in which a measure of a behavior replaces the intent of the measure itself. People focus on achieving the measure instead of the behavior the measure was intended to drive.
| The Threefold Role of the IT Executive | Core CIO Objectives |
|---|---|
| IT Organization - Manager | A - Optimize the Effectiveness of the IT Organization |
| Enterprise - Partner | B - Boost the Productivity of the Enterprise |
| Market - Innovator | C - Enable Business Growth Through Technology |
Low-Maturity Metrics Program
Trailing indicators measure the outcomes of the activities of your organization. Hopefully, the initiatives and activities are aligned with the organizational goals.
High-Maturity Metrics Program
The core CIO objectives align with the organizational goals, and teams define leading indicators that show progress toward those goals. KPIs are reviewed often and adjustments are made to improve performance based on the leading indicators. The results are improved outcomes, greater transparency, and increased predictability.

Periodically: As appropriate, review the effectiveness of the KPIs and adjust as needed.
Frequently: At least once per month, but the more frequent, the more agility your organization will have.

| 1. Choose the KPIs | 2. Build the Dashboard | 3. Create the Action Plan | |
|---|---|---|---|
| Phase Steps |
|
|
|
| Phase Outcomes | A defined and documented list of the KPIs that will be used to monitor each of the practice areas in your IT mandate | A configured dashboard covering all the practice areas and the ability to report performance in a consistent and visible way | An action plan for addressing low-performing indicators |
Don’t just measure things because you can. Change what you measure as your organization becomes more mature.
Measure things that will resolve pain points or drive you toward your goals.
Look for indicators that show the health of the practice, not just the results.
Ease of use will determine the success of your metrics program, so keep it simple to create and review the indicators.
If indicators are showing suboptimal performance, develop an action plan to drive the indicator in the right direction.
Act early and often.
Ensure you understand what’s valued and measure whether the value is being produced. Let front-line managers focus on tactical measures and understand how they are linked to value.
Determine what action will lead to the desired result and measure if the action is being performed. It’s better to predict outcomes than react to them.
Customize the KPIs for your organization using the IT Metrics Library
Keep track of the actions that are generated from your KPI review
The IT Overall Scorecard gives a holistic view of the performance of each IT function
Keeping track of the number of actions identified and completed is a low overhead measure. Tracking time or money saved is higher overhead but also higher value.

Industry: Government Services
Source: Info-Tech analyst experience
A newly formed application support team with service desk responsibilities was becoming burned out due to the sheer volume of work landing on their desks. The team was very reactive and was providing poor service due to multiple conflicting priorities.
To make matters worse, there was a plan to add a major new application to the team’s portfolio.
The team began to measure the types of work they were busy doing and then assessed the value of each type of work.
The team then problem solved how they could reduce or eliminate their low-value workload.
This led to tracking how many problems were being resolved and improved capabilities to problem solve effectively.
Upon initial data collection, the team was performing 100% reactive workload. Eighteen months later slightly more than 80% of workload was proactive high-value activities.
The team not only was able to absorb the additional workload of the new application but also identified efficiencies in their interactions with other teams that led to a 100% success rate in the change process and a 92% decrease in resource needs for major incidents.
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
Call #1: Scope dashboard and reporting needs.
Call #2: Learn how to use the IT Metrics Library to select your metrics.
Call #3: Set up the dashboard.
Call #4: Capture data and produce the report.
Phase 3 – Create the Action Plan
Call #5: Review the data and use the metrics library to determine actions.
Call #6: Improve the KPIs you measure.
A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 5 and 8 calls over the course of 2 to 3 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
| Identify What to Measure | Configure the Dashboard Tool | Review and Develop the Action Plan | Improve Your KPIs | Compile Workshop Output | |
| Activities | 1.1 Identify organizational goals. 1.2 Identify IT goals and organizational alignment. 1.3 Identify business pain points. |
2.1 Determine metrics and KPI best practices. 2.2 Learn how to use the IT Metrics Library. 2.3 Select the KPIs for your organization. 2.4 Configure the IT Management Dashboard. |
3.1 Create the scorecard report. 3.2 Interpret the results of the dashboard. 3.3 Use the IT Metrics Library to review suggested actions. |
4.1 Develop your action plan. 4.2 Execute the plan and track progress. 4.3 Develop new KPIs as your practice matures. |
5.1 Complete the IT Metrics Library documentation. 5.2 Document decisions and next steps. |
| Outcomes | 1. List of goals and pain points that KPIs will measure | 1. Definition of KPIs to be used, data sources, and ownership 2. Configured IT dashboard |
1. Initial IT scorecard report 2. Action plan with initial actions |
1. Understanding of how to develop new KPIs using the IT Metrics Library | 1. IT Metrics Library documentation 2. Action plan |
Phase 1
1.1 Review Available KPIs
1.2 Select KPIs for Your Org.
1.3 Identify Data Sources and Owners
Phase 2
2.1 Understand the IT Management Dashboard
2.2 Build and Review the KPIs
Phase 3
3.1 Prioritize Low-Performing Indicators
3.2 Review Suggested Actions
3.3 Develop the Action Plan
This phase will walk you through the following activities:
Reviewing and selecting the KPIs suggested in the IT Metrics Library.
Identifying the data source for the selected KPI and the owner responsible for data collection.
This phase involves the following participants:
1.1.1 Download the IT Metrics Library and review the KPIs for each practice area.
Step 1.1 – Review Available KPIs
Step 1.2 – Select KPIs for Your Org.
Step 1.3 – Identify Data Sources and owners
This step will walk you through the following activities:
Downloading the IT Metrics Library
Understanding the content of the tool
Reviewing the intended goals for each practice area
This step involves the following participants:
Downloaded tool ready to select the KPIs for your organization
The “Practice” and “Process” columns relate to each of the boxes on the Info-Tech Management and Governance Framework. This ensures you are measuring each area that needs to be managed by a typical IT department.

KPI - The key performance indicator to review
CSF - What needs to happen to achieve success for each goal
Goal - The goal your organization is trying to achieve
Owner - Who will be accountable to collect and report the data
Data Source (typical) - Where you plan to get the data that will be used to calculate the KPI
Baseline/Target - The baseline and target for the KPI
Rank - Criticality of this goal to the organization's success
Action - Suggested action if KPI is underperforming
Blueprint - Available research to address typical underperformance of the KPI
Practice/Process - Which practice and process the KPI represents
1.2.1 Select the KPIs that will drive your organization forward
1.2.2 Remove unwanted KPIs from the IT Metrics Library
Step 1.1 – Review Available KPIs
Step 1.2 – Select KPIs for Your Org.
Step 1.3 – Identify Data Sources and Owners
This step will walk you through the following activities:
This step involves the following participants:
A shortlist of selected KPIs
1.3.1 Document the data source
1.3.2 Document the owner
1.3.3 Document baseline and target
Step 1.1 – Review Available KPIs
Step 1.2 – Select KPIs for Your Org.
Step 1.3 – Identify Data Sources and Owners
This step will walk you through the following activities:
Documenting for each KPI where you plan to get the data, who is accountable to collect and report the data, what the current baseline is (if available), and what the target is
This step involves the following participants:
A list of KPIs for your organization with appropriate attributes documented
Phase 1
1.1 Review Available KPIs
1.2 Select KPIs for Your Org.
1.3 Identify Data Sources and Owners
Phase 2
2.1 Understand the IT Management Dashboard
2.2 Build and Review the KPIs
Phase 3
3.1 Prioritize Low-Performing Indicators
3.2 Review Suggested Actions
3.3 Develop the Action Plan
This phase will walk you through the following activities:
Understanding the IT Management Dashboard
Configuring the IT Management Dashboard and entering initial measures
Produce thing IT Scorecard from the IT Management Dashboard
Interpreting the results
This phase involves the following participants:
2.1.1 Logging into the IT Management Dashboard
2.1.2 Understanding the “Overall Scorecard” tab
2.1.3 Understanding the “My Metrics” tab
Step 2.1 – Understand the IT Management Dashboard
Step 2.2 – Build and review the KPIs
This step will walk you through the following activities:
Accessing the IT Management Dashboard
Basic functionality of the tool
This step involves the following participants:
Understanding of how to administer the IT Management Dashboard

2.2.1 Entering the KPI descriptions
2.2.2 Entering the KPI actuals
2.2.3 Producing the IT Overall Scorecard
Step 2.1 – Understand the IT Management Dashboard
Step 2.2 – Build and review the KPIs
This step will walk you through the following activities:
Entering the KPI descriptions
Entering the actuals for each KPI
Producing the IT Overall Scorecard
This step involves the following participants:
An overall scorecard indicating the selected KPI performance
Example of a custom metric

Example of a standard metric


Phase 1
1.1 Review Available KPIs
1.2 Select KPIs for Your Org.
1.3 Identify Data Sources and Owners
Phase 2
2.1 Understand the IT Management Dashboard
2.2 Build and Review the KPIs
Phase 3
3.1 Prioritize Low-Performing Indicators
3.2 Review Suggested Actions
3.3 Develop the Action Plan
This phase will walk you through the following activities:
Prioritizing low-performing indicators
Using the IT Metrics Library to review suggested actions
Developing your team’s action plan to improve performance
This phase involves the following participants:
3.1.1 Determine criteria for prioritization
3.1.2 Identify low-performing indicators
3.1.3 Prioritize low-performing indicators
Step 3.1 – Prioritize low-performing indicators
Step 3.2 – Review suggested actions
Step 3.3 – Develop the action plan
This step will walk you through the following activities:
Determining the criteria for prioritization of low-performing indicators
Identifying low-performing indicators
Prioritizing the low-performing indicators
This step involves the following participants:
A prioritized list of low-performing indicators that need remediation
Often when metrics programs are established, there are multiple KPIs that are not performing at the desired level. It’s easy to expect the team to fix all the low-performing indicators, but often teams are stretched and have conflicting priorities.
Therefore it’s important to spend some time to prioritize which of your indicators are most critical to the success of your business.
Also consider, if one area is performing well and others have multiple poor indicators, how do you give the right support to optimize the results?
Lastly, is it better to score slightly lower on multiple measures or perfect on most but failing badly on one or two?
3.2.1 Review suggested actions in the IT Metrics Library
Step 3.1 – Prioritize low-performing indicators
Step 3.2 – Review suggested actions
Step 3.3 – Develop the action plan
This step will walk you through the following activities:
Reviewing the suggested actions in the IT Metrics Library
This step involves the following participants:
An idea of possible suggested actions
3.3.1 Document planned actions
3.3.2 Assign ownership of actions
3.3.3 Determine timeline of actions
3.3.4 Review past action status
Step 3.1 – Prioritize low- performing indicators
Step 3.2 – Review suggested actions
Step 3.3 – Develop the action plan
This step will walk you through the following activities:
Using the action plan tool to document the expected actions for low-performing indicators
Assigning an owner and expected due date for the action
Reviewing past action status for accountability
This step involves the following participants:
An action plan to invoke improved performance
Info-Tech Insight
For larger initiatives try to break the task down to what is likely manageable before the next review. Seeing progress can motivate continued action.
Info-Tech Insight
Assigning clear ownership can promote accountability for progress.
Info-Tech Insight
If the target completion date is too far in the future, break the task into manageable chunks.
Info-Tech Insight
Seek to understand the reasons that tasks are not being completed and problem solve for creative solutions to improve performance.
Keeping track of the number of actions identified and completed is a low overhead measure.
Tracking time or money saved is higher overhead but also higher value.

| Metric | Current | Goal |
|---|---|---|
| Number of actions identified per month as a result of KPI review | 0 | TBD |
| $ saved through actions taken due to KPI review | 0 | TBD |
| Time saved through actions taken due to KPI review | 0 | TBD |
Through this project we have identified typical key performance indicators that are important to your organization’s effective management of IT.
You’ve populated the IT Management Dashboard as a simple method to display the results of your selected KPIs.
You’ve also established a regular review process for your KPIs and have a method to track the actions that are needed to improve performance as a result of the KPI review. This should allow you to hold individuals accountable for improvement efforts.
You can also measure the effectiveness of your KPI program by tracking how many actions are identified as a result of the review. Ideally you can also track the money and time savings.
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.
Contact your account representative for more information.
workshops@infotech.com
1-888-670-8889
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
To accelerate this project, engage your IT team in an Info-Tech Workshop with an Info-Tech analyst team.
Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
The following are sample activities that will be conducted by Info-Tech analysts with your team:
Select the KPIs for your organization
Examine the benefits of the KPIs suggested in the IT Metrics Library and help selecting those that will drive performance for your maturity level.
Build an action plan
Discuss options for identifying and executing actions that result from your KPI review. Determine how to set up the discipline needed to make the most of your KPI review program.
Principal Research Director, CIO – Service Management Info-Tech Research Group
Practice Lead, CIO – People & Leadership Info-Tech Research Group
Practice Lead, Infrastructure & Operations Info-Tech Research Group
Practice Lead, Security, Risk & Compliance Info-Tech Research Group
Practice Lead, Applications and Agile Development Info-Tech Research Group
Practice Lead, Applications – Project and Portfolio Mgmt. Info-Tech Research Group
Vice President, Applications Info-Tech Research Group
Research Director, CIO Info-Tech Research Group
Practice Lead, Enterprise Applications Info-Tech Research Group
Practice Lead, Enterprise Architecture, Data & BI Info-Tech Research Group
Executive Counselor Info-Tech Research Group
Develop Meaningful Service Metrics to Ensure Business and User Satisfaction
Use Applications Metrics That Matter
Take Control of Infrastructure Metrics
Bach, Nancy. “How Often Should You Measure Your Organization's KPIs?” EON, 26 June 2018. Accessed Jan. 2020.
“The Benefits of Tracking KPIs – Both Individually and for a Team.” Hoopla, 30 Jan. 2017. Accessed Jan. 2020.
Chepul, Tiffany. “Top 22 KPI Examples for Technology Companies.” Rhythm Systems, Jan. 2020. Accessed Jan. 2020.
Cooper, Larry. “CSF's, KPI's, Metrics, Outcomes and Benefits” itSM Solutions. 5 Feb. 2010. Accessed Jan 2020.
“CUC Report on the implementation of Key Performance Indicators: case study experience.” Committee of University Chairs, June 2008. Accessed Jan 2020.
Harris, Michael, and Bill Tayler. “Don’t Let Metrics Undermine Your Business.” HBR, Sep.–Oct 2019. Accessed Jan. 2020.
Hatari, Tim. “The Importance of a Strong KPI Dashboard.” TMD Coaching. 27 Dec. 2018. Accessed Jan. 2020.
Roy, Mayu, and Marian Carter. “The Right KPIs, Metrics for High-performing, Cost-saving Space Management.” CFI, 2013. Accessed Jan 2020.
Schrage, Michael, and David Kiron. “Leading With Next-Generation Key Performance Indicators.” MIT Sloan Management Review, 26 June 2018. Accessed Jan. 2020.
Setijono, Djoko, and Jens J. Dahlgaard. “Customer value as a key performance indicator (KPI) and a key improvement indicator (KII)” Emerald Insight, 5 June 2007. Accessed Jan 2020.
Skinner, Ted. “Balanced Scorecard KPI Examples: Comprehensive List of 183 KPI Examples for a Balanced Scorecard KPI Dashboard (Updated for 2020).” Rhythm Systems, Jan. 2020. Accessed Jan 2020.
Wishart, Jessica. “5 Reasons Why You Need The Right KPIs in 2020” Rhythm Systems, 1 Feb. 2020. Accessed Jan. 2020.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Evaluate executive stakeholder needs and assess your current capabilities to ensure your implementation strategy sets realistic expectations.
Define an organizationally appropriate scope and mandate for your EPMO to ensure that your processes serve the needs of the whole.
Establish clearly defined and easy-to-follow EPMO processes that minimize project complexity and improve enterprise project results.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify breakdowns in the flow of portfolio data across the enterprise to pinpoint where and how an EPMO can best intervene.
Assess areas of strength and opportunity in your PPM capabilities to help structure and drive the EPMO.
Define stakeholder needs and expectations for the EPMO in order to cultivate capabilities and services that help drive informed and engaged project decisions at the executive level.
A current state picture of the triggers that are driving the need for an EPMO at your organization.
A current state understanding of the strengths you bring to the table in constructing an EPMO as well as the areas you need to focus on in building up your capabilities.
A target state set by stakeholder requirements and expectations, which will enable you to build out an implementation strategy that is aligned with the needs of the executive layer.
1.1 Map current enterprise PPM workflows.
1.2 Conduct a SWOT analysis.
1.3 Identify resourcing considerations and other implementation factors.
1.4 Survey stakeholders to establish the right mix of EPMO capabilities.
An overview of the flow of portfolio data and information across the organization
An overview of current strengths, weaknesses, opportunities, and threats
A preliminary assessment of internal and external factors that could impact the success of this implementation
The ability to construct a project plan that is aligned with stakeholder needs and expectations
Define an appropriate scope for the EPMO and the deployment it services.
Devise a plan for engaging and including the appropriate stakeholders during the implementation phase.
A clear purview for the EPMO in relation to the wider enterprise in order to establish appropriate expectations for the EPMO’s services throughout the organization.
Engaged stakeholders who understand that they have a stake in the successful implementation of the EPMO.
2.1 Prepare your EPMO value proposition.
2.2 Define the role and organizational reach of your EPPM capabilities.
2.3 Establish a communication plan to create stakeholder awareness.
A clear statement of purpose and benefit that can be used to help build the case for an EPMO with stakeholders
A functional charter defining the scope of the EPMO and providing a statement of the services the EPMO will provide once established
An engaged executive layer that understands the value of the EPMO and helps drive its success
Establish clearly defined and easy-to-follow EPMO processes that minimize project complexity.
Develop portfolio and project governance structures that feed the EPMO with the data decision makers require without overloading enterprise project teams with processes they can’t support.
Devise a communications strategy that helps achieve organizational buy-in.
The reduction of project chaos and confusion throughout the organization.
Processes and governance requirements that work for both decision makers and project teams.
Organizational understanding of the universal benefit of the EPMO’s processes to stakeholders throughout the enterprise.
3.1 Establish EPMO roles and responsibilities.
3.2 Document standard procedures around enterprise portfolio reporting, PPM administration, and project leadership.
3.3 Review enterprise PPM solutions.
3.4 Develop a stakeholder engagement and resistance plan.
Clear lines of portfolio accountability
A fully actionable EPMO Standard Operating Procedure document that will enable process clarity
An informed understanding of the right PPM solution for your enterprise processes
A communications strategy document to help communicate the organizational benefits of the EPMO
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Push the boundaries of conventional thinking and consider IT innovations that truly transform the business.
A list of innovative IT opportunities that your IT department can use to transform the business
1.1 Discuss the objectives of ARP and what they mean to IT departments.
1.2 Identify drivers for change.
1.3 Review IT strategy.
1.4 Augment your IT opportunities list.
Revised IT vision
List of innovative IT opportunities that can transform the business
Partner with the business to reprioritize projects and initiatives for the post-pandemic world.
Assessment of the organization’s new and existing IT opportunities and alignment with business objectives
2.1 Assess alignment of current and new IT initiatives with business objectives.
2.2 Review and update prioritization criteria for IT projects.
Preliminary list of IT initiatives
Revised project prioritization criteria
Identify IT budget deficits resulting from pandemic response and discover opportunities to support innovation through new staff and training.
Prioritized shortlist of business-aligned IT initiative and projects
3.1 Classify initiatives into project categories using ROM estimates.
3.2 Identify IT budget needs for projects and ongoing services.
3.3 Identify needs for new staff and skills training.
3.4 Determine business benefits of proposed projects.
3.5 Prioritize your organization’s projects.
Prioritized shortlist of business-aligned IT initiatives and projects
Tie IT expenditures to direct transfers or link them to ARP grant opportunities.
Action plan to obtain ARP funding
4.1 Tie projects to direct transfers, where applicable.
4.2 Align list of projects to indirect ARP grant opportunities.
4.3 Develop an action plan to obtain ARP funding.
4.4 Discuss required approach to project governance.
Action plan to obtain ARP funding
Project governance gaps
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify benefits of shared services to your organization and define implementation challenges.
Identify your process and staff capabilities and discover which services will be transitioned to shared services plan. It will also help you to figure out the best model to choose.
Discuss an actionable plan to implement shared services to track the project. Walk through a communication plan to document the goals, progress, and expectations with customer stakeholders.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish the need for change.
Set a clear understanding about benefits of shared services to your organization.
1.1 Identify your organization’s main drivers for using a shared services model.
1.2 Define if it is beneficial to implement shared services.
Shared services mission
Shared services goals
Become aware of challenges to implement shared services and your capabilities for such transition.
Discover the primary challenges for transitioning to shared services, eliminate resistance factors, and identify your business potentials for implementation.
2.1 Identify your organization’s resistance to implement shared services.
2.2 Assess process and people capabilities.
Shared Services Business Case
Shared Services Assessment
Determine the shared services model.
Identify the core services to be shared and the best model that fits your organization.
3.1 Define core services that will be moved to shared services.
3.2 Assess different models of shared services and pick the one that satisfies your goals and needs.
List of services to be transferred to shared services
Shared services model
Define and communicate the tasks to be delivered.
Confidently approach key stakeholders to make the project a reality.
4.1 Define the roadmap for implementing shared services.
4.2 Make a plan to communicate changes.
List of initiatives to reach the target state, strategy risks, and their timelines
Draft of a communication plan
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
To bring your portfolios together, you need to start with learning about your objectives, principles, and stakeholders.
Get a deeper understanding of what makes up your organizing principle before learning about your applications and projects that are aligned with your principles.
Bound by your organizing principles, bring your projects and applications together under a single dashboard. Once defined, determine the rollout and communication plan that suits your organization.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine your organizational objectives and organizing principle.
A clear understanding of where you need to go as an organization.
A clear way to enable all parts of your portfolio to come together.
1.1 Determine your organization’s objectives.
1.2 Determine your key stakeholders.
1.3 Define your organizing principle.
1.4 Decompose your organizing principle into its core components.
Determined organizing principle for your applications and projects
Get a clear view of the applications that contribute to your organization’s objectives.
A key element of IT value delivery is its applications. Gaining awareness allows you to evaluate if the right value is being provided.
2.1 Determine your complete list of applications.
2.2 Determine the health of your applications.
2.3 Link your applications to the organization’s core components.
List of applications
Application list with health statistics filled in
List of applications with health metrics bound to the organization’s core components
Get a clear view of your project portfolio and how it relates to your applications and their organizing principle.
An understanding of your project portfolio.
3.1 List all in-flight projects and vital health statistics.
3.2 Map out the key programs and projects in your portfolio to the application’s core components.
List of projects
List of projects mapped to applications they impact
Bring together your application and project portfolios in a new, easy-to-use dashboard with a full rollout plan.
Dashboard available for use
Roadmap and communication plan to make dashboard implementable and tangible
4.1 Test the dashboard.
4.2 Define your refresh cadence.
4.3 Plan your implementation.
4.4 Develop your communication plan.
Validated dashboards
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identifying and planning sources of financial contingency will help ensure CIOs can meet unforeseen and emergent operational and business needs throughout the year.
The start of 2021 is a time to refocus and redouble IT risk management and business continuity planning to bring it up to the standards of our “new normal.” Indeed, if last year taught us anything, it’s that no “black swan” should be off the table in terms of scenarios or possibilities for business disruption.
At its heart, resilience is having the capacity to deal with unexpected change. Organizational change management can help build up this capacity, providing the ability to strategically plot known changes while leaving some capacity to absorb the unknowns as they present themselves.
Capacity awareness facilitates resilience by providing capital in the form of resource data. With this data, CIOs can make better decisions on what can be approved and when it can be scheduled for.
Having an up-to-date view of emerging technologies will enable the resilient CIO to capitalize on and deploy leading-edge innovations as the business requires.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand your current state and determine the need for a deeper audit.
Audit your selected projects and portfolios. Understand the gaps in portfolio practices.
Document the steps you are going to take to address any issues that were uncovered in phase 2.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
An audit of your portfolio management practices.
Analysis of audit results.
1.1 Info-Tech’s Audit Standard/Engagement Context
1.2 Portfolio Audit
1.3 Input Validation
1.4 Portfolio Audit Analysis
1.5 Start/Stop/Continue
Audit Standard and Audit Glossary of Terms
Portfolio and Project Audit Tool
Start/Stop/Continue
An audit of your project management practices.
Analysis of audit results.
2.1 Project Audit
2.2 Input Validation
2.3 Project Audit Analysis
2.4 Start/Stop/Continue
Portfolio and Project Audit Tool
Start/Stop/Continue
Create a plan to start addressing any vulnerabilities.
A plan to move forward.
3.1 Action Plan
3.2 Key Takeaways
Audit Timeline Template
A product owner is the CEO for their product. Successful product management starts with empowerment and accountability. Product owners own the vision, roadmap, and value realization for their product or family aligned to enterprise goals and priorities.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.
Using Info-Tech’s CLAIM model, quickly determine your organization’s strengths and weaknesses preparing for a product culture. Use the heat map to identify key areas.
Use the blueprint exercises to build your personal product owner playbook. You can also use the workbook to capture exercise outcomes.
Use this workbook to capture exercise outcomes and transfer them to your Mature and Scale Product Ownership Playbook (optional).
Product owners need to improve their core capabilities and real Agile skills. The assessment radar will help identify current proficiency and growth opportunities.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish the foundation for product ownership.
Product owner playbook with role clarity and RACI.
1.1 Define enablers and blockers of product management.
1.2 Define your product management roles and names.
1.3 Assess your product management readiness.
1.4 Identify your primary product owner perspective.
1.5 Define your product owner RACI.
Enablers and blockers
Role definitions.
Product culture readiness
Product owner perspective mapping
Product owner RACI
Align product owners to products.
Assignment of resources to open products.
A stakeholder management strategy.
2.1 Assign resources to your products and families.
2.2 Visualize relationships to identify key influencers.
2.3 Group stakeholders into categories.
2.4 Prioritize your stakeholders.
Product resource assignment
Stakeholder management strategy
Stakeholder management strategy
Stakeholder management strategy
Mature product owner capabilities.
Assess your Agile product owner readiness
Assess and mature product owner capabilities
3.1 Assess your real Agile skill proficiency.
3.2 Assess your vison capability proficiency.
3.3 Assess your leadership capability proficiency.
3.4 Assess your PLM capability proficiency.
3.5 Assess your value realization capability proficiency.
3.6 Identify your business value drivers and sources of value.
Real Agile skill proficiency assessment
Info-Tech’s product owner capability model proficiency assessment
Info-Tech’s product owner capability model proficiency assessment
Info-Tech’s product owner capability model proficiency assessment
Info-Tech’s product owner capability model proficiency assessment
Business value drivers and sources of value
Strengthen the product owner’s role in your organization by focusing on core capabilities and proper alignment.
Whether you manage a product or service, the fundamentals of good product ownership are the same. Organizations need to focus on three key elements of product ownership in order to be successful.
By focusing the attention of the teammates serving in product owner or service owner roles, your organization will deliver value sooner and respond to change more effectively.
Principal Research Director – Application Delivery and Management
Info-Tech Research Group
Your ChallengeProduct owners must bridge the gap between the customers, operations, and delivery to ensure products continuously deliver increasing value. Product owners are often assigned to projects or product delivery without proper support, guidance, or alignment. In many organizations the product owner role is not well-defined, serves as a proxy for stakeholder ownership, and lacks reinforcement of the key skills needed to be successful. |
Common ObstaclesOrganizations have poor alignment or missing product owners between lines of business, IT, and operations. Product owners are aligned to projects and demand management rather than long-term strategic product ownership. Product families are not properly defined, scaled, and supported within organizations. Individuals in product owner roles have an incomplete understanding of needed capabilities and lack a development path. |
Info-Tech's ApproachCreate a culture of product management trust and empowerment with product owners aligned to your operational structure and product needs. Promote and develop true Agile skills among your product owners and family managers. Implement Info-Tech’s product owner capability model to define the role expectations and provide a development path for product owners. Extend product management success using Deliver on Your Digital Product Vision and Deliver Digital Products at Scale. |
There is no single correct approach to product ownership. Product ownership must be tuned and structured to meet the delivery needs of your organization and the teams it serves.
Successful product management starts with empowerment and accountability. Product owners own the vision, roadmap, and value realization for their product or family aligned to enterprise goals and priorities.
Product owners represent three primary perspectives: business (external-facing), technical (systems and tools), or operational (manual processes). Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.
Start with your operational grouping of products and families, identifying where an owner is needed. Then, assign people to the products and families. The owner does not define the product or family.
Product owners are operating under an incomplete understanding of the capabilities needed to succeed. Most product/service owners lack a complete picture of the needed capabilities, skills, and activities to successfully perform their roles.
The underlying capabilities and best practices to own and improve a product or service are identical for both roles. Use the terms that make the most sense for your culture.
Identify where product management is needed and align expectations with existing roles. Successful product management does not require a dedicated job family.
Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.
You go through a period or periods of project-like development to build a version of an application or product.
You also have parallel services along with your project development, which encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.
For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. The term “product” is used for consistency but would apply to services, as well.
Common foundations: Focus on continuous improvement, ROI, and value realization. Clear vision, goals, roadmap, and backlog.
“Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:
Product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.
Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).
Groups of product families within an overall value stream or capability grouping.
A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.
Single product composed of one or more applications and services.
Define the current roles that will perform the product management function or define consistent role names to product owners and managers.
Your product owner map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support and operate your product directly.
Combine your product owner map with your stakeholder map to create a comprehensive view of influencers.
The product owner owns the direction of the product.
Roadmaps for your product family are, by design, less detailed. This does not mean they aren’t actionable! Your product family roadmap should be able to communicate clear intentions around the future delivery of value in both the near and long term.
Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner can accomplish.
Product owners operate within a network of stakeholders who represent different perspectives within the organization.
First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.
Without a stakeholder strategy, product owners will encounter obstacles, resistance, or unexpected changes.
Your stakeholder map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support and operate your product directly.
Use “connectors” to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.
While these are important, they are not the whole story. To effectively deliver software, we believe in the importance of being Agile over simply doing Agile.
Adapted from: “Doing Agile” Is Only Part of the Software Delivery Pie
The right skills development is only possible with proper assessment and alignment against outcomes.
It is easy to lose sight of what matters when we look at a product from a single point of view. Despite what "The Agile Manifesto" says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product owners must consider the needs of all stakeholders when designing and building products.
Source: Pulse Survey (N=18)
Unfortunately, most product owners operate with incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.
Your vision informs and aligns what goals and capabilities are needed to fulfill your product or product family vision and align with enterprise goals and priorities. Each item on your roadmap should have corresponding KPIs or OKRs to know how far you moved the value needle. Value realization measures how well you met your target, as well as the impacts on your business value canvas and cost model.
Your leadership skills improve collaborations and decisions when working with your stakeholders and product delivery teams. This builds trust and improves continued improvements to the entire product lifecycle. A product owner’s focus should always be on finding ways to improve value delivery.
Adapted from: Crossing the Chasm
A product vision shouldn’t be so far out that it doesn’t feel real or so short-term that it gets bogged down in minutiae and implementation details. Finding the right balance will take some trial and error and will be different for each organization.
Your value drivers and impact helps estimate the expected value of roadmap items, prioritize roadmap and backlog items, and identify KPIs and OKRs to measure value realization and actual impact.
Value is best created by self-managing teams who deliver in frequent, short increments supported by leaders who coach them through challenges.
Product-centric delivery and Agile are a radical change in how people work and think. Structured, facilitated learning is required throughout the transformation to help leaders and practitioners make the shift.
Product management, Agile, and DevOps have inspired SDLC tools that have become a key part of delivery practices and work management.
Self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of product-centric delivery.
Successful implementations require the disciplined use of metrics that support developing better teams
Leaders of successful change spend considerable time developing a powerful change message; that is, a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.
The organizational change message should:
Phase steps |
1. Establish the foundation for product ownershipStep 1.1 Establish an environment for product owner success Step 1.2 Establish your product ownership model |
2. Align product owners to productsStep 2.1 Assign product owners to products Step 2.2 Manage stakeholder influence |
3. Mature product owner capabilitiesStep 3.1 Assess your Agile product owner readiness Step 3.2 Mature product owner capabilities |
Phase outcomes |
1.1.1 Define enablers and blockers of product management 1.1.2 Define your product management roles and names 1.2.1 Identify your primary product owner perspective 1.2.2 Define your product owner RACI |
2.1.1 Assign resources to your products and families 2.2.1 Visualize relationships to identify key influencers 2.2.2 Group stakeholders into categories 2.2.3 Prioritize your stakeholders |
3.1.1 Assess your real Agile skill proficiency 3.2 Mature product owner capabilities 3.2.1 Assess your vision capability proficiency 3.2.2 Assess your leadership capability proficiency 3.2.3 Assess your PLM capability proficiency 3.2.4 Identify your business value drivers and sources of value 3.2.5 Assess your value realization capability proficiency |
Capture and organize the outcomes of the activities in the workbook.
The workbook helps organize and communicate the outcomes of each activity.
Determine your level of mastery of real Agile skills and product owner capabilities.
Member outcome |
Suggested Metric |
Estimated impact |
| Increase business application satisfaction | Satisfaction of business applications (CIO BV Diagnostic) | 20% increase within one year after implementation |
| Increase effectiveness of application portfolio management | Effectiveness of application portfolio management (M&G Diagnostic) | 20% increase within one year after implementation |
| Increase importance and effectiveness of application portfolio | Importance and effectiveness to business (APA Diagnostic) | 20% increase within one year after implementation |
| Increase satisfaction of support of business operations | Support to business (CIO BV Diagnostic) | 20% increase within one year after implementation |
| Successfully deliver committed work (productivity) | Number of successful deliveries; burndown | Reduction in project implementation overrun by 20% |
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project"
Phase 1 Establish the Foundation for Product Ownership |
Phase 2 Align Product Owners to Products |
Phase 3 Mature Product Owner Capabilities |
|
|
|
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Phase 1 | Phase 2 | Phase 3 | |
Activities | Establish the Foundation for Product OwnershipStep 1.1 Establish an environment for product owner success 1.1.1 Define enablers and blockers of product management 1.1.2 Define your product management roles and names 1.1.3 Assess your product management readiness Step 1.2 Establish your product ownership model 1.2.1 Identify your primary product owner perspective 1.2.2 Define your product owner RACI | Align Product Owners to ProductsStep 2.1 Assign product owners to products 2.1.1 Assign resources to your products and families Step 2.2 Manage stakeholder influence 2.2.1 Visualize relationships to identify key influencers 2.2.2 Group stakeholders into categories 2.2.3 Prioritize your stakeholders | Mature Product Owner CapabilitiesStep 3.1 Assess your Agile product owner readiness 3.1.1 Assess your real Agile skill proficiency Step 3.2 Mature product owner capabilities= 3.2.1 Assess your Vision capability proficiency 3.2.2 Assess your Leadership capability proficiency 3.2.3 Assess your PLM capability proficiency 3.2.4 Identify your business value drivers and sources of value 3.2.5 Assess your Value Realization capability proficiency |
Deliverables |
|
|
|
Build a product vision your organization can take from strategy through execution.
Deliver value at the scale of your organization through defining enterprise product families.
Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.
Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.
Streamline business value delivery through the strategic adoption of DevOps practices.
Further the benefits of Agile by extending a scaled Agile framework to the business.
Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.
Shift security left to get into DevSecOps.
Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.
Execute a disciplined approach to rolling out Agile methods in the organization.
See an overview of the APM journey and how we can support the pieces in this journey.
Ensure your application portfolio delivers the best possible return on investment.
Effective maintenance ensures the long-term value of your applications.
Move beyond maintenance to ensuring exceptional value from your apps.
Delivering value starts with embracing what your department can do.
Empower the business to implement its own applications with a trusted business-IT relationship.
Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.
Focus product delivery on business value-driven outcomes.
Be careful what you ask for, because you will probably get it.
Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.
Mature your IT department by measuring what matters.
Don’t let bad estimates ruin good work.
Commit to achievable software releases by grounding realistic expectations.
Expand on the financial model to give your initiative momentum.
Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.
Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.
Focus product delivery on business value-driven outcomes.
Have the right people in the right place, at the right time.
Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.
Don’t just measure engagement, act on it.
Set holistic measures to inspire employee performance.
1.1.1 Define enablers and blockers of product management
1.1.2 Define your product management roles and names
1.1.3 Assess your product management readiness
1.2.1 Identify your primary product owner perspective
1.2.2 Define your product owner RACI
1.1.1 Define enablers and blockers of product management
1.1.2 Define your product management roles and names
1.1.3 Assess your product management readiness
– Robbin Schuurman,
“Tips for Starting Technical Product Managers”
Implement Info-Tech’s Product Owner Capability Model to help empower and hold product owners accountable for the maturity and success of their product. The product owner must understand how their product fits into the organization’s mission and strategy in order to align to enterprise value.
Common foundations: Focus on continuous improvement, ROI, and value realization. Clear vision, goals, roadmap, and backlog.
“Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:
Need help defining your products or services? Download our blueprint Deliver Digital Products at Scale.
" loading="lazy">
Every roadmap item should have an expected realized value once it is implemented. The associate KPIs or OKRs determine if our goal was met. Any gap in value feedback back into the roadmap and backlog refinement.
Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.
Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.
You go through a period or periods of project-like development to build a version of an application or product.
You also have parallel services along with your project development, which encompasses a more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.
Source: “The Agile Manifesto”
Capture in the Mature and Scale Product Ownership Playbook.
Groups of product families within an overall value stream or capability grouping.
A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.
Single product composed of one or more applications and services.
Define the current roles that will perform the product management function or define consistent role names to product owners and managers.
Capture in the Mature and Scale Product Ownership Playbook.
Value is best created by self-managing teams who deliver in frequent, short increments supported by leaders who coach them through challenges.
Product-centric delivery and Agile are a radical change in how people work and think. Structured, facilitated learning is required throughout the transformation to help leaders and practitioners make the shift.
Product management, Agile, and DevOps have inspired SDLC tools that have become a key part of delivery practices and work management.
Self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of product-centric delivery.
Successful implementations require the disciplined use of metrics that support developing better teams
Capture in the Mature and Scale Product Ownership Readiness Assessment.
Leaders of successful change spend considerable time developing a powerful change message; that is, a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.
The organizational change message should:
1.2.1 Identify your primary product owner perspective
1.2.2 Define your product owner RACI
Product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.
Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).
LOB product owners focus on the products and services consumed by the organization’s external consumers and users. The role centers on the market needs, competitive landscape, and operational support to deliver products and services.
Capture in the Mature and Scale Product Ownership Playbook.
Product ownership isn’t just about managing the product backlog and development cycles. Teams need to manage key milestones such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints.
Key milestones must be proactively managed. If a project manager is not available, those responsibilities need to be managed by the product owner or Scrum Master. Start with responsibility mapping to decide which role will be responsible.
*Scrum Master, Delivery Manager, Team Lead
Capture in the Mature and Scale Product Ownership Playbook.
2.1.1 Assign resources to your products and families
2.2.1 Visualize relationships to identify key influencers
2.2.2 Group stakeholders into categories
2.2.3 Prioritize your stakeholders
2.1.1 Assign resources to your products and families
Groups of product families within an overall value stream or capability grouping.
A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.
Single product composed of one or more applications and services.
Define the current roles that will perform the product management function or define consistent role names to product owners and managers.
In Deliver Digital Products at Scale , products were grouped into families using Info-Tech’s five scaling patterns. Assigning owners to Enterprise Applications and Shared Services requires special consideration.
A division or group delivers enabling capabilities and the team’s operational alignment maps directly to the modules/components of an enterprise application and other applications that support the specific business function.
For additional information about HRMS, please download Get the Most Out of Your HRMS.
Assign owners by service type, knowledge area, or technology to provide alignment of shared business capabilities and common solutions.
Use the stakeholder analysis to define the key stakeholders and sources of demand for enterprise applications and shared services. Extend your mapping to include their stakeholders and influencers to uncover additional sources of demand and prioritization.
Your product owner map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support, and operate your product directly.
Combine your product owner map with your stakeholder map to create a comprehensive view of influencers.
Capture in the Mature and Scale Product Ownership Playbook.
2.2.1 Visualize relationships to identify key influencers
2.2.2 Group stakeholders into categories
2.2.3 Prioritize your stakeholders
Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner can accomplish.
Product owners operate within a network of stakeholders who represent different perspectives within the organization.
First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.
Without a stakeholder strategy, product owners will encounter obstacles, resistance, or unexpected changes.
Your stakeholder map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support, and operate your product directly.
Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.
Capture in the Mature and Scale Product Ownership Playbook.
There are four areas on the map, and the stakeholders within each area should be treated differently.
Capture in the Mature and Scale Product Ownership Playbook.
Consider the three dimensions of stakeholder prioritization: influence, interest, and support. Support can be determined by rating the following question: How likely is it that your stakeholder would recommend your product? These parameters are used to prioritize which stakeholders are most important and should receive your focused attention. The table to the right indicates how stakeholders are ranked.
Capture in the Mature and Scale Product Ownership Playbook.
Type |
Quadrant |
Actions |
Players |
High influence, high interest – actively engage | Keep them updated on the progress of the project. Continuously involve players in the process and maintain their engagement and interest by demonstrating their value to its success. |
Mediators |
High influence, low interest – keep satisfied | They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders. |
Noisemakers |
Low influence, high interest – keep informed | Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using mediators to help them. |
Spectators |
Low influence, low interest – monitor | They are followers. Keep them in the loop by providing clarity on objectives and status updates. |
Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying your stakeholder groups, the product owner can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy spectators and noisemakers while ensuring the needs of mediators and players are met.
3.1.1 Assess your real Agile skill proficiency
3.2.1 Assess your vision capability proficiency
3.2.2 Assess your leadership capability proficiency
3.2.3 Assess your PLM capability proficiency
3.2.4 Identify your business value drivers and sources of value
3.2.5 Assess your value realization capability proficiency
3.1.1 Assess your real Agile skill proficiency
The right skills development is only possible with proper assessment and alignment against outcomes.
While these are important, they are not the whole story. To effectively deliver software, we believe in the importance of being Agile over simply doing Agile.
Adapted from: “Doing Agile” Is Only Part of the Software Delivery Pie
Skill Name |
Description |
Accountability |
Refers to the state of being accountable. In an Agile context, it implies transparency, dedication, acting responsibly, and doing what is necessary to get the job done. |
Collaboration |
Values diverse perspectives and working with others to achieve the best output possible. Effective at working toward individual, team, department, and organizational goals. |
Comfort with ambiguity |
Allows you to confidently take the next steps when presented with a problem without having all the necessary information present. |
Communication |
Uses different techniques to share information, concerns, or emotions when a situation arises, and it allows you to vary your approach depending on the current phase of development. |
Empathy |
Is the ability to understand and share the feelings of another to better serve your team and your stakeholders. |
Facilitation |
Refers to guiding and directing people through a set of conversations and events to learn and achieve a shared understanding. |
Functional decomposition |
Is being able to break down requirements into constituent epics and stories. |
Initiative |
Is being able to anticipate challenges and then act on opportunities that lead to better business outcomes. |
Process discipline |
Refers to the focus of following the right steps for a given activity at the right time to achieve the right outcomes. |
Resilience |
Refers to the behaviors, thoughts, and actions that allow a person to recover from stress and adversity. |
All components of the employee empowerment driver have a strong, positive correlation with engagement.
Source: McLean & Company Engagement Database, 2018; N=71,794
1 - Foundational: Transitioning and Growing |
2 - Capable/Competent: Core Contributor |
3 - Influential: Gifted Improver |
4 - Transformational: Towering Strength |
|
|
|
|
Effective collaboration supports Agile behaviors, including embracing change and the ability to work iteratively.
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
Even though many organizations recognize its importance, communication is one of the root causes of project failure.
56% of the resources spent on a project are at risk due to ineffective communications.
PMI, 2013.
In 29% of projects started in the past 12 months, poor communication was identified as being one of the primary causes of failure.
PMI, 2013.
Adapted From: Agile Modeling
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
Empathy is the ability to understand and share the feelings of another in order to better serve your team and your stakeholders. There are three kinds:
Empathy enables you to serve your team, your customers, and your organization
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
“Facilitation is the skill of moderating discussions within a group in order to enable all participants to effectively articulate their views on a topic under discussion, and to ensure that participants in the discussion are able to recognize and appreciate the differing points of view that are articulated.” (IIBA, 2015)
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
“Functional decomposition helps manage complexity and reduce uncertainty by breaking down processes, systems, functional areas, or deliverables into their simpler constituent parts and allowing each part to be analyzed independently."
(IIBA, 2015)
In our research, we refer to these items as epics, capabilities, features, and user stories. How you develop your guiding principles and structure your backlog should be based on the terminology and artifact types commonly used in your organization.
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
| N/A -- Maximum level is '3 |
Adapted from: Why Innovation, 2019.
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
Capture in the Mature and Scale Product Owner Proficiency Assessment.
3.2.1 Assess your vision capability proficiency
3.2.2 Assess your leadership capability proficiency
3.2.3 Assess your PLM capability proficiency
3.2.4 Identify your business value drivers and sources of value
3.2.5 Assess your value realization capability proficiency
It is easy to lose sight of what matters when we look at a product from a single point of view . Despite what "The Agile Manifesto" says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product owners must consider the needs of all stakeholders when designing and building products.
Source: Pulse Survey (N=18)
Unfortunately, most product owners operate with incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.
Your vision informs and aligns what goals and capabilities are needed to fulfill your product or product family vision and align with enterprise goals and priorities. Each item on your roadmap should have corresponding KPIs or OKRs to know how far you moved the value needle. Value realization measures how well you met your target, as well as the impacts on your business value canvas and cost model.
Your leadership skills improve collaborations and decisions when working with your stakeholders and product delivery teams. This builds trust and improves continued improvements to the entire product lifecycle. A product owner’s focus should always be on finding ways to improve value delivery.
Data comes from many places and may still not tell the complete story.
Supporting workbook that captures the interim results from a number of exercises that will contribute to your overall digital product vision.
An optional tool to help you capture your product backlog and prioritize based on your given criteria
An optional tool to help you build out and visualize your first roadmap.
Record the results from the exercises to help you define, detail, and make real your digital product vision.
Adapted from: Geoffrey Moore, 2014.
A product vision shouldn’t be so far out that it doesn’t feel real or so short-term that it gets bogged down in minutiae and implementation details. Finding the right balance will take some trial and error and will be different for each organization.
Info-Tech Best Practice Product delivery requires a comprehensive set of business and technical competencies to effectively roadmap, plan, deliver, support, and validate your product portfolio. Product delivery is a “multi-faceted, complex discipline that can be difficult to grasp and hard to master.” It will take time to learn and adopt methods and become a competent product manager or owner (“What Is Product Management?”, Pichler Consulting Limited).
Ultimately, you want products to be able to respond faster to changes and deliver value sooner. The level of detail in the roadmap and backlog is a tool to help the product owner plan for change. The duration of your product roadmap is all directly related to the tier of product owner in the product family.
In our research, we refer to these items as epics, capabilities, features, and user stories. How you develop your guiding principles and structure your backlog should be based on the terminology and artifact types commonly used in your organization.
Product ownership isn’t just about managing the product backlog and development cycles! Teams need to manage key milestones such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints!
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
Capture in the Mature and Scale Product Owner Proficiency Assessment.
Product owners cannot be just a proxy for stakeholder decisions. The product owner owns product decisions and management of all stakeholders.
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
Capture in the Mature and Scale Product Owner Proficiency Assessment.
Product owners must actively manage the full lifecycle of the product.
A well-formed backlog can be thought of as a DEEP backlog:
Detailed Appropriately: PBIs are broken down and refined, as necessary.
Emergent: The backlog grows and evolves over time as PBIs are added and removed.
Estimated: The effort a PBI requires is estimated at each tier.
Prioritized: The PBI’s value and priority are determined at each tier.
(Perforce, 2018)
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
Capture in the Mature and Scale Product Owner Proficiency Assessment.
Most organizations stop with on-time and on-budget. True financial alignment needs to define and manage the full lifecycle P&L.
Your value drivers and impact helps estimate the expected value of roadmap items, prioritize roadmap and backlog items, and identify KPIs and OKRs to measure value realization and actual impact.
Your balanced value is just one of many criteria needed to align your product goals and sequence roadmap items. Feasibility, delivery pipeline capacity, shared services, and other factors may impact the prioritization of backlog items.
Competent organizations know that value cannot always be represented by revenue or reduced expenses. However, it is not always apparent how to envision the full spectrum of sources of value. Dissecting value by benefit type and the value source’s orientation allows you to see the many ways in which a product or service brings value to the organization.
Financial benefits refer to the degree to which the value source can be measured through monetary metrics and is often quite tangible.
Human benefits refer to how a product or service can deliver value through a user’s experience.
Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.
Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.
Capture in the Mature and Scale Product Ownership Workbook.
1 - Foundational: Transitioning and Growing | 2 - Capable/Competent: Core Contributor | 3 - Influential: Gifted Improver | 4 - Transformational: Towering Strength |
|
|
|
|
Capture in the Mature and Scale Product Owner Proficiency Assessment.
Product ownership can be one of the most difficult challenges facing delivery and operations teams. By focusing on operational grouping and alignment of goals, organizations can improve their value realization at all levels in the organization.
The foundation for delivering and enhancing products and services is rooted in the same capability model. Traditionally, product owners have focused on only a subset of skills and capabilities needed to properly manage and grow their products. The product owner capability model is a useful tool to ensure optimal performance from product owners and assess the right level of detail for each product within the product families.
Congratulations. You’ve completed a significant step toward higher-value products and services.
Contact your account representative for more information
workshops@infotech.com
1-888-670-8889
Contact your account representative for more information
workshops@infotech.com 1-888-670-8889
Assess your skills and capabilities against the real Agile skills inventory
Build a stakeholder management strategy.
Emily Archer is a consultant currently working with Fortune 500 clients to ensure the delivery of successful projects, products, and processes. She helps increase the business value returned for organizations’ investments in designing and implementing enterprise content hubs and content operations, custom web applications, digital marketing, and e-commerce platforms.
David Berg is a product commercialization expert who has spent the last 20 years delivering product management and business development services across a broad range of industries. Early in his career, David worked with product management and engineering teams to build core network infrastructure products that secure and power the internet we benefit from today. David’s experience also includes working with clean technologies in the area of clean power generation, agritech, and Internet of Things infrastructure. Over the last five years, David has been focused on his latest venture, Strainprint Technologies, a data and analytics company focused on the medical cannabis industry. Strainprint has built the largest longitudinal medical cannabis dataset in the world, with a goal to develop an understanding of treatment behavior, interactions, and chemical drivers to guide future product development.
Kathy Borneman is a senior product owner who helps people enjoy their jobs again by engaging others in end-to-end decision making to deliver software and operational solutions that enhance the client experience and allow people to think and act strategically.
Charlie Campbell is an experienced problem solver with the ability to quickly dissect situations and recommend immediate actions to achieve resolution, liaise between technical and functional personnel to bridge the technology and communication gap, and work with diverse teams and resources to reach a common goal.
Yarrow Diamond is an experienced professional with expertise in enterprise strategy development, project portfolio management, and business process reengineering across financial services, healthcare and insurance, hospitality, and real estate environments. She has a master’s in Enterprise Architecture from Penn State University, LSSMBB, PMP, CSM, ITILv3.
Cari J. Faanes-Blakey has a history in software development and implementation as a Business Analyst and Project Manager for financial and taxation software vendors. Active in the International Institute of Business Analysis (IIBA), Cari participated on the writing team for the BA Body of Knowledge 3.0 and the certification exam.
Kieran Gobey is an IT professional with 24 years of experience, focused on business, technology, and systems analysis. He has split his career between external and internal customer-facing roles, and this has resulted in a true understanding of what is required to be a Professional Services Consultant. His problem-solving skills and ability to mentor others have resulted in successful software implementations.
Kieran’s specialties include deep system troubleshooting and analysis skills, facilitating communications to bring together participants effectively, mentoring, leadership, and organizational skills.
Rupert Kainzbauer is an experienced senior leader with a passion for defining and delivering products that deliver real customer and commercial benefit. With a team of highly experienced and motivated product managers, he has successfully led highly complex, multi-stakeholder payments initiatives, from proposition development and solution design through to market delivery. Their domain experience is in building online payment products in high-risk and emerging markets, remittance, prepaid cards, and mobile applications.
Saeed Khan has been working in high tech for 30 years in Canada and the US and has held several leadership roles in Product Management in that time. He speaks regularly at conferences and has been writing publicly about technology product management since 2005.
Through Transformation Labs, Saeed helps companies accelerate product success by working with product teams to improve their skills, practices, and processes. He is a cofounder of ProductCamp Toronto and currently runs a Meetup group and global Slack community called Product Leaders; the only global community of senior level product executives.
Hoi Kun Lo is an experienced change agent who can be found actively participating within the IIBA and WITI groups in Tampa, FL and a champion for Agile, architecture, diversity, and inclusion programs at Nielsen. She is currently a Product Owner in the Digital Strategy team within Nielsen Global Watch Technology.
Abhishek Mathur is a product management leader, an artificial intelligence practitioner, and an educator. He has led product management and engineering teams at Clarifai, IBM, and Kasisto to build a variety of artificial intelligence applications within the space of computer vision, natural language processing, and recommendation systems. Abhishek enjoys having deep conversations about the future of technology and helping aspiring product managers enter and accelerate their careers.
Jeff Meister is a technology advisor and product leader. He has more than 20 years of experience building and operating software products and the teams that build them. He has built products across a wide range of industries and has built and led large engineering, design, and product organizations.
Jeff most recently served as Senior Director of Product Management at Avanade, where he built and led the product management practice. This involved hiring and leading product managers, defining product management processes, solution shaping and engagement execution, and evangelizing the discipline through pitches, presentations, and speaking engagements.
Jeff holds a Bachelor of Applied Science (Electrical Engineering) and a Bachelor of Arts from the University of Waterloo, an MBA from INSEAD (Strategy), and certifications in product management, project management, and design thinking.
With over 10 years of experience in both the private and public sectors, Vincent Mirabelli possesses an impressive track record of improving, informing, and transforming business strategy and operations through process improvement, design and re-engineering, and the application of quality to business analysis, project management, and process improvement standards.
Oz Nazili is a product leader with a decade of experience in both building products and product teams. Having spent time at funded startups and large enterprises, he thinks often about the most effective way to deliver value to users. His core areas of interest include Lean MVP development and data-driven product growth.
Mike Starkey is a Director of Engineering at W.W. Grainger, currently focusing on operating model development, digital architecture, and building enterprise software. Prior to joining W.W. Grainger, Mike held a variety of technology consulting roles throughout the system delivery lifecycle spanning multiple industries such as healthcare, retail, manufacturing, and utilities with Fortune 500 companies.
Anant Tailor is a cofounder at Dream Payments where he currently serves as the COO and Head of Product, having responsibility for Product Strategy & Development, Client Delivery, Compliance, and Operations. He has 20+ years of experience building and operating organizations that deliver software products and solutions for consumers and businesses of varying sizes.
Prior to founding Dream Payments, Anant was the COO and Director of Client Services at DonRiver Inc, a technology strategy and software consultancy that he helped to build and scale into a global company with 100+ employees operating in seven countries.
Anant is a Professional Engineer with a Bachelor degree in Electrical Engineering from McMaster University and a certificate in Product Strategy & Management from the Kellogg School of Management at Northwestern University.
Angela Weller is an experienced Agile business analyst who collaborates with key stakeholders to attain their goals and contributes to the achievement of the company’s strategic objectives to ensure a competitive advantage. She excels when mediating or facilitating teams.
Build a product vision your organization can take from strategy through execution.
Deliver value at the scale of your organization through defining enterprise product families.
Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.
Improve collaboration and transparency with the business to minimize project failure.
Streamline business value delivery through the strategic adoption of DevOps practices.
Further the benefits of Agile by extending a scaled Agile framework to the business.
Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.
Shift security left to get into DevSecOps.
Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.
Execute a disciplined approach to rolling out Agile methods in the organization.
See an overview of the APM journey and how we can support the pieces in this journey.
Ensure your application portfolio delivers the best possible return on investment.
Effective maintenance ensures the long-term value of your applications.
Move beyond maintenance to ensuring exceptional value from your apps.
Delivering value starts with embracing what your department can do.
Empower the business to implement their own applications with a trusted business-IT relationship
Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.
Focus product delivery on business value–driven outcomes.
Be careful what you ask for, because you will probably get it.
Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.
Mature your IT department by measuring what matters.
Don’t let bad estimates ruin good work.
Commit to achievable software releases by grounding realistic expectations.
Expand on the financial model to give your initiative momentum.
Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.
Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.
Focus product delivery on business value-driven outcomes.
Have the right people, in the right place, at the right time.
Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.
Don’t just measure engagement, act on it
Set holistic measures to inspire employee performance.
“12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.
A, Karen. “20 Mental Models for Product Managers.” Product Management Insider, Medium, 2 Aug. 2018. Web.
Adams, Paul. “Product Teams: How to Build & Structure Product Teams for Growth.” Inside Intercom, 30 Oct. 2019. Web.
Aghina, Handscomb, Ludolph, West, and Abby Yip, “How to select and develop individuals for successful agile teams: A practical guide” McKinsey & Company 20 Dec. 2018. Web.
Agile Alliance. “Product Owner.” Agile Alliance. n.d. Web.
Ambler, Scott W. "Communication on Agile Software Teams“, Agile Modeling. 2001-2022. Web.
Ambysoft. “2018 IT Project Success Rates Survey Results.” Ambysoft. 2018. Web.
Banfield, Richard, et al. “On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team.” Pluralsight, 31 Jan. 2018. Web.
Beck, Beedle, van Bennekum, Cockburn, Cunningham, Fowler, Grenning, Highsmith, Hunt, Jeffries, Kern, Marick, Martin, Mellor, Schwaber, Sutherland, Thomas, "Manifesto for Agile Software Development." agilemanifesto.org. 2001
Berez, Steve, et al. “How to Plan and budget for Agile at Scale.” Bain & Company, 08 Oct 2019. Web
Blueprint. “10 Ways Requirements Can Sabotage Your Projects Right From the Start.” Blueprint. 2012. Web.
Breddels, Dajo, and Paul Kuijten. “Product Owner Value Game.” Agile2015 Conference, Agile Alliance 2015. Web.
Cagan, Martin. “Behind Every Great Product.” Silicon Valley Product Group. 2005. Web.
Cohn, Mike. “What Is a Product?” Mountain Goat Software. 6 Sept. 2016. Web.
Connellan, Thomas K. Inside the Magic Kingdom, Bard Press, 1997.
Curphey, Mark. “Product Definition.” SlideShare, 25 Feb. 2007. Web.
“Delegation Poker Product Image.” Management 3.0, n.d. Web.
Distel, Dominic, et al. “Finding the sweet spot in product-portfolio management.’ McKinsey, 4 Dec. 2020. Web
Eringa, Ron. “Evolution of the Product Owner.” RonEringa.com, 12 June 2016. Web.
Fernandes, Thaisa. “Spotify Squad Framework - Part I.” PM101, Medium, 6 Mar. 2017. Web.
Galen, Robert. “Measuring Product Ownership – What Does ‘Good’ Look Like?” RGalen Consulting, 5 Aug. 2015. Web.
Grenny, Joseph. “The Best Teams Hold Themselves Accountable.” Harvard Business Review, 30 May 2014. Web.
Halisky, Merland, and Luke Lackrone. “The Product Owner’s Universe.” Agile2016 Conference, Agile Alliance, 2016. Web.
IIBA "A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) v3" IIBA. 15 APR 2015
Kamer, Jurriaan. “How to Build Your Own ‘Spotify Model’.” The Ready, Medium, 9 Feb. 2018. Web.
Kendis Team. “Exploring Key Elements of Spotify’s Agile Scaling Model.” Scaled Agile Framework, Medium, 23 Jul. 2018. Web.
Lindstrom, Lowell. “7 Skills You Need to Be a Great Product Owner.” Scrum Alliance, n.d. Web.
Lukassen, Chris. “The Five Belts Of The Product Owner.” Xebia.com, 20 Sept. 2016. Web.
Mankins, Michael. “The Defining Elements of a Winning Culture.” Bain, 19 Dec. 2013. Web.
McCloskey, Heather. “Scaling Product Management: Secrets to Defeating Common Challenges.” ProductPlan, 12 July 2019. Web.
McCloskey, Heather. “When and How to Scale Your Product Team.” UserVoice, 21 Feb. 2017. Web. Mironov, Rich. “Scaling Up Product Manager/Owner Teams.” Rich Mironov's Product Bytes, Mironov Consulting, 12 Apr. 2014. Web.
Moore, Geoffrey A. “Crossing the Chasm, 3rd Edition.” Collins Business Essentials, 28 Jan 2014
Oh, Paul. “How Mastering Resilience Can Help Drive Agile Transformations.” Why Innovation!, 10 Oct. 2019.
Overeem, Barry. “A Product Owner Self-Assessment.” Barry Overeem, 6 Mar. 2017. Web.
Overeem, Barry. “Retrospective: Using the Team Radar.” Barry Overeem, 27 Feb. 2017. Web.
Pichler, Roman. “How to Scale the Scrum Product Owner.” Roman Pichler, 28 June 2016 . Web.
Pichler, Roman. “Product Management Framework.” Pichler Consulting Limited, 2014. Web.
Pichler, Roman. “Sprint Planning Tips for Product Owners.” LinkedIn, 4 Sept. 2018. Web.
Pichler, Roman. “What Is Product Management?” Pichler Consulting Limited, 26 Nov. 2014. Web.
PMI "The high cost of low performance: the essential role of communications“. PMI Pulse of Profession, May 2013.
Radigan,Dan. “Putting the ‘Flow' Back in Workflow With WIP Limits.” Atlassian, n.d. Web.
Rouse, Margaret. “Definition: product.” TechTarget, Sept. 2005. Web.
Schuurman, Robbin. “10 Tips for Product Owners on (Business) Value.” Scrum.org, 30 Nov. 2017. Web.
Schuurman, Robbin. “10 Tips for Product Owners on Agile Product Management.” Scrum.org, 28 Nov. 2017. Web.
Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Scrum.org, 5 Dec. 2017. Web.
Schuurman, Robbin. “10 Tips for Product Owners on the Product Vision.” Scrum.org, 29 Nov. 2017. Web.
Schuurman, Robbin. “Tips for Starting Product Owners.” Scrum.org, 27 Nov. 2017. Web.
Sharma, Rohit. “Scaling Product Teams the Structured Way.” Monetary Musings, 28 Nov. 2016. Web.
Shirazi, Reza. “Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong.” Austin Voice of Product, 2 Oct. 2018. Web.
Spitz, Enid R. “The Three Kinds of Empathy: Emotional, Cognitive, Compassionate.” The Three Kinds of Empathy: Emotional, Cognitive, Compassionate. Heartmanity. Web.
Steiner, Anne. “Start to Scale Your Product Management: Multiple Teams Working on Single Product.” Cprime, 6 Aug. 2019. Web.
“The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2016. Web.
“The Standish Group 2015 Chaos Report.” The Standish Group. 2015. Web.
Theus, Andre. “When Should You Scale the Product Management Team?” ProductPlan, 7 May 2019. Web.
Tolonen, Arto. “Scaling Product Management in a Single Product Company.” Smartly.io, 26 Apr. 2018. Web.
Ulrich, Catherine. “The 6 Types of Product Managers. Which One Do You Need?” Medium, 19 Dec. 2017. Web.
Verwijs, Christiaan. “Retrospective: Do The Team Radar.” The Liberators, Medium, 10 Feb. 2017. Web.
Vlaanderen, Kevin. “Towards Agile Product and Portfolio Management”. Academia.edu. 2010. Web.
2009 Business Analysis Benchmark Study.” IAG Consulting, 2009. Web.
Armel, Kate. “Data-driven Estimation, Management Lead to High Quality.” Quantitative Software Management Inc, 2015. Web.
Bradley, Marty. “Agile Estimation Guidance.” Leading Agile, 30 Aug. 2016. Web. Feb. 2019.
CollabNet and VersionOne. “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.
Craveiro, João. “Marty meets Martin: connecting the two triads of Product Management.” Product Coalition, 18 Nov. 2017. Accessed Feb. 2019.
“Enablers.” Scaled Agile, n.d. Web.
“Epic.” Scaled Agile, n.d. Web.
Fischer, Christian. “Scrum Compact.” Itemis, n.d. Web. Feb. 2019.
Hackshall, Robin. “Product Backlog Refinement.” Scrum Alliance, 9 Oct. 2014. Accessed Feb. 2019.
Hartman, Bob. “New to agile? INVEST in good user stories.” Agile For All, 14 May 2009. Web.
Huether, Derek. “Cheat Sheet for Product Backlog Refinement (Grooming).” Leading Agile, 2 Nov. 2013. Accessed Feb. 2019.
Karlsson, Johan. “Backlog Grooming: Must-Know Tips for High-Value Products.” Perforce, 18 May 2018. Accessed Feb. 2019.
Khan, Saeed. “Good Bye ‘Product Owner’, Hello ‘Backlog Manager.’” On Product Management, 27 June 2011. Accessed Feb. 2019.
Khan, Saeed. “Let’s End the Confusion: A Product Owner is NOT a Product Manager.” On Product Management, 14 July 2017. Accessed Feb. 2019.
Lawrence, Richard. “New Story Splitting Resource.” Agile For All. 27 Jan. 2012. Web. Feb. 2019.
Leffingwell, Dean. “SAFe 4.0.” Scaled Agile Inc, 2017. Accessed Feb. 2019.
Lucero, Mario. “Product Backlog – Deep Model.” Agilelucero, 8 Oct. 2014. Web.
“PI Planning.” Scaled Agile, n.d. Web.
Pichler, Roman. “The Product Roadmap and the Product Backlog.” Roman Pichler, 9 Sept. 2014. Accessed Feb. 2019.
Rubin, Kenneth S. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Pearson Education, 2012.
Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Burozeven, 20 Nov. 2017. Accessed Feb. 2019.
Srinivasan, Vibhu. “Product Backlog Management: Tips from a Seasoned Product Owner.” Agile Alliance, n.d. Accessed Feb. 2019.
Todaro, Dave. “Splitting Epics and User Stories.” Ascendle, n.d. Accessed Feb. 2019.
“What Characteristics Make Good Agile Acceptance Criteria?” Segue Technologies, 3 Sept. 2015. Web. Feb. 2019.
Bastow, Janna. “Creating Agile Product roadmaps Everyone Understands.” ProdPad, 22 Mar. 2017. Accessed Sept. 2018.
Bastow, Janna. “The Product Tree Game: Our Favorite Way To Prioritize Features.” ProdPad, 21 Feb. 2016. Accessed Sept. 2018.
Chernak, Yuri. “Requirements Reuse: The State of the Practice.” 2012 IEEE International Conference, 12 June 2012, Herzliya, Israel. Web.
Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Accessed 20 Nov. 2017.
Harrin, Elizabeth. “Learn What a Project Milestone Is.” The Balance Careers, 10 May 2018. Accessed Sept. 2018.
“How to create a product roadmap.” Roadmunk, n.d. Accessed Sept. 2018.
Johnson, Steve. “How to Master the 3 Horizons of Product Strategy.” Aha!, 24 Sept. 2015. Accessed Sept. 2018.
Johnson, Steve. “The Product Roadmap vs. the Technology Roadmap.” Aha!, 23 June 2016. Accessed Sept. 2018
Juncal, Shaun. “How Should You Set Your Product Roadmap Timeframes?” ProductPlan, Web. Sept. 2018.
Leffingwell, Dean. “SAFe 4.0.” Scaled Agile, 2017. Web.
Maurya, Ash. “What is a Minimum Viable Product (MVP).” Leanstack, 12 June 2017. Accessed Sept. 2018.
Pichler, Roman. “10 Tips for Creating an Agile Product Roadmap.” Roman Pichler, 20 July 2016. Accessed Sept. 2018.
Pichler, Roman. Strategize: Product Strategy and Product Roadmap Practices for the Digital Age. Pichler Consulting, 2016.
“Product Roadmap Contents: What Should You Include?” ProductPlan, n.d. Accessed 20 Nov. 2017.
Saez, Andrea. “Why Your Roadmap Is Not a Release Plan.” ProdPad, 23 October 2015. Accessed Sept. 2018.
Schuurman, Robbin. “Tips for Agile product roadmaps & product roadmap examples.” Scrum.org, 7 Dec. 2017. Accessed Sept. 2018.
Adams, Paul. “The Future Product Canvas.” Inside Intercom, 10 Jan. 2014. Web.
“Aligning IT Funding Models to the Pace of Technology Change.” EDUCAUSE, 14 Dec. 2015. Web.
Altman, Igor. “Metrics: Gone Bad.” OpenView, 10 Nov. 2009. Web.
Barry, Richard. “The Product Vision Canvas – a Strategic Tool in Developing a Successful Business.” Polymorph, 2019. Web.
“Business Canvas – Business Models & Value Propositions.” Strategyzer, 2019. Web.
“Business Model Canvas.” Wikipedia: The Free Encyclopedia, 4 Aug. 2019. Web.
Charak, Dinker. “Idea to Product: The Working Model.” ThoughtWorks, 13 July 2017. Web.
Charak, Dinker. “Product Management Canvas - Product in a Snapshot.” Dinker Charak, 29 May 2017. Web.
Chudley, James. “Practical Steps in Determining Your Product Vision (Product Tank Bristol, Oct. 2018).” LinkedIn SlideShare. Uploaded by cxpartners, 2 Nov. 2018. Web.
Cowan, Alex. “The 20 Minute Business Plan: Business Model Canvas Made Easy.” COWAN+, 2019. Web.
Craig, Desiree. “So You've Decided To Become A Product Manager.” Start it up, Medium, 2 June 2019. Web.
“Create an Aha! Business Model Canvas Strategic Model.” Aha! Support, 2019. Web.
Eick, Stephen. “Does Code Decay? Assessing the Evidence from Change Management Data.” IEEE Transactions on Software Engineering, vol. 27, no. 1, Jan. 2001, pp. 1-12. Web.
Eriksson, Martin. “The next Product Canvas.” Mind the Product, 22 Nov. 2013. Web.
“Experience Canvas: a Lean Approach: Atlassian Team Playbook.” Atlassian, 2019. Web.
Freeman, James. “How to Make a Product Canvas – Visualize Your Product Plan.” Edraw, 23 Dec. 2019. Web.
Fuchs, Danny. “Measure What Matters: 5 Best Practices from Performance Management Leaders.” OpenGov, 8 Aug. 2018. Web.
Gorisse, Willem. “A Practical Guide to the Product Canvas.” Mendix, 28 Mar. 2017. Web.
Gothelf, Jeff. “The Lean UX Canvas.” Jeff Gothelf, 15 Dec. 2016. Web.
Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product: Getting Started.” EBG Consulting, 15 Jan. 2019. Web.
Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product's Core Requirements.” EBG Consulting, 4 Feb. 2019. Web.
Gray, Mark Krishan. “Should I Use the Business Model Canvas or the Lean Canvas?” Blog, Medium.com, 2019. Web.
Hanby, Jeff. "Software Maintenance: Understanding and Estimating Costs." LookFar, 21 Oct. 2016. Web.
“How do you define a product?” Scrum.org, 4 Apr 2017, Web
Juncal, Shaun. “How to Build a Product Roadmap Based on a Business Model Canvas.” ProductPlan, 19 June 2019. Web.
“Lean Canvas Intro - Uber Example.” YouTube, uploaded by Railsware Product Academy, 12 Oct. 2018. Web.
“Lesson 6: Product Canvas.” ProdPad Help Center, 2019. Web.
Lucero, Mario. “The Product Canvas.” Agilelucero.com, 22 June 2015. Web.
Maurya, Ash. “Create a New Lean Canvas.” Canvanizer, 2019. Web.
Maurya, Ash. “Don't Write a Business Plan. Create a Lean Canvas Instead.” LEANSTACK, 2019. Web.
Maurya, Ash. “Why Lean Canvas vs Business Model Canvas?” Medium, 27 Feb. 2012. Web.
Mirabelli, Vincent. “The Project Value Canvas.” Vincent Mirabelli, 2019. Web.
Mishra, LN. “Business Analysis Canvas – The Ultimate Enterprise Architecture.” BA Times, 19 June 2019. Web.
Muller. Jerry Z. “Why performance metrics isn’t always the best way to judge performance.” Fast Company, 3 April 2019. Web.
Perri, Melissa. “What Is Good Product Strategy?” Melissa Perri, 14 July 2016. Web.
Pichler, Roman. “A Product Canvas for Agile Product Management, Lean UX, Lean Startup.” Roman Pichler, 16 July 2012. Web.
Pichler, Roman. “Introducing the Product Canvas.” JAXenter, 15 Jan. 2013. Web.
Pichler, Roman. “Roman's Product Canvas: Introduction.” YouTube, uploaded by Roman Pichler, 3 Mar. 2017. Web.
Pichler, Roman. “The Agile Vision Board: Vision and Product Strategy.” Roman Pichler, 10 May 2011. Web.
Pichler, Roman. “The Product Canvas – Template.” Roman Pichler, 11 Oct. 2016. Web.
Pichler, Roman. “The Product Canvas Tutorial V1.0.” LinkedIn SlideShare. Uploaded by Roman Pichler, 14 Feb. 2013. Web.
Pichler, Roman. “The Product Vision Board: Introduction.” YouTube uploaded by Roman Pichler, 3 Mar. 2017. Web.
“Product Canvas PowerPoint Template.” SlideModel, 2019. Web.
“Product Canvas.” SketchBubble, 2019, Web.
“Product Canvas.” YouTube, uploaded by Wojciech Szramowski, 18 May 2016. Web.
“Product Roadmap Software to Help You Plan, Visualize, and Share Your Product Roadmap.” Productboard, 2019. Web.
Roggero, Giulio. “Product Canvas Step-by-Step.” LinkedIn SlideShare, uploaded by Giulio Roggero, 18 May 2013. Web.
Royce, Dr. Winston W. “Managing the Development of Large Software Systems.” Scf.usc.edu, 1970. Web.
Ryan, Dustin. “The Product Canvas.” Qdivision, Medium, 20 June 2017. Web.
Snow, Darryl. “Product Vision Board.” Medium, 6 May 2017. Web.
Stanislav, Shymansky. “Lean Canvas – a Tool Your Startup Needs Instead of a Business Plan.” Railsware, 12 Oct. 2018. Web.
Stanislav, Shymansky. “Lean Canvas Examples of Multi-Billion Startups.” Railsware, 20 Feb. 2019. Web.
“The Product Vision Canvas.” YouTube, Uploaded by Tom Miskin, 20 May 2019. Web.
Tranter, Leon. “Agile Metrics: the Ultimate Guide.” Extreme Uncertainty, n.d. Web.
“Using Business Model Canvas to Launch a Technology Startup or Improve Established Operating Model.” AltexSoft, 27 July 2018. Web.
Veyrat, Pierre. “Lean Business Model Canvas: Examples + 3 Pillars + MVP + Agile.” HEFLO BPM, 10 Mar. 2017. Web.
“What Are Software Metrics and How Can You Track Them?” Stackify, 16 Sept. 2017. Web
“What Is a Product Vision?” Aha!, 2019. Web.
Success depends on IT initiatives clearly aligned to business goals, IT excellence, and driving technology innovation.
Includes a "Strategy on a page" template
Governance isn't optional, so keep it simple and make it flexible.
Unlock the full value of your service catalog with technical components.
Ensure your application portfolio delivers the best possible return on investment.
Tools and advice you need to be successful with Agile.
Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.
Streamline business value delivery through the strategic adoption of DevOps practices.
Being Agile isn't about processes, it's about people.
Projects and products are not mutually exclusive.
Align your organization on the practices to deliver what matters most.
Build a product vision your organization can take from strategy through execution.
Deliver value at the scale of your organization through defining enterprise product families.
Strengthen the product owner's role in your organization by focusing on core capabilities and proper alignment.
Focus product delivery on business value-driven outcomes.
Mature your IT department by measuring what matters.
Be careful what you ask for because you will probably get it.
Expand on the financial model to give your initiative momentum.
Governance isn't optional, so keep it simple and make it flexible.
Embed benefits realization into your governance process to prioritize IT spending and confirm the value of IT.
Innovate and transform your business models with digital platforms.
Building a digital strategy is only half the battle: create a systematic roadmap of technology initiatives to execute the strategy and drive digital transformation.
Focus product delivery on business value-driven outcomes.
Mature your IT department by measuring what matters.
Right-size the guidelines of your requirements gathering process.
Back to basics: great products are built on great requirements.
Build quality into every step of your SDLC.
Drive software delivery throughput and quality confidence by extending your automation test coverage.
Make the case to manage technical debt in terms of business impact.
Avoid project failure by keeping the "B" in BPM.
Optimize and automate your business processes with a user-centric approach.
Don't waste your time focusing on the "as is." Focus on the improvements and the "to be."
Build trust by right-sizing your process using appropriate governance.
Effective maintenance ensures the long-term value of your applications.
Move beyond maintenance to ensure exceptional value from your apps.
Right-size your change management process.
Make the case to manage technical debt in terms of business impact.
Drive down your delivery time by eliminating development inefficiencies and bottlenecks while maintaining high quality.
Leverage knowledge of the business to become a strategic IT partner.
Create value by aligning your strategy to business goals and business risks.
Enhance your overall security posture with a defensible and prescriptive policy suite.
Leverage risk- and role-based access control to quantify and simplify the IAM process.
Empower the business to implement their own applications with a trusted business-IT relationship.
Ensure your software systems solution is architected to reflect stakeholders’ short-and long-term needs.
Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.
Support RPA delivery with strong collaboration and management foundations.
Embrace the symbiotic relationship between the human and digital workforce.
Enable the business to achieve operational excellence, client intimacy, and product leadership with an innovative, Agile, and fit-for-purpose data architecture practice.
Deliver actionable business insights by creating a business-aligned reporting and analytics strategy.
Quality data drives quality business decisions.
Journey to the data marketplace ecosystems.
Key to building and fostering a data-driven culture.
Level the table before assembling the application integration puzzle or risk losing pieces.
Other choices entered by respondents:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Align on GTM vision and plan; craft initial strategy.
Confidence that market opportunity is sufficient.
Deeper buyer understanding to drive product design and messaging and launch campaign asset design.
Steering committee approval for next phase.
1.1 Outline a vision for GTM, roles required, identify Steering Committee lead, workstream leads, and teams.
1.2 Capture GTM strategy hypothesis by working through initial draft of the Go-to-Market Strategy Presentation and business case.
1.3 Capture team knowledge on buyer persona and journey and competitive SWOT.
1.4 Identify info./data gaps, sources, and plan for capturing/gathering including buyer interviews.
Documented Steering Committee and Working team.
Aligned on GTM vision and process.
Documented buyer persona and journey. Competitive SWOT analysis.
Document team knowledge on initial GTM strategy, buyer personas, and business case.
Identify Initial Business Case, Sales Forecast, and Launch Plan.
Confidence in size of market opportunity.
Alignment of Sales and Product on product forecast.
Assessment of marketing tech stack.
Initial business case.
2.1 Size Product Market Opportunity and initial revenue forecast.
2.2 Craft initial product hypothesis from buyer interviews including feature priorities, pricing, packaging, competitive differentiation, channel/route to market.
2.3 Craft initial launch campaign, product release and sales and CX readiness plans.
2.4 Identify launch budgets across each investment area.
2.5 Discuss initial product launch business case and key activities.
Product Serviceable Obtainable Market (SOM), Serviceable Available Market (SAM) and Total Available Market (TAM).
Definition of product-market fit, uniqueness, and competitive differentiation.
Preliminary campaign, targets, and readiness plans.
Incremental budgets for each key stakeholder area.
Preliminary product launch business case.
Develop final Launch plans and budgets in product and marketing.
Align Product release/launch plans with the marketing campaign for launch.
Understand incremental budgets from product and marketing for launch.
3.1 Apply product interviews to scope, MVP, roadmap, competitive differentiation, pricing, feature prioritization, routes to market, and sales forecast.
3.2 Develop a more detailed launch campaign plan complete with asset-types, messaging, digital plan to support buyer journey, media buy plan and campaign metrics.
Minimally Viable Product defined with feature prioritization. Product competitive differentiation documented Routes to market identified Sales forecast aligned with product team expectations.
Marketing campaign launch plan Content marketing asset-creation/acquisition plan Campaign targets and metrics.
Develop final Launch Plans and budgets for remaining areas.
Align Product release/launch plans with the marketing campaign for launch.
Understand incremental budgets from Product and Marketing for launch.
4.1 Develop detailed launch/readiness plans with final budgets for: Sales enablement , Sales training, Tech stack, Customer onboarding & success, Product marketing, AR, PR, Corp Comms/Internal Comms, Customer Events, Employee Events, etc.
Detailed launch plans, budgets for Product Marketing, Sales, Customer Success, and AR/PR/Corp. Comms.
To gain approval to move to Build and Launch phases.
Align business case with Steering Committee expectations
Approvals to Build and Launch targeted offering
5.1 Review final launch/readiness plans with final budgets for all key areas.
5.2 Move all key findings into Steering Committee presentation slides.
5.3 Present to Steering Committee; receive feedback.
5.4 Incorporate Steering Committee feedback; update finial business case.
Combined budgets across all areas. Final launch/readiness plans.
Final Steering Committee-facing slides.
Final approvals for Build and Launch.
| Section | Title |
| 1 | Executive Brief
|
| 2 | Build baseline market, buyer, and competitive insights
|
| 3 | Design initial product and business case
|
| 4 | Align stakeholder plans to prep for build
|
A successful go-to-market (GTM) strategy aligns marketing, product, sales and customer success, sees decision making based on deep buyer understanding, and tests many basic assumptions often overlooked in today’s agile-driven product development/management environment.
The disciplines you build using our methodology will not only support your team’s effort building and launching more successful products, but also can be modified for use in other strategic initiatives such as branding, M&A integration, expanding into new markets, and other initiatives that require a cross-functional and multidisciplined process.
|
Jeff Golterman
|
An ineffective go-to-market strategy is often a root cause of:
|
Hurdles to go-to-market success include:
|
Apply SoftwareReviews approach for greater GTM success.
Our blueprint is designed to help you:
|
Creating a compelling go-to-market strategy, and keeping it current, is a critical software company function – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.
A GTM Strategy is not all art and not all science but requires both. Software leaders will establish a set of core capabilities upon which they will plan, build, launch and manage product success. Executives, when resourcing their GTM strategies, will begin with:
|
|
|
SoftwareReviews Advisory Insight:
Marketers who get GTM Strategy “right” give themselves a 50% greater chance of Build and Launch success.
“Figuring out a Go-to-Market approach is no trivial exercise – it separates the companies that will be successful and sustainable from those that won’t.” (Harvard Business Review)
Marketers – Large and Small – will further test their GTM Strategy strength by asking “Are we missing any of the following?”
SoftwareReviews Advisory Insight:
Marketers will go through the GTM Strategy process together across all disciplines at least once in order to establish a consistent process, make key foundational decisions (e.g. tech stack, channel strategy, pricing structure, etc.), and assess strengths and weaknesses to be addressed. Future releases to existing products don’t need to be re-thought but instead check-listed against prior foundational decisions.
Is Your GTM Strategy Led and Staffed Properly?
Our research shows a more effective GTM Strategy delivers key benefits, including:
SoftwareReviews Advisory Insight:
|
“Go-to-Market Strategies aren’t just for new products or services, they can also be used for:
And while each GTM strategy is unique, there are a series of steps that every product marketer should follow.” (Product Marketing Alliance) |
Marketers, in order to optimize a go-to-market strategy, will:
This research is designed for:
|
This research will help you:
|
This research will also assist:
|
This research will help them:
|
1 |
Build baseline market, buyer, and competitive insights
Sizing your opportunity, building deep buyer understanding, competitive differentiation, and routes to market are fundamental first steps. |
|
2 |
Design initial product and business case
Validate positioning and messaging against brand, develop packaging and pricing, and develop digital approach, launch campaign approach and supporting budgets across all areas. |
|
3 |
Align stakeholder plans to prep for build
Rationalize product release and concept to sales/financial plan and further develop customer success, PR/AR, MarTech, and analytics/metrics plans. |
| 1.Build baseline market, buyer, and competitive insights | 2. Design initial product and business case | 3. Align stakeholder plans to prep for build | |
| Phase Steps |
|
|
|
| Phase Outcomes |
|
|
|
Having an updated and compelling go-to-market strategy is a critical capability – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.
Many marketers experiencing the value of the GTM Steering Committee extend its use into a “Product and Pricing Council” (PPC) in order to move product-related decision making from ad-hoc to structured, and to reinforce GTM Strategy guardrails and best practices across the company.
Marketers that collaborate closely with Marketing Ops., Sales Ops., and IT early in the process of a go-to-market strategy will be best able to assess whether current website/digital, marketing applications, CRM/sales automation apps, and tools can support the complete Go-to-Market process effectively.
Marketers will go through the GTM Strategy process together across all disciplines at least once in order to establish a consistent process, make key foundational decisions (e.g. tech stack, channel strategy, pricing structure, etc.), and assess strengths and weaknesses to be addressed.
Future releases to existing products don’t need be re-thought but instead check-listed against prior foundational decisions.
Marketers who get GTM Strategy “right” give themselves a 50% greater chance of build and launch success.
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Key deliverable:
Go-to-Market Strategy Presentation TemplateCapture key findings for your GTM Strategy within the Go-to-Market Strategy Presentation Template.
|
Go-to-Market Strategy RACI and Launch Checklist WorkbookIncludes a RACI model and launch checklist that helps scope your working team’s roles and responsibilities. |
|
Go-to-Market Strategy Cost Budget and Revenue Forecast WorkbookCapture launch incremental costs that, when weighed against the forecasted revenue, illustrate gross margins as a crucial part of the business case. |
|
Product Market Opportunity SizingWhile not a deliverable of this blueprint per se, the Product Market Opportunity blueprint is required. |
|
This blueprint calls for downloading the following additional blueprint: | ||
Buyer Persona and Journey blueprintWhile not a deliverable of this blueprint per se, the Buyer Persona and Journey blueprint is required |
|
|||
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
| Included within advisory membership | Optional add-ons | ||
A Guided Implementation (GI) is a series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization.
For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst.
Your engagement managers will work with you to schedule analyst calls.
What does our GI on Build a More Effective Go-to-Market Strategy look like?
Build baseline market, buyer, and competitive insights |
Design initial product and business case |
Align stakeholder plans to prep for build |
| Call #1: Share GTM vision and outline team activities for the GTM Strategy process. Plan next call – 1 week.
Call #2: Outline product market opportunity approach and steps to complete. Plan next call – 1 week. Call #3: Hold a series of inquiries to do a modernization check on tech stack. Plan next call – 2 weeks. Call #4: Discuss buyer interview process, persona, and journey steps. Plan next call – 2 weeks. Call #5: Outline competitive differentiation analysis, routes to market, and review of to-date business case. Plan next call – 1 week. |
Call #6: Discuss brand strength/weakness, pricing, and packaging approach. Plan next call – 3 weeks.
Call #7: Outline needs to craft assets with right messaging across campaign launch plan and budget. Outline needs to create plans and budgets across rest of marketing, sales, CX, and product. Plan next call – 1 week. Call #8: Review template and approach for initial business case and sales and product alignment. Plan next call – 1 week. Call #9: Review initial business case and launch plans across marketing, sales, CX, and product. Plan next call – 1 week. |
Call #10: Discuss plans/needs/budgets for tech stack modernization. Plan next call – 3 days.
Call #11: Discuss plans/needs/budgets for CX readiness for launch. Plan next call – 3 days. Call #12: Discuss plans/needs/budgets for digital readiness for launch. Plan next call – 3 days. Call #13: Discuss plans/needs/budgets for marketing and sales readiness for launch. Plan next call – 3 days. Call #14: Review final business case and coach on Steering Committee Presentation. Plan next call – 1 week. |
A Go-to-Market Workshop Overview |
Contact your engagement manager for more information. |
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
Align on GTM Vision & Plan, Craft Initial Strategy |
Identify Initial Business Case, Sales Forecast and Launch Plan |
Develop Launch Plans (i of ii) |
Develop Launch Plans (ii of ii) |
Present Final Business Case to Steering Committee |
|
| Activities |
1.1 Outline a vision for GTM and roles required, identify Steering Committee lead, workstream leads, and teams. 1.2 Capture GTM strategy hypothesis by working through initial draft of GTM Strategy Presentation and business case. 1.3 Capture team knowledge on buyer persona and journey and competitive SWOT. 1.4 Identify information/data gaps and sources and plan for capturing/gathering including buyer interviews. Plan next day 2-3 weeks after buyer persona/journey interviews. |
2.1 Size product market opportunity and initial revenue forecast. 2.2 Craft initial product hypothesis from buyer interviews including feature priorities, pricing, packaging, competitive differentiation, and channel/route to market. 2.3 Craft initial launch campaign, product release, sales, and CX readiness plans. 2.4 Identify launch budgets across each investment area. 2.5 Discuss initial product launch business case and key activities. Plan next day 2-3 weeks after product hypothesis-validation interviews with customers and prospects. |
3.1 Apply product interviews to scope, MVP, and roadmap competitive differentiation, pricing, feature prioritization, routes to market and sales forecast. 3.2 Develop more detailed launch campaign plan complete with asset-types, messaging, digital plan to support buyer journey, media buy plan and campaign metrics. |
4.1 Develop detailed launch/readiness plans with final budgets for:
|
5.1 Review final launch/readiness plans with final budgets for all key areas. 5.2 Move all key findings up into Steering Committee presentation slides. 5.3 Present to Steering Committee, receive feedback. 5.4 incorporate Steering Committee feedback; update finial business case. |
| Deliverables |
|
|
|
|
|
| Phase 1
1.1 Select Steering Cmte/team, build aligned vision for GTM 1.2 Buyer personas, journey, initial messaging 1.3 Build initial product hypothesis 1.4 Size market opportunity 1.5 Outline digital/tech requirements 1.6 Competitive SWOT 1.7 Select routes to market 1.8 Craft GTM Strategy deck |
Phase 2
2.1 Brand consistency check 2.2 Formulate packaging and pricing 2.3 Craft buyer-valid product concept 2.4 Build campaign plan and targets 2.5 Develop cost budgets across all areas 2.6 Draft product business case 2.7 Update GTM Strategy deck |
Phase 3
3.1 Assess tech/tools support for all GTM phases 3.2 Outline sales enablement and Customer Success plan 3.3 Build awareness plan 3.4 Finalize business case 3.5 Final GTM Plan deck |
| Go-to-Market Strategy Presentation Template | Go-to-Market Strategy RACI and Launch Checklist Workbook | Buyer Persona and Journey blueprint | Product Market Opportunity Sizing Workbook |
|
|
|
|
Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
|
Use the Go-to-Market Strategy RACI and Launch Checklist Workbook to:
|
Use the Buyer Persona and Journey blueprint to:
|
Use the Product Market Opportunity Sizing blueprint to:
|
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Input: Steering Committee interviews, Recognition of Steering Committee interest
Output: List of GTM Strategy stakeholders as Steering Committee members
Materials: Following slide outlining the key responsibilities required of the Steering Committee members, A high-Level timeline of GTM Strategy phases and key milestone meetings
Participants: CMO, sponsoring executive, Functional leads - Marketing, Product Marketing, Product Management, Sales, Customer Success
SoftwareReviews Advisory Insight:
Go To Market Steering Committee’s can become an important ongoing body to steer overall product, pricing and other GTM decisions. Some companies have done so by adding the CEO and CFO to this committee and designated it as a permanent body that meets monthly to give go/no decisions to “all things product related” across all products and business units. Leaders that use this tool well, stay aligned, demonstrate consistency across business units and leverage outcomes across business units to drive greater scale.
Understand that aligning key stakeholders around the way your company goes to market is an essential company function.
| Title | Key Roles Supporting an Effective Go-to-Market Strategy |
| Go-to-Market Strategy Sponsor |
|
| Go-to-Market Strategy Program Manager |
|
| Functional Workstream Leads |
|
| Digital, Marketing/Sales Ops/IT Team |
|
| Steering Committee |
|
Download the Go-to-Market Strategy Presentation Template
Download the Go-to-Market Strategy RACI and Launch Checklist Workbook |
Success improves when you align & assign
|
Consider the skills and knowledge required for GTM Strategy as well as build and launch functions when choosing teams.
Work with functional leaders to select workstream leads
Workstream leads should be strong in collaboration, coordination of effort among others, knowledgeable about their respective function, and highly organized as they may be managing a team of colleagues within their function to deliver their responsible portion of GTM.
Required Skills/Knowledge
|
Suggested Functions
|
| Roles Required in Successful GTM Strategy | |
| For SMB companies, as employees wear many different hats, assign people that have the requisite skills and knowledge vs. the role title. |
|
Download the Go-to-Market Strategy RACI and Launch Checklist Workbook
Input: Stakeholders and leaders across the various functions outlined to the left
Output: List of go-to-market strategy team members
Materials: Go-to-Market Strategy Workbook
Participants: Initiative Manager, CMO, Sponsoring executive, Departmental Leads – Sales, Marketing, Product Marketing, Product Management (and others), Marketing Applications Director, Senior Digital Business Analyst
Download the Go-To-Market Strategy RACI and Launch Checklist Workbook
1 hour
GTM Program Managers:
Download the Go-to-Market Strategy Presentation Template
Input: N/A
Output: Team understanding of an effective go-to-market strategy, team roles and responsibilities and initial product and launch concept.
Materials: The Build a More Effective Go-to-Market Strategy Executive Brief
Participants: GTM Program Manager, CMO, Sponsoring executive, Workstream leads
Go to the Build a More Effective Go-to-Market Strategy Executive Brief
Program managers will:
Program managers & workstream leads will:
![]() Download the Go-to-Market Strategy RACI and Launch Checklist Workbook | Continuous improvement is enabled with a repeatable process
|
Work with your workstream leads to see them develop a detailed project plan that spans all their deliverables for a GTM Strategy
|
Using the Go-to-Market Strategy Presentation:
3-4 hours Initial, 1-2 hours weekly
|
Download the Go-to-Market Strategy Presentation Template
Download the Go-To-Market Strategy RACI and Launch Checklist Workbook
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Documenting buyer personas has several essential benefits to marketing, sales, and product teams:
|
“It’s easier buying gifts for your best friend or partner than it is for a stranger, right? You know their likes and dislikes, you know the kind of gifts they’ll have use for, or the kinds of gifts they’ll get a kick out of. Customer personas work the same way. By knowing what your customer wants and needs, you can present them with content targeted specifically to those wants and needs.” (Emma Bilardi, Product Marketing Alliance, July 8, 2020) |
A well defined buyer persona enables us to:
| Functional – “to find them” | ||||
| Job Role | Titles | Org Chart Dynamics | Buying Center | Firmographics |
| Emotive – “what they do and jobs to be done” | |||
| Initiatives – What programs/projects the persona is tasked with and what are their feelings and aspirations about these initiatives? Motivations? Build credibility? Get promoted? | Challenges – Identify the business issues, problems, and pain points, that impede attainment of objectives. What are their fears, uncertainties, and doubts about these challenges? | Buyer need – They may have multiple needs; which need is most likely met with the offering? | Terminology – What are the keywords/phrases they organically use to discuss the buyer need or business issue? |
| Decision Criteria – “how they decide” | |
| Buyer role – List decision-making criteria and power level. The five common buyer roles are champion, influencer, decision maker, user, and ratifier (purchaser/negotiator). | Evaluation and decision criteria – The lens, either strategic, financial, or operational, through which the persona evaluates the impact of purchase. |
| Solution Attributes – “what the ideal solution looks like” | ||||||
| Steps in “Jobs to be Done” | Elements of the “Ideal Solution” | Business outcomes from ideal solution | Opportunity scope – other potential users | Acceptable price for value delivered | Alternatives that see consideration | Solution sourcing – channel, where to buy |
| Behavioral Attributes – “how to approach them successfully” | ||
| Content preferences – List the persona’s content preferences, could be blog, infographic, demo, video, or other, vs. long-form assets (e.g. white paper, presentation, analyst report). | Interaction preferences – Which among in-person meetings, phone calls, emails, video conferencing, conducting research via web, mobile, and social. | Watering holes – Which physical or virtual places do they go to network or exchange info with peers e.g. LinkedIn, etc. |
If you haven’t re-mapped buyer journeys recently, you may be losing to competitors that have. Leaders re-map buyer journeys frequently.
SoftwareReviews Advisory Insight:
|
“Two out of three B2B buyers today prefer remote human interactions or digital self service.
And during August 2020-February 2021, use of digital self service leapt by 10%” (McKinsey & Company, 2021.) |
A lack of buyer persona and journey understanding is frequently the root cause of the following symptoms:
These challenges are often attributed to messaging and talk tracks that fail to resonate with prospects and products that fail to meet the needs of targeted buyers. SoftwareReviews Advisory Insight:
|
“Forty-four percent of B2B marketers have already discovered the power of personas.” (Boardview, 2016.) |
12 - 15 Hours, over course of 2-3 weeks
Input: Insights from Sellers, Insights from customers and prospects
Output: Completed slides outlining buyer persona, buyer journey, overall product concept, and detailed features and capabilities needed
Materials: Create a Buyer Persona and Journey blueprint, Go-to-Market Strategy Presentation
Participants: Product management lead, GTM Program Manager, Select sellers, Workstream leads that wish to participate in interviews
Download the Go-to-Market Strategy Presentation Template
Download the Create a Buyer Journey and Persona Journey blueprint
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
2 Hours
Input: Insights from Sellers, Insights from customers and prospects
Output: Completed slides outlining product concept and detailed features and capabilities needed
Materials: Go-to-Market Strategy Presentation
Participants: Product management lead, GTM Program Manager, Select sellers, Workstream leads that wish to participate in interviews
Download the Go-to-Market Strategy Presentation Template
At this early stage, summarize findings from concept interviews to guide further discovery, as well as go-to-market concepts and initial campaign concepts in upcoming steps.
Job Function AttributesTarget Persona(s):
Firmographics:
|
Emotive AttributesInitiative descriptions: Buyer description of project/program/initiative. What terms used? Business issues: What are the business issues related to this initiative? How is this linked to a CEO-level mission-critical priority? Key challenges: What business/process hurdles need to be overcome? Pain points: What are the pain points to the business/personally in their role related to the challenges that drove them to seek a solution? Success motivations: What motivates our persona to be successful in this area? |
Solution and OpportunitySteps to do the job: What are the needed steps to do this job today? Key features and capabilities: What are the key solution elements the buyer sees in the ideal solution? (See additional detail slide with prioritized features.) Key business outcomes: In business terms, what value (e.g. cost/time/FTE savings, deals won, smarter, etc.) is expected by implementing this solution? Other users/opportunities: Are there other users in the role team/company that would benefit from this solution? |
Pricing/PackagingWhat is an acceptable price to pay for this solution? Based on financial benefits and ROI hurdles, what’s a good price to pay? A high price? What are packaging options? Any competitive pricing to compare? |
Alternatives/CompetitionWhat are alternatives to this solution: How else would you solve this problem? Are there other solutions you’ve investigated? |
Channel PreferencesWhere would it be most convenient to buy?: Direct from provider? Channel partner/reseller? Download from the web? |
Decision Criteria AttributesDecision maker – Role, criteria/decision lens:
|
Behavioral AttributesInteraction preferences: Best way for us to reach this role? Email? At events? Texting? Video calls? Content types: Which content types (specifics; videos, short blog/article, longer whitepapers, etc.) help us stay educated about this initiative area? Content sources: What news, data, and insight sources (e.g. specifics) do you use to stay abreast of what’s important for this initiative area? |
Update the Go-to-Market Strategy Presentation with findings from Sales and customer/prospect interviews.
Ask buyers during interviews, as outlined in the Buyer Persona and Journey blueprint, to describe and rate key features by need. You will also review with buyers during the GTM Build phase, so it’s important to establish high priority features now.
|
|
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Your goal is to assess whether or not the opportunity is significantly sized and if you are well positioned to capture it
Download the Product Market Opportunity Sizing Workbook
SoftwareReviews Advisory Insight:
Product marketers that size the product market opportunity and account for the limitations posed by competitors, current sales coverage, brand permission, and awareness, provide their organizations with valuable insights into which inhibitors to growth should be addressed.
Your goal is two-fold: Determine the target market size, and develop a realistic 12–24 month forecast to support your business case
Download the Product Market Opportunity Sizing Workbook Download the Go-to-Market Strategy Presentation Template |
“Segmentation, targeting and positioning are the three pillars of modern marketing. Great segmentation is the bedrock for GTM success but is overlooked by so many.” (Product Marketing Alliance) |
Designing your go-to-market strategy does not require a robust customer experience management (CXM) platform, but implementing your strategy during the next steps of Go-to-Market – Build then Launch – certainly does.
Review info-Tech’s CXM blueprint to build a more complete, end-to-end customer interaction solution portfolio that encompasses CRM alongside other critical components.
The CXM blueprint also allows you to develop strategic requirements for CRM based on customer personas and external market analysis called for during your GTM Strategy design.
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Taking buyer needs ratings from step 1.3, assess your current and key competitive capabilities against buyer needs for both feature and non-feature capabilities. Incorporate into your initial product hypothesis.
Request from your SoftwareReviews Engagement Manager the “Importance vs. Satisfaction” analysis for your product(s) feature and non-feature capabilities under consideration for your GTM Strategy
| Satisfaction | ||
| Fix | Promote | |
| Importance |
Low Satisfaction
These features are important to their market and will highlight any differentiators to avoid market comparison.
|
High Satisfaction
These are real strengths for the organization and should be promoted as broadly as possible.
|
Low Satisfaction
These features are not important for the market and are unlikely to drive sales if marketing material focuses on them. Rationalize investment in these areas.
|
High Satisfaction
Features are relatively strong, so highlight that these features can meet customer needs
|
|
| Review | Maintain | |
Overall Category Product Feature Satisfaction Importance
(Optional for clients with buyer reviews and key competitive reviews within target product category.)
Example: ERP “Vendor A” ratings and recommended key actions. Incorporate this analysis into your product concept if updating an existing solution. Have versions of the below run for specific competitors.
Features in the “Fix” quadrant should be addressed in this GTM Strategy cycle.
Features in the “Review” quadrant are low in both buyer satisfaction and importance, so vendors are wise to hold on further investments and instead focus on “Fix.”
Features in the “Promote” quadrant are high in buyer importance and satisfaction, and should be called out in marketing and selling.
Features in the “Maintain” quadrant are high in buyer satisfaction, but lower in importance than other features – maintain investments here.
(Optional for clients with buyer reviews and key competitive reviews within target product category.)
Example: ERP “Vendor A” capabilities ratings and recommended key actions. Incorporate this analysis into your product concept for non-feature areas if updating an existing solution. Have versions of the below run for specific competitors.
Capabilities in the “Fix” quadrant should be addressed in this GTM Strategy cycle.
Capabilities in the “Review” quadrant are low in both buyer satisfaction and importance, so vendors are wise to hold on further investments and instead focus on “Fix.”
Capabilities in the “Promote” quadrant are high in buyer importance and satisfaction, and should be called out in marketing and selling.
Capabilities in the “Maintain” quadrant are high in buyer satisfaction, but lower in importance than other features – maintain investments here.
(Optional for clients with buyer reviews and key competitive reviews within target product category.)
Combining internal competitive knowledge with insights from buyer interviews and buyer reviews; establish which key features that will competitively differentiate your product when delivered
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Capture buyer channel preferences in Step 1.3, and research alternatives using the following framework
Inside vs. Field Sales – Selling software during COVID has taught us that you can successfully sell software using virtual conferencing tools, social media, the telephone, and even texting and webchat – so is the traditional model of field/territory-based sellers being replaced with inside/virtual sellers who can either work at home, or is there a benefit to being in the office with colleagues?
Solutions vs. Individual Products – Do your buyers prefer to buy a complete solution from a channel partner or a solutions integrator that puts all the pieces together, and can handle training and servicing, for a more complete buyer solution?
Channel Partner vs. Build Sales Force – Are there channel partners that, given your product is targeting a new buyer with whom you have no relationship, can leverage their existing relationships, quicken adoption of your products, and lower your cost of sales?
Fully Digital – Is your application one where users can get started for free then upgrade with more advanced features without the use of a field or inside sales person? Do you possess the e-commerce platform to support this?
While there are other considerations beyond the above to consider, decide which channel approach will work best for this GTM Strategy.
“One estimate is that for every dollar a firm spends on its SaaS platform, it spends four times that amount with systems integrators and other channel partners.
And as technologies are embedded inside other products, services, and solutions, effective selling requires more partners.
Salesforce, for example, is recruiting thousands of new partners, while Microsoft is reportedly adding over 7,000 partners each month.” (HBR, 2021)
Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 | Step 1.6 | Step 1.7 | Step 1.8 |
Download the Go-to-Market Strategy Presentation Template
| Phase 1 1.1 Select Steering Cmte/team, build aligned vision for GTM 1.2 Buyer personas, journey, initial messaging 1.3 Build initial product hypothesis 1.4 Size market opportunity 1.5 Outline digital/tech requirements 1.6 Competitive SWOT 1.7 Select routes to market 1.8 Craft GTM Strategy deck | Phase 2 2.1 Brand consistency check 2.2 Formulate packaging and pricing 2.3 Craft buyer-valid product concept 2.4 Build campaign plan and targets 2.5 Develop cost budgets across all areas 2.6 Draft product business case 2.7 Update GTM Strategy deck | Phase 3 3.1 Assess tech/tools support for all GTM phases 3.2 Outline sales enablement and Customer Success plan 3.3 Build awareness plan 3.4 Finalize business case 3.5 Final GTM Plan deck |
| Go-to-Market Strategy Presentation Template | Go-to-Market Strategy RACI and Launch Checklist Workbook | Buyer Persona and Journey blueprint | Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook |
![]() | ![]() | ![]() | ![]() |
Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
| Use the Go-to-Market Strategy RACI and Launch Checklist Workbook to:
| Use the Buyer Persona and Journey blueprint to:
| Use the Go-to-Market Cost Budget and Revenue Forecast Workbook to:
|
Share messaging documented with the buyer journey with branding/creative and/or Marketing VP/CMO to ensure consistency with overall corporate messaging. Use the “Brand Diagnostic” on the following slide as a quick check.
For those marketers that see the need for a re-brand, please:
Download the Go-to-Market Strategy Presentation Template
Later during the Build phase of GTM, marketing assets, digital platforms, sales enablement, and sales training will be created where actual messaging can be written with brand guidelines aligned.
This step is to assess whether you we need to budget extra funds for any rebranding.
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
| Re-think tossing a new product into the same old marketing engine. Ask if your branding today and on this new offering needs help.
If you answer “no” to any of the following questions, you may need to re-think your brand. Does your brand:
|
“Nailing an impactful brand identity is a critical part of Growth Marketing. Without a well-crafted and maintained brand identity, your marketing will always feel flat and one-dimensional.” (Lean Labs, 2021) |
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
Download the Go-to-Market Strategy Presentation Template | Refer to the findings from buyer persona interviews
|
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
Download the Go-to-Market Strategy Presentation Template | “Innovation opportunities almost always come from understanding a company’s worst customers or customers it doesn’t serve” (Harvard Business School Press, 1997) |
Download the Go-to-Market Strategy Presentation Template | Refer to the findings from buyer persona interviews |
Your buyer interviews – whether during earlier steps or here during product concept validation – will give specific answers to all areas in green text below. Understanding channels, asset-types, and crafting your key messaging are essential for next steps.
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
2 hours
On the following Awareness and Lead Gen Engine slide:
On the Product and Launch Concept slides:
Download the Go-to-Market Strategy Presentation Template | “Only 32% of marketers – and 29% of B2B marketers – said the process of planning campaigns went very well. Just over half were sure they had selected the right business goal for a given marketing project and only 42% were confident they identified the right audience – which is, of course, a critical determinant for achieving success.” (MIT Sloan Management Review) |
Promote release in line with company story
Receive analyst feedback pre-launch and brief with final releases messaging/positioning
Download the Go-to-Market Strategy Presentation Template
We advise setting a target for the launch campaign. Here is a suggested approach:
Download the Go-to-Market Strategy Presentation Template | “Marketing should quantify its contribution to the business. One metric many clients have found valuable is Marketing Influenced Wins (MIW). Measured by what % of sales wins had a last-touch marketing attribution, marketers in the 30% – 40% MIW range are performing well.” (SoftwareReviews Advisory Research) |
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Note that in the Align Step – Step 3, you will see your workstream leads each develop their individual contributions to both the launch plan as well a budget.
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
Your goal: Earn more than you spend! This projection of estimated gross margins should be part of your product launch business case. The GTM initiative lead and workstream leads are charged with estimating incremental costs, and product and sales must work together on the revenue forecast.
Net ReturnWe estimate our 12 month gross profit to be …. Quarterly RevenuesBased on sales forecast, our quarterly/monthly revenues are …. Estimated ExpensesIncremental up-front costs are expected to be …. |
|
|
Product Business Case Checklist:
|
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Phase 2 – Validate designs with buyers and solidify product business case
| Step 2.1 | Step 2.2 | Step 2.3 | Step 2.4 | Step 2.5 | Step 2.6 | Step 2.7 |
Download the Go-to-Market Strategy Presentation Template
| Phase 1 1.1 Select Steering Cmte/team, build aligned vision for GTM 1.2 Buyer personas, journey, initial messaging 1.3 Build initial product hypothesis 1.4 Size market opportunity 1.5 Outline digital/tech requirements 1.6 Competitive SWOT 1.7 Select routes to market 1.8 Craft GTM Strategy deck | Phase 2 2.1 Brand consistency check 2.2 Formulate packaging and pricing 2.3 Craft buyer-valid product concept 2.4 Build campaign plan and targets 2.5 Develop cost budgets across all areas 2.6 Draft product business case 2.7 Update GTM Strategy deck | Phase 3 3.1 Assess tech/tools support for all GTM phases 3.2 Outline sales enablement and Customer Success plan 3.3 Build awareness plan 3.4 Finalize business case 3.5 Final GTM Plan deck |
| Go-to-Market Strategy Presentation Template | Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook |
|
|
Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
|
Use the Go-to-Market Cost Budget and Revenue Forecast Workbook to:
|
Phase 3 – Align functional plans with a compelling business case for product build
| Step 3.1 | Step 3.2 | Step 3.3 | Step 3.4 | Step 3.5 |
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Phase 3 – Align functional plans with a compelling business case for product build
| Step 3.1 | Step 3.2 | Step 3.3 | Step 3.4 | Step 3.5 |
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Phase 3 – Align functional plans with a compelling business case for product build
| Step 3.1 | Step 3.2 | Step 3.3 | Step 3.4 | Step 3.5 |
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
Download the Go-to-Market Strategy Presentation Template
Phase 3 – Align functional plans with a compelling business case for product build
| Step 3.1 | Step 3.2 | Step 3.3 | Step 3.4 | Step 3.5 |
Go to the Go-to-Market Budget Workbook as outlined in prior steps and document final incremental costs and projected revenues and summarize within the Go-to-Market Strategy Presentation. Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook Download the Go-to-Market Strategy Presentation Template | Product Build and Launch Business Case Checklist:
|
Phase 3 – Align functional plans with a compelling business case for product build
| Step 3.1 | Step 3.2 | Step 3.3 | Step 3.4 | Step 3.5 |
Download the Go-to-Market Strategy Presentation Template
By guiding your team through the Go-to-Market planning process applied to an actual GTM Strategy, you have built an important set of capabilities that underpins today’s well-managed software companies. By following the step-by-step process outlined in this blueprint, you have delivered a host of benefits that include the following:
Therefore, developing the capabilities to manage a complex go-to-market strategy is akin to building company scalability and is sought after as a professional development opportunity that each executive should have on his/her résumé.
Contact your account representative for more information.
Acosta, Danette. “Average Customer Retention Rate by Industry.” Profitwell.com. Accessed Jan. 2022.
Ashkenas, Ron, and Patrick Finn. “The Go-To-Market Approach Startups Need to Adopt.” Harvard Business Review, June 2016. Accessed Jun. 2021.
Bilardi, Emma. “ How to Create Buyer Personas.” Product Marketing Alliance, July 2020. Accessed Dec. 2021.
Cespedes, Frank V. “Defining a Post-Pandemic Channel Strategy.” Harvard Business Review, Apr. 2021. Accessed Jul. 2021.
Chapman, Lawrence. “A Visual Guide to Product Launches.” Product Marketing Alliance. Accessed Jul. 2021.
Chapman, Lawrence. “Everything You Need To Know About Go-To-Market Strategies.” Product Marketing Alliance. Accessed Jul. 2021.
Christiansen, Clayton. “The Innovators Dilemma.” Harvard Business School Press, 1997.
Drzewicki, Matt. “Digital Marketing Maturity: The Path to Success.” MIT Sloan Management Review. Accessed Dec. 2021.
“Go-To-Market Refresher,” Product Marketing Alliance. Accessed Jul. 2021
Harrison, Liz; Dennis Spillecke, Jennifer Stanley, and Jenny Tsai. “Omnichannel in B2B sales: The new normal in a year that has been anything but.” McKinsey & Company, 15 March, 2021. Accessed Dec. 2021.
Jansen, Hasse. “Buyer Personas – 33 Mind Blowing Stats.” Boardview, 19 Feb. 2016. Accessed Jan. 2022.
Scott, Ryan. “Creating a Brand Identity: 20 Questions to Consider.” Lean Labs, Jun 2021. Accessed Jul. 2021.
Smith, Michael L., and James Erwin. “Role and Responsibility Charting (RACI).” DOCSearch. Accessed Jan. 2022. Web.
“What is the Total Addressable Market (TAM).” Corporate Finance Institute (CFI), n.d. Accessed Jan. 2022.
|
Create a Buyer Persona and Journey
|
|
Optimize Lead Generation With Lead Scoring
|
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the benefits of a robust CXM strategy.
Identify drivers and objectives for CXM using a persona-driven approach and deploy the right applications to meet those objectives.
Complete the initiatives roadmap for CXM.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish a consistent vision across IT, marketing, sales, and customer service for CXM technology enablement.
A clear understanding of key business and technology drivers for CXM.
1.1 CXM fireside chat
1.2 CXM business drivers
1.3 CXM vision statement
1.4 Project structure
CXM vision statement
CXM project charter
Create a set of strategic requirements for CXM based on a thorough external market scan and internal capabilities assessment.
Well-defined technology requirements based on rigorous, multi-faceted analysis.
2.1 PEST analysis
2.2 Competitive analysis
2.3 Market and trend analysis
2.4 SWOT analysis
2.5 VRIO analysis
2.6 Channel map
Completed external analysis
Strategic requirements (from external analysis)
Completed internal review
Channel interaction map
Augment strategic requirements through customer persona and scenario development.
Functional requirements aligned to supporting steps in customer interaction scenarios.
3.1 Persona development
3.2 Scenario development
3.3 Requirements definition for CXM
Personas and scenarios
Strategic requirements (based on personas)
Using the requirements identified in the preceding modules, build a future-state application inventory for CXM.
A cohesive, rationalized portfolio of customer interaction applications that aligns with identified requirements and allows investment (or rationalization) decisions to be made.
4.1 Build business process maps
4.2 Review application satisfaction
4.3 Create the CXM application portfolio
4.4 Prioritize applications
Business process maps
Application satisfaction diagnostic
Prioritized CXM application portfolio
Establish repeatable best practices for CXM applications in areas such as data management and end-user adoption.
Best practices for rollout of new CXM applications.
A prioritized initiatives roadmap.
5.1 Create data integration map
5.2 Define adoption best practices
5.3 Build initiatives roadmap
5.4 Confirm initiatives roadmap
Integration map for CXM
End-user adoption plan
Initiatives roadmap
"Customers want to interact with your organization on their own terms, and in the channels of their choice (including social media, mobile applications, and connected devices). Regardless of your industry, your customers expect a frictionless experience across the customer lifecycle. They desire personalized and well-targeted marketing messages, straightforward transactions, and effortless service. Research shows that customers value – and will pay more for! – well-designed experiences.
Strong technology enablement is critical for creating customer experiences that drive revenue. However, most organizations struggle with creating a cohesive technology strategy for customer experience management (CXM). IT leaders need to take a proactive approach to developing a strong portfolio of customer interaction applications that are in lockstep with the needs of their marketing, sales, and customer service teams. It is critical to incorporate the voice of the customer into this strategy.
When developing a technology strategy for CXM, don’t just “pave the cow path,” but instead move the needle forward by providing capabilities for customer intelligence, omnichannel interactions, and predictive analytics. This blueprint will help you build an integrated CXM technology roadmap that drives top-line revenue while rationalizing application spend."
Ben Dickie
Research Director, Customer Experience Strategy
Info-Tech Research Group
Info-Tech Insight
CXM - Customer Experience Management
CX - Customer Experience
CRM - Customer Relationship Management
CSM - Customer Service Management
MMS - Marketing Management System
SMMP - Social Media Management Platform
RFP - Request for Proposal
SaaS - Software as a Service
Today’s consumers expect speed, convenience, and tailored experiences at every stage of the customer lifecycle. Successful organizations strive to support these expectations.
67% of end consumers will pay more for a world-class customer experience. 74% of business buyers will pay more for strong B2B experiences. (Salesforce, 2018)
(Customer Experience Insight, 2016)
Customers expect to interact with organizations through the channels of their choice. Now more than ever, you must enable your organization to provide tailored customer experiences.
Providing a seamless customer experience increases the likelihood of cross-sell and up-sell opportunities and boosts customer loyalty and retention. IT can contribute to driving revenue and decreasing costs by providing the business with the right set of tools, applications, and technical support.
Cross-sell, up-sell, and drive customer acquisition.
67% of consumers are willing to pay more for an upgraded experience. (Salesforce, 2018)
80%: The margin by which CX leaders outperformer laggards in the S&P 500.(Qualtrics, 2017)
59% of customers say tailored engagement based on past interactions is very important to winning their business. (Salesforce, 2018)
Focus on customer retention as well as acquisition.
It is 6-7x more costly to attract a new customer than it is to retain an existing customer. (Salesforce Blog, 2019)
A 5% increase in customer retention has been found to increase profits by 25% to 95%. (Bain & Company, n.d.)
Organizations are prioritizing CXM capabilities (and associated technologies) as a strategic investment. Keep pace with the competition and gain a competitive advantage by creating a cohesive strategy that uses best practices to integrate marketing, sales, and customer support functions.
87% of customers share great experiences they’ve had with a company. (Zendesk, n.d.)
61% of organizations are investing in CXM. (CX Network, 2015)
53% of organizations believe CXM provides a competitive advantage. (Harvard Business Review, 2014)
Top Investment Priorities for Customer Experience
(CX Network 2015)
Get ahead of the competition by doing omnichannel right. Devise a CXM strategy that allows you to create and maintain a consistent, seamless customer experience by optimizing operations within an omnichannel framework. Customers want to interact with you on their own terms, and it falls to IT to ensure that applications are in place to support and manage a wide range of interaction channels.
Omnichannel is a “multi-channel approach to sales that seeks to provide the customer with a seamless transactional experience whether the customer is shopping online from a desktop or mobile device, by telephone, or in a bricks and mortar store.” (TechTarget, 2014)
97% of companies say that they are investing in omnichannel. (Huffington Post, 2015)
23% of companies are doing omnichannel well.
The success of your CXM strategy depends on the effective interaction of various marketing, sales, and customer support functions. To deliver on customer experience, organizations need to take a customer-centric approach to operations.
From an application perspective, a CRM platform generally serves as the unifying repository of customer information, supported by adjacent solutions as warranted by your CXM objectives.
CXM ECOSYSTEM
Customer Relationship Management Platform
CXM solutions are a broad range of tools that provide comprehensive feature sets for supporting customer interaction processes. These suites supplant more basic applications for customer interaction management. Popular solutions that fall under the umbrella of CXM include CRM suites, marketing automation tools, and customer service applications.
Microsoft Dynamics
Adobe
Marketo
sprinklr
Salesforce
SugarCRM
Strong CXM applications can improve:
Technology is the key enabler of building strong customer experiences: IT must stand shoulder-to-shoulder with the business to develop a technology framework for CXM.
(Harvard Business Review, 2014)
Only 19% of organizations have a customer experience team tasked with bridging gaps between departments. (Genesys, 2018)
IT and Marketing can only tackle CXM with the full support of each other. The cooperation of the departments is crucial when trying to improve CXM technology capabilities and customer interaction and drive a strong revenue mandate.
CASE STUDY
Industry Entertainment
Source Forbes, 2014
Blockbuster
As the leader of the video retail industry, Blockbuster had thousands of retail locations internationally and millions of customers. Blockbuster’s massive marketing budget and efficient operations allowed it to dominate the competition for years.
Situation
Trends in Blockbuster’s consumer market changed in terms of distribution channels and customer experience. As the digital age emerged and developed, consumers were looking for immediacy and convenience. This threatened Blockbuster’s traditional, brick-and-mortar B2C operating model.
The Competition
Netflix entered the video retail market, making itself accessible through non-traditional channels (direct mail, and eventually, the internet).
Results
Despite long-term relationships with customers and competitive standing in the market, Blockbuster’s inability to understand and respond to changing technology trends and customer demands led to its demise. The organization did not effectively leverage internal or external networks or technology to adapt to customer demands. Blockbuster went bankrupt in 2010.
Customer Relationship Management
Blockbuster did not leverage emerging technologies to effectively respond to trends in its consumer network. It did not optimize organizational effectiveness around customer experience.
CASE STUDY
Industry Entertainment
Source Forbes, 2014
Netflix
Beginning as a mail-out service, Netflix offered subscribers a catalog of videos to select from and have mailed to them directly. Customers no longer had to go to a retail store to rent a video. However, the lack of immediacy of direct mail as the distribution channel resulted in slow adoption.
The Situation
In response to the increasing presence of tech-savvy consumers on the internet, Netflix invested in developing its online platform as its primary distribution channel. The benefit of doing so was two-fold: passive brand advertising (by being present on the internet) and meeting customer demands for immediacy and convenience. Netflix also recognized the rising demand for personalized service and created an unprecedented, tailored customer experience.
The Competition
Blockbuster was the industry leader in video retail but was lagging in its response to industry, consumer, and technology trends around customer experience.
Results
Netflix’s disruptive innovation is built on the foundation of great CXM. Netflix is now a $28 billion company, which is tenfold what Blockbuster was worth.
Customer Relationship Management Platform
Netflix used disruptive technologies to innovatively build a customer experience that put it ahead of the long-time, video rental industry leader, Blockbuster.
Creating an end-to-end technology-enablement strategy for CXM requires a concerted, dedicated effort: Info-Tech can help with our proven approach.
Build the CXM Project Charter
Conduct a Thorough Environmental Scan
Build Customer Personas and Scenarios
Draft Strategic CXM Requirements
Build the CXM Application Portfolio
Implement Operational Best Practices
Info-Tech draws on best-practice research and the experiences of our global member base to develop a methodology for CXM that is driven by rigorous customer-centric analysis.
Our approach uses a unique combination of techniques to ensure that your team has done its due diligence in crafting a forward-thinking technology-enablement strategy for CXM that creates measurable value.
CASE STUDY
Industry Professionals Services
Source Info-Tech Workshop
The Situation
A global professional services firm in the B2B space was experiencing a fragmented approach to customer engagement, particularly in the pre-sales funnel. Legacy applications weren’t keeping pace with an increased demand for lead evaluation and routing technology. Web experience management was also an area of significant concern, with a lack of ongoing customer engagement through the existing web portal.
The Approach
Working with a team of Info-Tech facilitators, the company was able to develop several internal and external customer personas. These personas formed the basis of strategic requirements for a new CXM application stack, which involved dedicated platforms for core CRM, lead automation, web content management, and site analytics.
Results
Customer “stickiness” metrics increased, and Sales reported significantly higher turnaround times in lead evaluations, resulting in improved rep productivity and faster cycle times.
| Components of a persona | |
|---|---|
| Name | Name personas to reflect a key attribute such as the persona’s primary role or motivation. |
| Demographic | Include basic descriptors of the persona (e.g. age, geographic location, preferred language, education, job, employer, household income, etc.) |
| Wants, needs, pain points | Identify surface-level motivations for buying habits. |
| Psychographic/behavioral traits | Observe persona traits that are representative of the customers’ behaviors (e.g. attitudes, buying patterns, etc.). |
Create the Project Vision
Structure the Project
Scan the External Environment
Assess the Current State of CXM
Create an Application Portfolio
Develop Deployment Best Practices
Create an Initiative Rollout Plan
Confirm and Finalize the CXM Blueprint
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Diagnostics and consistent frameworks used throughout all four options
| 1. Drive Value With CXM | 2. Create the Framework | 3. Finalize the Framework | |
|---|---|---|---|
| Best-Practice Toolkit | 1.1 Create the Project Vision 1.2 Structure the CXM Project |
2.1 Scan the External Environment 2.2 Assess the Current State of CXM 2.3 Create an Application Portfolio 2.4 Develop Deployment Best Practices |
3.1 Create an Initiative Rollout Plan 3.2 Confirm and Finalize the CXM Blueprint |
| Guided Implementations |
|
|
|
| Onsite Workshop | Module 1: Drive Measurable Value with a World-Class CXM Program | Module 2: Create the Strategic Framework for CXM | Module 3: Finalize the CXM Framework |
Phase 1 Outcome:
|
Phase 2 Outcome:
|
Phase 3 Outcome:
|
Contact your account representative or email Workshops@InfoTech.com for more information.
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | Workshop Day 5 | |
|---|---|---|---|---|---|
| Activities | Create the Vision for CXM Enablement 1.1 CXM Fireside Chat 1.2 CXM Business Drivers 1.3 CXM Vision Statement 1.4 Project Structure |
Conduct the Environmental Scan and Internal Review 2.1 PEST Analysis 2.2 Competitive Analysis 2.3 Market and Trend Analysis 2.4 SWOT Analysis 2.5 VRIO Analysis 2.6 Channel Mapping |
Build Personas and Scenarios 3.1 Persona Development 3.2 Scenario Development 3.3 Requirements Definition for CXM |
Create the CXM Application Portfolio 4.1 Build Business Process Maps 4.2 Review Application Satisfaction 4.3 Create the CXM Application Portfolio 4.4 Prioritize Applications |
Review Best Practices and Confirm Initiatives 5.1 Create Data Integration Map 5.2 Define Adoption Best Practices 5.3 Build Initiatives Roadmap 5.4 Confirm Initiatives Roadmap |
| Deliverables |
|
|
|
|
|
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion: 2 weeks
Step 1.1: Create the Project Vision
Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
Step 1.2: Structure the Project
Review findings with analyst:
Then complete these activities…
With these tools & templates:
Phase 1 Results & Insights:
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
An aligned, optimized CX strategy is:
Rapid: to intentionally and strategically respond to quickly-changing opportunities and issues.
Outcome-based: to make key decisions based on strong business cases, data, and analytics in addition to intuition and judgment.
Rigorous: to bring discipline and science to bear; to improve operations and results.
Collaborative: to conduct activities in a broader ecosystem of partners, suppliers, vendors, co-developers, and even competitors.
(The Wall Street Journal, 2013)
Info-Tech Insight
If IT fails to adequately support marketing, sales, and customer service teams, the organization’s revenue will be in direct jeopardy. As a result, CIOs and Applications Directors must work with their counterparts in these departments to craft a cohesive and comprehensive strategy for using technology to create meaningful (and profitable) customer experiences.
1.1.1 30 minutes
1.1.2 30 minutes
There’s no silver bullet for developing a strategy. You can encounter pitfalls at a myriad of different points including not involving the right stakeholders from the business, not staying abreast of recent trends in the external environment, and not aligning sales, marketing, and support initiatives with a focus on the delivery of value to prospects and customers.
Common Pitfalls When Creating a Technology-Enablement Strategy for CXM
Senior management is not involved in strategy development.
Not paying attention to the “art of the possible.”
“Paving the cow path” rather than focusing on revising core processes.
Misalignment between objectives and financial/personnel resources.
Inexperienced team on either the business or IT side.
Not paying attention to the actions of competitors.
Entrenched management preferences for legacy systems.
Sales culture that downplays the potential value of technology or new applications.
IT →Marketing, Sales, and Service →External Customers
Internal-Facing Applications
Customer-Facing Applications
Info-Tech Insight
IT often overlooks direct customer considerations when devising a technology strategy for CXM. Instead, IT leaders rely on other business stakeholders to simply pass on requirements. By sitting down with their counterparts in marketing and sales, and fully understanding business drivers and customer personas, IT will be much better positioned to roll out supporting applications that drive customer engagement.
1.1.3 30 minutes
| Business Driver Name | Driver Assumptions, Capabilities, and Constraints | Impact on CXM Strategy |
|---|---|---|
| High degree of customer-centric solution selling | A technically complex product means that solution selling approaches are employed – sales cycles are long. | There is a strong need for applications and data quality processes that support longer-term customer relationships rather than transactional selling. |
| High desire to increase scalability of sales processes | Although sales cycles are long, the organization wishes to increase the effectiveness of rep time via marketing automation where possible. | Sales is always looking for new ways to leverage their reps for face-to-face solution selling while leaving low-level tasks to automation. Marketing wants to support these tasks. |
| Highly remote sales team and unusual hours are the norm | Not based around core hours – significant overtime or remote working occurs frequently. | Misalignment between IT working only core hours and after-hours teams leads to lag times that can delay work. Scheduling of preventative sales maintenance must typically be done on weekends rather than weekday evenings. |
1.1.4 30 minutes
| IT Driver Name | Driver Assumptions, Capabilities, and Constraints | Impact on CXM Strategy |
|---|---|---|
| Sales Application Procurement Methodology | Strong preference for on-premise COTS deployments over homebrewed applications. | IT may not be able to support cloud-based sales applications due to security requirements for on premise. |
| Vendor Relations | Minimal vendor relationships; SLAs not drafted internally but used as part of standard agreement. | IT may want to investigate tightening up SLAs with vendors to ensure more timely support is available for their sales teams. |
| Development Methodology | Agile methodology employed, some pockets of Waterfall employed for large-scale deployments. | Agile development means more perfective maintenance requests come in, but it leads to greater responsiveness for making urgent corrective changes to non-COTS products. |
| Data Quality Approach | IT sees as Sales’ responsibility | IT is not standing as a strategic partner for helping to keep data clean, causing dissatisfaction from customer-facing departments. |
| Staffing Availability | Limited to 9–5 | Execution of sales support takes place during core hours only, limiting response times and access for on-the-road sales personnel. |
1.1.5 30 minutes
1. Based on the IT and business drivers identified, craft guiding principles for CXM technology enablement. Keep guiding principles in mind throughout the project and ensure they support (or reconcile) the business and IT drivers.
| Guiding Principle | Description |
|---|---|
| Sales processes must be scalable. | Our sales processes must be able to reach a high number of target customers in a short time without straining systems or personnel. |
| Marketing processes must be high touch. | Processes must be oriented to support technically sophisticated, solution-selling methodologies. |
2. Summarize the guiding principles above by creating a CXM mission statement. See below for an example.
Example: CXM Mission Statement
To ensure our marketing, sales and service team is equipped with tools that will allow them to reach out to a large volume of contacts while still providing a solution-selling approach. This will be done with secure, on-premise systems to safeguard customer data.
Determine if now is the right time to move forward with building (or overhauling) your technology-enablement strategy for CXM.
Not all organizations will be able to proceed immediately to optimize their CXM technology enablement. Determine if the organizational willingness, backbone, and resources are present to commit to overhauling the existing strategy. If you’re not ready to proceed, consider waiting to begin this project until you can procure the right resources.
1.1.3; 1.1.4; 1.1.5 - Identify business and IT drivers to create CXM guiding principles
The facilitator will work with stakeholders from both the business and IT to identify implicit or explicit strategic drivers that will support (or pose constraints on) the technology-enablement framework for the CXM strategy. In doing so, guiding principles will be established for the project.
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
CXM Strategy Project Charter Template
1.2.1 CXM Strategy Project Charter Template
Having a project charter is the first step for any project: it specifies how the project will be resourced from a people, process, and technology perspective, and it clearly outlines major project milestones and timelines for strategy development. CXM technology enablement crosses many organizational boundaries, so a project charter is a very useful tool for ensuring everyone is on the same page.
Sections of the document:
INFO-TECH DELIVERABLE
CXM Strategy Project Charter Template
Populate the relevant sections of your project charter as you complete activities 1.2.2-1.2.8.
Understand the role of each player within your project structure. Look for listed participants on the activities slides to determine when each player should be involved.
| Title | Role Within Project Structure |
|---|---|
| Project Sponsor |
|
| Project Manager |
|
| Business Lead |
|
| Project Team |
|
| Steering Committee |
|
Info-Tech Insight
Do not limit project input or participation to the aforementioned roles. Include subject matter experts and internal stakeholders at particular stages within the project. Such inputs can be solicited on a one-off basis as needed. This ensures you take a holistic approach to creating your CXM technology-enablement strategy.
1.2.2 30 minutes
Hold a meeting with IT, Marketing, Sales, Service, Operations, and any other impacted business stakeholders that have input into CXM to accomplish the following:
Info-Tech Insight
Going forward, set up a quarterly review process to understand changing needs. It is rare that organizations never change their marketing and sales strategy. This will change the way the CXM will be utilized.
In order to gauge the effectiveness of CXM technology enablement, establish core metrics:
| Metric Description | Current Metric | Future Goal |
|---|---|---|
| Market Share | 25% | 35% |
| Share of Voice (All Channels) | 40% | 50% |
| Average Deal Size | $10,500 | $12,000 |
| Account Volume | 1,400 | 1,800 |
| Average Time to Resolution | 32 min | 25 min |
| First Contact Resolution | 15% | 35% |
| Web Traffic per Month (Unique Visitors) | 10,000 | 15,000 |
| End-User Satisfaction | 62% | 85%+ |
| Other metric | ||
| Other metric | ||
| Other metric |
Be sure to understand what is in scope for a CXM strategy project. Prevent too wide of a scope to avoid scope creep – for example, we aren’t tackling ERP or BI under CXM.
Establishing the parameters of the project in a scope statement helps define expectations and provides a baseline for resource allocation and planning. Future decisions about the strategic direction of CXM will be based on the scope statement.
Well-executed requirements gathering will help you avoid expanding project parameters, drawing on your resources, and contributing to cost overruns and project delays. Avoid scope creep by gathering high-level requirements that lead to the selection of category-level application solutions (e.g. CRM, MMS, SMMP, etc.), rather than granular requirements that would lead to vendor application selection (e.g. Salesforce, Marketo, Hootsuite, etc.).
Out-of-scope items should also be defined to alleviate ambiguity, reduce assumptions, and further clarify expectations for stakeholders. Out-of-scope items can be placed in a backlog for later consideration. For example, fulfilment and logistics management is out of scope as it pertains to CXM.
| In Scope | ||
|---|---|---|
| Strategy | ||
| High-Level CXM Application Requirements | CXM Strategic Direction | Category Level Application Solutions (e.g. CRM, MMS, etc.) |
| Out of Scope | ||
|---|---|---|
| Software Selection | ||
| Vendor Application Review | Vendor Application Selection | Granular Application System Requirements |
1.2.3 30 minutes
To form your scope statement, ask the following questions:
Consider the core team functions when composing the project team. Form a cross-functional team (i.e. across IT, Marketing, Sales, Service, Operations) to create a well-aligned CXM strategy.
| Required Skills/Knowledge | Suggested Project Team Members |
|---|---|
| IT | |
|
|
| Business | |
|
|
| Other | |
|
|
Info-Tech Insight
Don’t let your project team become too large when trying to include all relevant stakeholders. Carefully limiting the size of the project team will enable effective decision making while still including functional business units such as marketing, sales, service, and finance, as well as IT.
1.2.4 45 minutes
Build a list of the core CXM strategy team members, and then structure a RACI chart with the relevant categories and roles for the overall project.
Responsible - Conducts work to achieve the task
Accountable - Answerable for completeness of task
Consulted - Provides input for the task
Informed - Receives updates on the task
Info-Tech Insight
Avoid missed tasks between inter-functional communications by defining roles and responsibilities for the project as early as possible.
Benefits of Assigning RACI Early:
1.2.5 30 minutes
| Example: RACI Chart | Project Sponsor (e.g. CMO) | Project Manager (e.g. Applications Manager) | Business Lead (e.g. Marketing Director) | Steering Committee (e.g. PM, CMO, CFO…) | Project Team (e.g. PM, BL, SMEs…) |
|---|---|---|---|---|---|
| Assess Project Value | I | C | A | R | C |
| Conduct a Current State Assessment | I | I | A | C | R |
| Design Application Portfolio | I | C | A | R | I |
| Create CXM Roadmap | R | R | A | I | I |
| ... | ... | ... | ... | ... | ... |
1.2.6 30 minutes
| Key Activities | Start Date | End Date | Target | Status | Resource(s) |
|---|---|---|---|---|---|
| Structure the Project and Build the Project Team | |||||
| Articulate Business Objectives and Define Vision for Future State | |||||
| Document Current State and Assess Gaps | |||||
| Identify CXM Technology Solutions | |||||
| Build the Strategy for CXM | |||||
| Implement the Strategy |
| Management Support | Change Management | IT Readiness | |
|---|---|---|---|
| Definition | The degree of understanding and acceptance of CXM as a concept and necessary portfolio of technologies. | The degree to which employees are ready to accept change and the organization is ready to manage it. | The degree to which the organization is equipped with IT resources to handle new systems and processes. |
| Assessment Outcomes |
|
|
|
| Risk |
|
|
|
1.2.7 45 minutes
Likelihood:
1 - High/Needs Focus
2 - Can Be Mitigated
3 - Unlikely
Impact
1 - High Impact
2 - Moderate Impact
3 - Minimal Impact
Example: Risk Register and Mitigation Tactics
| Risk | Impact | Likelihood | Mitigation Effort |
|---|---|---|---|
| Cost of time and implementation: designing a robust portfolio of CXM applications can be a time consuming task, representing a heavy investment for the organization | 1 | 1 |
|
| Availability of resources: lack of in-house resources (e.g. infrastructure, CXM application developers) may result in the need to insource or outsource resources | 1 | 2 |
|
1.2.8 45 minutes
Before beginning to develop the CXM strategy, validate the project charter and metrics with senior sponsors or stakeholders and receive their approval to proceed.
Info-Tech Insight
In most circumstances, you should have your CXM strategy project charter validated with the following stakeholders:
1.2.2 Define project purpose, objectives, and business metrics
Through an in-depth discussion, an analyst will help you prioritize corporate objectives and organizational drivers to establish a distinct project purpose.
1.2.3 Define the scope of the CXM strategy
An analyst will facilitate a discussion to address critical questions to understand your distinct business needs. These questions include: What are the major coverage points? Who will be using the system?
1.2.4; 1.2.5; 1.2.6 Create the CXM project team, build a RACI chart, and establish a timeline
Our analysts will guide you through how to create a designated project team to ensure the success of your CXM strategy and suite selection initiative, including project milestones and team composition, as well as designated duties and responsibilities.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion: 4 weeks
Step 2.1: Scan the External Environment
Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
CXM Strategy Stakeholder Presentation Template
Step 2.2: Assess the Current State for CRM
Review findings with analyst:
Then complete these activities…
With these tools & templates:
CXM Strategy Stakeholder Presentation Template
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion: 4 weeks
Step 2.3: Create an Application Portfolio
Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
CXM Portfolio Designer
CXM Strategy Stakeholder Presentation Template
CXM Business Process Shortlisting Tool
Step 2.4: Develop Deployment Best Practices
Review findings with analyst:
Then complete these activities…
With these tools & templates:
CXM Strategy Stakeholder Presentation Template
Phase 2 Results & Insights:
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
Establish the drivers, enablers, and barriers to developing a CXM technology enablement strategy. In doing so, consider needs, environmental factors, organizational drivers, and technology drivers as inputs.
CXM Strategy
| Business Needs | Organizational Drivers | Technology Drivers | Environmental Factors | |
|---|---|---|---|---|
| Definition | A business need is a requirement associated with a particular business process (for example, Marketing needs customer insights from the website – the business need would therefore be web analytics capabilities). | Organizational drivers can be thought of as business-level goals. These are tangible benefits the business can measure such as customer retention, operation excellence, and financial performance. | Technology drivers are technological changes that have created the need for a new CXM enablement strategy. Many organizations turn to technology systems to help them obtain a competitive edge. | External considerations are factors taking place outside of the organization that are impacting the way business is conducted inside the organization. These are often outside the control of the business. |
| Examples |
|
|
|
|
Info-Tech Insight
A common organizational driver is to provide adequate technology enablement across multiple channels, resulting in a consistent customer experience. This driver is a result of external considerations. Many industries today are highly competitive and rapidly changing. To succeed under these pressures, you must have a rationalized portfolio of enterprise applications for customer interaction.
2.1.1 30 minutes

Take stock of internal challenges and barriers to effective CXM strategy execution.
Example: Internal Challenges & Potential Barriers
| Understanding the Customer | Change Management | IT Readiness | |
|---|---|---|---|
| Definition | The degree to which a holistic understanding of the customer can be created, including customer demographic and psychographics. | The degree to which employees are ready to accept operational and cultural changes and the degree to which the organization is ready to manage it. | The degree to which IT is ready to support new technologies and processes associated with a portfolio of CXM applications. |
| Questions to Ask |
|
|
|
| Implications |
|
|
|
2.1.2 30 minutes

Existing internal conditions, capabilities, and resources can create opportunities to enable the CXM strategy. These opportunities are critical to overcoming challenges and barriers.
Example: Opportunities to Leverage for Strategy Enablement
| Management Buy-In | Customer Data Quality | Current Technology Portfolio | |
|---|---|---|---|
| Definition | The degree to which upper management understands and is willing to enable a CXM project, complete with sponsorship, funding, and resource allocation. | The degree to which customer data is accurate, consistent, complete, and reliable. Strong customer data quality is an opportunity – poor data quality is a barrier. | The degree to which the existing portfolio of CXM-supporting enterprise applications can be leveraged to enable the CXM strategy. |
| Questions to Ask |
|
|
|
| Implications |
|
|
|
2.1.3 30 minutes

A successful CXM strategy requires a comprehensive understanding of an organization’s overall corporate strategy and its effects on the interrelated departments of marketing, sales, and service, including subsequent technology implications. For example, a CXM strategy that emphasizes tools for omnichannel management and is at odds with a corporate strategy that focuses on only one or two channels will fail.
Corporate Strategy
CXM Strategy
Unified Strategy
Info-Tech Insight
Your organization’s corporate strategy is especially important in dictating the direction of the CXM strategy. Corporate strategies are often focused on customer-facing activity and will heavily influence the direction of marketing, sales, customer service, and consequentially, CXM. Corporate strategies will often dictate market targeting, sales tactics, service models, and more.
Identifying organizational objectives of high priority will assist in breaking down CXM objectives to better align with the overall corporate strategy and achieve buy-in from key stakeholders.
| Corporate Objectives | Aligned CXM Technology Objectives | ||
|---|---|---|---|
| Increase Revenue | Enable lead scoring | Deploy sales collateral management tools | Improve average cost per lead via a marketing automation tool |
| Enhance Market Share | Enhance targeting effectiveness with a CRM | Increase social media presence via an SMMP | Architect customer intelligence analysis |
| Improve Customer Satisfaction | Reduce time-to-resolution via better routing | Increase accessibility to customer service with live chat | Improve first contact resolution with customer KB |
| Increase Customer Retention | Use a loyalty management application | Improve channel options for existing customers | Use customer analytics to drive targeted offers |
| Create Customer-Centric Culture | Ensure strong training and user adoption programs | Use CRM to provide 360-degree view of all customer interaction | Incorporate the voice of the customer into product development |
2.1.4 30 minutes
Industry E-Commerce
Source Pardot, 2012
Amazon.com, Inc. is an American electronic commerce and cloud computing company. It is the largest e-commerce retailer in the US.
Amazon originated as an online book store, later diversifying to sell various forms of media, software, games, electronics, apparel, furniture, food, toys, and more.
By taking a data-driven approach to marketing and sales, Amazon was able to understand its customers’ needs and wants, penetrate different product markets, and create a consistently personalized online-shopping customer experience that keeps customers coming back.
Use Browsing Data Effectively
Amazon leverages marketing automation suites to view recent activities of prospects on its website. In doing so, a more complete view of the customer is achieved, including insights into purchasing interests and site navigation behaviors.
Optimize Based on Interactions
Using customer intelligence, Amazon surveys and studies standard engagement metrics like open rate, click-through rate, and unsubscribes to ensure the optimal degree of marketing is being targeted to existing and prospective customers, depending on level of engagement.
Insights gained from having a complete understanding of the customer (from basic demographic characteristics provided in customer account profiles to observed psychographic behaviors captured by customer intelligence applications) are used to personalize Amazon’s sales and marketing approaches. This is represented through targeted suggestions in the “recommended for you” section of the browsing experience and tailored email marketing.
It is this capability, partnered with the technological ability to observe and measure customer engagement, that allows Amazon to create individual customer experiences.
Do not develop your CXM technology strategy in isolation. Work with Marketing to understand your STP strategy (segmentation, targeting, positioning): this will inform persona development and technology requirements downstream.
Market Segmentation
Market Targeting
Product Positioning
Info-Tech Insight
It is at this point that you should consider the need for and viability of an omnichannel approach to CXM. Through which channels do you target your customers? Are your customers present and active on a wide variety of channels? Consider how you can position your products, services, and brand through the use of omnichannel methodologies.
2.1.5 1 hour
2.1.5 30 minutes
Example: Competitive Implications
| Competitor Organization | Recent Initiative | Associated Technology | Direction of Impact | Competitive Implication |
|---|---|---|---|---|
| Organization X | Multichannel E-Commerce Integration | WEM – hybrid integration | Positive |
|
| Organization Y | Web Social Analytics | WEM | Positive |
|
A PEST analysis is a structured planning method that identifies external environmental factors that could influence the corporate and IT strategy.
Political - Examine political factors, such as relevant data protection laws and government regulations.
Economic - Examine economic factors, such as funding, cost of web access, and labor shortages for maintaining the site(s).
Technological - Examine technological factors, such as new channels, networks, software and software frameworks, database technologies, wireless capabilities, and availability of software as a service.
Social - Examine social factors, such as gender, race, age, income, and religion.
Info-Tech Insight
When looking at opportunities and threats, PEST analysis can help to ensure that you do not overlook external factors, such as technological changes in your industry. When conducting your PEST analysis specifically for CXM, pay particular attention to the rapid rate of change in the technology bucket. New channels and applications are constantly emerging and evolving, and seeing differential adoption by potential customers.
2.1.6 30 minutes
Example: PEST Analysis
Political
Economic
Technological
Social
2.1.7 30 minutes
For each PEST quadrant:
Example: Parsing Requirements from PEST Analysis
Technological Trend: There has been a sharp increase in popularity of mobile self-service models for buying habits and customer service access.
Goal: Streamline mobile application to be compatible with all mobile devices. Create consistent branding across all service delivery applications (e.g. website, etc.).
Strategic Requirement: Develop a native mobile application while also ensuring that resources through our web presence are built with responsive design interface.
Creating a customer-centric CXM technology strategy requires archetypal customer personas. Creating customer personas will enable you to talk concretely about them as consumers of your customer experience and allow you to build buyer scenarios around them.
A persona (or archetypal user) is an invented person that represents a type of user in a particular use-case scenario. In this case, personas can be based on real customers.
| Components of a persona | Example – Organization: Grocery Store | |
|---|---|---|
| Name | Name personas to reflect a key attribute such as the persona’s primary role or motivation | Brand Loyal Linda: A stay-at-home mother dedicated to maintaining and caring for a household of 5 people |
| Demographic | Include basic descriptors of the persona (e.g. age, geographic location, preferred language, education, job, employer, household income, etc.) | Age: 42 years old Geographic location: London Suburbia Language: English Education: Post-secondary Job: Stay-at-home mother Annual Household Income: $100,000+ |
| Wants, needs, pain points | Identify surface-level motivations for buying habits | Wants: Local products Needs: Health products; child-safe products Pain points: Fragmented shopping experience |
| Psychographic/behavioral traits | Observe persona traits that are representative of the customers’ behaviors (e.g. attitudes, buying patterns, etc.) | Psychographic: Detail-oriented, creature of habit Behavioral: Shops at large grocery store twice a week, visits farmers market on Saturdays, buys organic products online |
2.1.8 2 hours
Project Team
Info-Tech Insight
For CXM, persona building is typically used for understanding the external customer; however, if you need to gain a better understanding of the organization’s internal customers (those who will be interacting with CXM applications), personas can also be built for this purpose. Examples of useful internal personas are sales managers, brand managers, customer service directors, etc.
Post-secondary educated, white-collar professional, three children
Goals & Objectives
Behaviors
Services of Interest
Traits
General Literacy - High
Digital Literacy - Mid-High
Detail-Oriented - High
Willing to Try New Things - Mid-High
Motivated and Persistent - Mid-High
Time Flexible - Mid-High
Familiar With [Red.] - Mid
Access to [Red.] Offices - High
Access to Internet - High
Single, college educated, planning vacation in [redacted], interested in [redacted] job opportunities
Goals & Objectives
Behaviors
Services of Interest
Traits
General Literacy - Mid
Digital Literacy - High
Detail-Oriented - Mid
Willing to Try New Things - High
Motivated and Persistent - Mid
Time Flexible - Mid-High
Familiar With [Red.] - Low
Access to [Red.] Offices - Low
Access to Internet - High
15-year resident of [redacted], high school education, waiter, recently divorced, two children
Goals & Objectives
Behaviors
Services of Interest
Traits
General Literacy - Mid
Digital Literacy - Mid-Low
Detail-Oriented - Mid-Low
Willing to Try New Things - Mid
Motivated and Persistent - High
Time Flexible - Mid
Familiar With [Red.] - Mid-High
Access to [Red.] Offices - High
Access to Internet - High
Single, [redacted] resident, high school graduate
Goals & Objectives
Behaviors
Services of Interest
Traits
General Literacy - Mid
Digital Literacy - Mid
Detail-Oriented - Mid-Low
Willing to Try New Things - Mid-High
Motivated and Persistent - Mid-Low
Time Flexible - High
Familiar With [Red.] - Mid-Low
Access to [Red.] Offices - Mid-Low
Access to Internet - Mid
A scenario is a story or narrative that helps explore the set of interactions that a customer has with an organization. Scenario mapping will help parse requirements used to design the CXM application portfolio.
A Good Scenario…
Scenarios Are Used To…
To Create Good Scenarios…
2.1.9 1.5 hours
Example: Scenario Map
Persona Name: Brand Loyal Linda
Scenario Goal: File a complaint about in-store customer service
Look up “[Store Name] customer service” on public web. →Reach customer support landing page. →Receive proactive notification prompt for online chat with CSR. →Initiate conversation: provide order #. →CSR receives order context and information. →Customer articulates problem, CSR consults knowledgebase. →Discount on next purchase offered. →Send email with discount code to Brand Loyal Linda.
2.1.1; 2.1.2; 2.1.3; 2.1.4 - Create a CXM operating model
An analyst will facilitate a discussion to identify what impacts your CXM strategy and how to align it to your corporate strategy. The discussion will take different perspectives into consideration and look at organizational drivers, external environmental factors, as well as internal barriers and enablers.
2.1.5 Conduct a competitive analysis
Calling on their depth of expertise in working with a broad spectrum of organizations, our facilitator will help you work through a structured, systematic evaluation of competitors’ actions when it comes to CXM.
2.1.6; 2.1.7 - Conduct a PEST analysis
The facilitator will use guided conversation to target each quadrant of the PEST analysis and help your organization fully enumerate political, economic, social, and technological trends that will influence your CXM strategy. Our analysts are deeply familiar with macroenvironmental trends and can provide expert advice in identifying areas of concern in the PEST and drawing strategic requirements as implications.
2.1.8; 2.1.9 - Build customer personas and subsequent persona scenarios
Drawing on the preceding exercises as inputs, the facilitator will help the team create and refine personas, create respective customer interaction scenarios, and parse strategic requirements to support your technology portfolio for CXM.
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
A SWOT analysis is a structured planning method that evaluates the strengths, weaknesses, opportunities, and threats involved in a project.
Strengths - Strengths describe the positive attributes that are within your control and internal to your organization (i.e. what do you do better than anyone else?)
Weaknesses - Weaknesses are internal aspects of your business that place you at a competitive disadvantage; think of what you need to enhance to compete with your top competitor.
Opportunities - Opportunities are external factors the project can capitalize on. Think of them as factors that represent reasons your business is likely to prosper.
Threats - Threats are external factors that could jeopardize the project. While you may not have control over these, you will benefit from having contingency plans to address them if they occur.
Info-Tech Insight
When evaluating weaknesses of your current CXM strategy, ensure that you’re taking into account not just existing applications and business processes, but also potential deficits in your organization’s channel strategy and go-to-market messaging.
2.2.1 30 minutes
Example: SWOT Analysis
Strengths
Weaknesses
Opportunities
Threats
2.2.2 30 minutes
For each SWOT quadrant:
Example: Parsing Requirements from SWOT Analysis
Weakness: Customer service inaccessible in real-time through website or mobile application.
Goal: Increase the ubiquity of access to customer service knowledgebase and agents through a web portal or mobile application.
Strategic Requirement: Provide a live chat portal that matches the customer with the next available and qualified agent.
Applications are the bedrock of technology enablement for CXM. Review your current application portfolio to identify what is working well and what isn’t.
Build the CXM Application Inventory →Assess Usage and Satisfaction →Map to Business Processes and Determine Dependencies →Determine Grow/Maintain/ Retire for Each Application
When assessing the CXM applications portfolio, do not cast your net too narrowly; while CRM and MMS applications are often top of mind, applications for digital asset management and social media management are also instrumental for ensuring a well-integrated CX.
Identify dependencies (either technical or licensing) between applications. This dependency tracing will come into play when deciding which applications should be grown (invested in), which applications should be maintained (held static), and which applications should be retired (divested).
Info-Tech Insight
Shadow IT is prominent here! When building your application inventory, ensure you involve Marketing, Sales, and Service to identify any “unofficial” SaaS applications that are being used for CXM. Many organizations fail to take a systematic view of their CXM application portfolio beyond maintaining a rough inventory. To assess the current state of alignment, you must build the application inventory and assess satisfaction metrics.
Review the major enterprise applications in your organization that enable CXM and align your requirements to these applications (net-new or existing). Identify points of integration to capture the big picture.

Info-Tech Insight
When assessing the current application portfolio that supports CXM, the tendency will be to focus on the applications under the CXM umbrella, relating mostly to marketing, sales, and customer service. Be sure to include systems that act as input to, or benefit due to outputs from, CRM or similar applications. Examples of these systems are ERP systems, ECM (e.g. SharePoint) applications, and more.
Having a portfolio but no contextual data will not give you a full understanding of the current state. The next step is to thoroughly assess usage patterns as well as IT, management, and end-user satisfaction with each application.
Example: Application Usage & Satisfaction Assessment
| Application Name | Level of Usage | IT Satisfaction | Management Satisfaction | End-User Satisfaction | Potential Business Impact |
|---|---|---|---|---|---|
| CRM (e.g. Salesforce) | Medium | High | Medium | Medium | High |
| CRM (e.g. Salesforce) | Low | Medium | Medium | High | Medium |
| ... | ... | ... | ... | ... | ... |
Info-Tech Insight
When evaluating satisfaction with any application, be sure to consult all stakeholders who come into contact with the application or depend on its output. Consider criteria such as ease of use, completeness of information, operational efficiency, data accuracy, etc.
2.2.3 Application Portfolio Assessment: End-User Feedback
Info-Tech’s Application Portfolio Assessment: End-User Feedback diagnostic is a low-effort, high-impact program that will give you detailed report cards on end-user satisfaction with an application. Use these insights to identify problems, develop action plans for improvement, and determine key participants.
Application Portfolio Assessment: End-User Feedback is an 18-question survey that provides valuable insights on user satisfaction with an application by:
INFO-TECH DIAGNOSTIC
2.2.4 1 hour
Example: CXM Application Inventory
| Application Name | Deployed Date | Processes Supported | Technical and Licensing Dependencies |
|---|---|---|---|
| Salesforce | June 2018 | Customer relationship management | XXX |
| Hootsuite | April 2019 | Social media listening | XXX |
| ... | ... | ... | ... |
A VRIO analysis evaluates the ability of internal resources and capabilities to sustain a competitive advantage by evaluating dimensions of value, rarity, imitability, and organization. For critical applications like your CRM platform, use a VRIO analysis to determine their value.
| Is the resource or capability valuable in exploiting an opportunity or neutralizing a threat? | Is the resource or capability rare in the sense that few of your competitors have a similar capability? | Is the resource or capability costly to imitate or replicate? | Is the organization organized enough to leverage and capture value from the resource or capability? | |
| NO | → | → | → | COMPETITIVE DISADVANTAGE |
| YES | NO→ | → | → | COMPETITIVE EQUALITY/PARITY |
| YES | YES | NO→ | → | TEMPORARY COMPETITIVE ADVANTAGE |
| YES | YES | YES | NO→ | UNUSED COMPETITIVE ADVANTAGE |
| YES | YES | YES | YES | LONG-TERM COMPETITIVE ADVANTAGE |
(Strategic Management Insight, 2013)
2.2.5 30 minutes
2.2.1; 2.2.2 Conduct a SWOT Analysis
Our facilitator will use a small-team approach to delve deeply into each area, identifying enablers (strengths and opportunities) and challenges (weaknesses and threats) relating to the CXM strategy.
2.2.3; 2.2.4 Inventory your CXM applications, and assess usage and satisfaction
Working with your core team, the facilitator will assist with building a comprehensive inventory of CXM applications that are currently in use and with identifying adjacent systems that need to be identified for integration purposes. The facilitator will work to identify high and low performing applications and analyze this data with the team during the workshop exercise.
2.2.5 Conduct a VRIO analysis
The facilitator will take you through a VRIO analysis to identify which of your internal technological competencies ensure, or can be leveraged to ensure, your competitiveness in the CXM market.
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
CXM application portfolio map
The interaction between sales, marketing, and customer service is very process-centric. Rethink sales and customer-centric workflows and map the desired workflow, imbedding the improved/reengineered process into the requirements.
Business process modeling facilitates the collaboration between the business and IT, recording the sequence of events, tasks performed, who performed them, and the levels of interaction with the various supporting applications.
By identifying the events and decision points in the process and overlaying the people that perform the functions, the data being interacted with, and the technologies that support them, organizations are better positioned to identify gaps that need to be bridged.
Encourage the analysis by compiling an inventory of business processes that support customer-facing operations that are relevant to achieving the overall organizational strategies.
Outcomes
INFO-TECH OPPORTUNITY
Refer to Info-Tech’s Create a Comprehensive BPM Strategy for Successful Process Automation blueprint for further assistance in taking a BPM approach to your sales-IT alignment.
APQC’s Process Classification Framework is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.
| OPERATING PROCESSES | ||||
|---|---|---|---|---|
| 1.0 Develop Vision and Strategy | 2.0 Develop and Manage Products and Services | 3.0 Market and Sell Products and Services | 4.0 Deliver Products and Services | 5.0 Manage Customer Service |
| 6.0 Develop and Manage Human Capital | ||||
| 7.0 Manage Information Technology | ||||
| 8.0 Manage Financial Resources | ||||
| 9.0 Acquire, Construct, and Manage Assets | ||||
| 10.0 Manage Enterprise Risk, Compliance, and Resiliency | ||||
| 11.0 Manage External Relationships | ||||
| 12.0 Develop and Manage Business Capabilities | ||||
(APQC, 2011)
MORE ABOUT APQC
3.1 Understand markets, customers, and capabilities
3.2 Develop marketing strategy
3.3 Develop sales strategy
3.4 Develop and manage marketing plans
3.5 Develop and manage sales plans
5.1 Develop customer care/customer service strategy
5.2 Plan and manage customer service operations
5.2 Plan and 5.2.3.1 Receive customer complaints 5.2.3.2 Route customer complaints 5.2.3.3 Resolve customer complaints 5.2.3.4 Respond to customer complaints manage customer service operations
The APQC framework provides levels 1 through 3 for the “Market and Sell Products and Services” framework. Level 4 processes and beyond will need to be defined by your organization as they are more granular (represent the task level) and are often industry-specific.
Level 1 – Category - 1.0 Develop vision and strategy (10002)
Represents the highest level of process in the enterprise, such as manage customer service, supply chain, financial organization, and human resources.
Level 2 – Process Group - 1.1 Define the business concept and long-term vision (10014)
Indicates the next level of processes and represents a group of processes. Examples include perform after sales repairs, procurement, accounts payable, recruit/source, and develop sales strategy.
Level 3 – Process - 1.1.1 Assess the external environment (10017)
A series of interrelated activities that convert input into results (outputs); processes consume resources and require standards for repeatable performance; and processes respond to control systems that direct quality, rate, and cost of performance.
Level 4 – Activity - 1.1.1.1 Analyze and evaluate competition (10021)
Indicates key events performed when executing a process. Examples of activities include receive customer requests, resolve customer complaints, and negotiate purchasing contracts.
Level 5 – Task - 12.2.3.1.1 Identify project requirements and objectives (11117)
Tasks represent the next level of hierarchical decomposition after activities. Tasks are generally much more fine grained and may vary widely across industries. Examples include create business case and obtain funding, and design recognition and reward approaches.
Info-Tech Insight
Define the Level 3 processes in the context of your organization. When creating a CXM strategy, concern yourself with the interrelatedness of processes across existing departmental silos (e.g. marketing, sales, customer service). Reserve the analysis of activities (Level 4) and tasks (Level 3) for granular work initiatives involved in the implementation of applications.
2.3.1 CXM Business Process Shortlisting Tool
The CXM Business Process Shortlisting Tool can help you define which marketing, sales, and service processes you should focus on.
Working in concert with stakeholders from the appropriate departments, complete the short questionnaire.
Based on validated responses, the tool will highlight processes of strategic importance to your organization.
These processes can then be mapped, with requirements extracted and used to build the CXM application portfolio.
INFO-TECH DELIVERABLE

2.3.2 1 hour


Current legend for Weights and Scores
F – Finance
H – Human Resources
I – IT
L – Legal
M – Marketing
BU1 – Business Unit 1
BU2 – Business Unit 2
2.3.3 45 minutes
INFO-TECH OPPORTUNITY
Refer to Info-Tech’s Create a Comprehensive BPM Strategy for Successful Process Automation blueprint for further assistance in taking a BPM approach to your sales-IT alignment.
Info-Tech Insight
Analysis of the current state is important in the context of gap analysis. It aids in understanding the discrepancies between your baseline and the future state vision, and ensures that these gaps are documented as part of the overall requirements.

2.3.4 30 minutes
- What is the input?
- What is the output?
- What are the underlying risks and how can they be mitigated?
- What conditions should be met to mitigate or eliminate each risk?
- What are the improvement opportunities?
- What conditions should be met to enable these opportunities?
Info-Tech Insight
The business and IT should work together to evaluate the current state of business processes and the business requirements necessary to support these processes. Develop a full view of organizational needs while still obtaining the level of detail required to make informed decisions about technology.
Identify the owners of the business processes being evaluated to extract requirements. Process owners will be able to inform business process improvement and assume accountability for reengineered or net-new processes going forward.
Process ownership ensures support, accountability, and governance for CXM and its supporting processes. Process owners must be able to negotiate with business users and other key stakeholders to drive efficiencies within their own process. The process owner must execute tactical process changes and continually optimize the process.
Responsibilities include the following:
Info-Tech Insight
Identify the owners of existing processes early so you understand who needs to be involved in process improvement and reengineering. Once implemented, CXM applications are likely to undergo a series of changes. Unstructured data will multiply, the number of users may increase, administrators may change, and functionality could become obsolete. Should business processes be merged or drastically changed, process ownership can be reallocated during CXM implementation. Make sure you have the right roles in place to avoid inefficient processes and poor data quality.
2.3.5 Process Owner Assignment Guide
The Process Owner Assignment Guide will ensure you are taking the appropriate steps to identify process owners for existing and net-new processes created within the scope of the CXM strategy.
The steps in the document will help with important considerations such as key requirements and responsibilities.
INFO-TECH DELIVERABLE
2.3.6 30 minutes
Face-to-Face is efficient and has a positive personalized aspect that many customers desire, be it for sales or customer service.
Telephony (or IVR) has been a mainstay of customer interaction for decades. While not fading, it must be used alongside newer channels.
Postal used to be employed extensively for all domains, but is now used predominantly for e-commerce order fulfillment.
Email is an asynchronous interaction channel still preferred by many customers. Email gives organizations flexibility with queuing.
Live Chat is a way for clients to avoid long call center wait times and receive a solution from a quick chat with a service rep.
Web Portals permit transactions for sales and customer service from a central interface. They are a must-have for any large company.
Social Media consists of many individual services (like Facebook or Twitter). Social channels are exploding in consumer popularity.
HTML5 Mobile Access allows customers to access resources from their personal device through its integrated web browser.
Dedicated Mobile Apps allow customers to access resources through a dedicated mobile application (e.g. iOS, Android).
Info-Tech Insight
Your channel selections should be driven by customer personas and scenarios. For example, social media may be extensively employed by some persona types (i.e. Millennials) but see limited adoption in other demographics or use cases (i.e. B2B).
2.3.7 30 minutes
Example: Business Unit Channel Use Survey
| Marketing | Sales | Customer Service | ||||
|---|---|---|---|---|---|---|
| Current Used? | Future Use? | Current Used? | Future Use? | Current Used? | Future Use? | |
| Yes | Yes | No | No | No | No | |
| Direct Mail | Yes | No | No | No | No | No |
| Phone | No | No | Yes | Yes | Yes | Yes |
| In-Person | No | No | Yes | Yes | Yes | No |
| Website | Yes | Yes | Yes | Yes | Yes | Yes |
| Social Channels | No | Yes | Yes | Yes | No | Yes |
Discovering your organizational requirements is vital for choosing the right business-enabling initiative, technology, and success metrics. Sorting the requirements by marketing, sales, and service is a prudent mechanism for clarification.
Definition: High-level requirements that will support marketing functions within CXM.
Examples
Definition: High-level requirements that will support sales functions within CXM.
Examples
Definition: High-level requirements that will support customer service functions within CXM.
Examples
2.3.8 30 minutes
Info-Tech Insight
Strategic CXM requirements will be used to prioritize specific initiatives for CXM technology enablement and application rollout. Ensure that IT, the business, and executive management are all aligned on a consistent and agreed upon set of initiatives.
Industry Consumer Goods, Clothing
Source Retail Congress, 2017
Burberry London
Internally, Burberry invested in organizational alignment and sales force brand engagement. The more the sales associate knew about the brand engagement and technology-enabled strategy, the better the store’s performance. Before the efforts went to building relationships with customers, Burberry built engagement with employees.
Burberry embraced “omnichannel,” the hottest buzzword in retailing to provide consumers the most immersive and intuitive brand experience within the store.
RFID tags were attached to products to trigger interactive videos on the store’s screens in the common areas or in a fitting room. Consumers are to have instant access to relevant product combinations, ranging from craftsmanship information to catwalk looks. This is equivalent to the rich, immediate information consumers have grown to expect from the online shopping experience.
Another layer of Burberry’s added capabilities includes in-memory-based analytics to gather and analyze data in real-time to better understand customers’ desires. Burberry builds customer profiles based on what items the shoppers try on from the RFID-tagged garments. Although this requires customer privacy consent, customers are willing to provide personal information to trusted brands.
This program, called “Customer 360,” assisted sales associates in providing data-driven shopping experiences that invite customers to digitally share their buying history and preferences via their tablet devices. As the data is stored in Burberry’s customer data warehouse and accessed through an application such as CRM, it is able to arm sales associates with personal fashion advice on the spot.
Lastly, the customer data warehouse/CRM application is linked to Burberry’s ERP system and other custom applications in a cloud environment to achieve real-time inventory visibility and fulfillment.
Industry Consumer Goods, Clothing
Source Retail Congress, 2017
Burberry London
Internally, Burberry invested in organizational alignment and sales force brand engagement. The more the sales associate knew about the brand engagement and technology-enabled strategy, the better the store’s performance. Before the efforts went to building relationships with customers, Burberry built engagement with employees.
Burberry embraced “omnichannel,” the hottest buzzword in retailing to provide consumers the most immersive and intuitive brand experience within the store.
Burberry achieved one of the most personalized retail shopping experiences. Immediate personal fashion advice using customer data is only one component of the experience. Not only are historic purchases and preference data analyzed, a customer’s social media posts and fashion industry trend data is proactively incorporated into the interactions between the sales associate and the customer.
Burberry achieved CEO Angela Ahrendts’ vision of “Burberry World,” in which the brand experience is seamlessly integrated across channels, devices, retail locations, products, and services.
The organizational alignment between Sales, Marketing, and IT empowered employees to bring the Burberry brand to life in unique ways that customers appreciated and were willing to advocate.
Burberry is now one of the most beloved and valuable luxury brands in the world. The brand tripled sales in five years, became one of the leading voices on trends, fashion, music, and beauty while redefining what top-tier customer experience should be both digitally and physically.
The debate between best-of-breed point solutions versus comprehensive CRM suites is ongoing. There is no single best answer. In most cases, an effective portfolio will include both types of solutions.
Customer Relationship Management (CRM)
Social Media Management Platform (SMMP)
Field Sales/Service Automation (FSA)
Marketing Management Suites
Sales Force Automation
Email Marketing Tools
Lead Management Automation (LMA)
Customer Service Management Suites
Customer Intelligence Systems
Some may find that the capabilities of a CRM suite are not enough to meet their specific requirements: supplementing a CRM suite with a targeted point solution can get the job done. A variety of CXM point solutions are designed to enhance your business processes and improve productivity.
Sales Force Automation: Automatically generates, qualifies, tracks, and contacts leads for sales representatives, minimizing time wasted on administrative duties.
Field Sales: Allows field reps to go through the entire sales cycle (from quote to invoice) while offsite.
Sales Compensation Management: Models, analyzes, and dispenses payouts to sales representatives.
Social Media Management Platforms (SMMP): Manage and track multiple social media services, with extensive social data analysis and insight capabilities.
Email Marketing Bureaus: Conduct email marketing campaigns and mine results to effectively target customers.
Marketing Intelligence Systems: Perform in-depth searches on various data sources to create predictive models.
Customer Service Management (CSM): Manages the customer support lifecycle with a comprehensive array of tools, usually above and beyond what’s in a CRM suite.
Customer Service Knowledge Management (CSKM): Advanced knowledgebase and resolution tools.
Field Service Automation (FSA): Manages customer support tickets, schedules work orders, tracks inventory and fleets, all on the go.
Info-Tech Insight
CRM and point solution integration is critical. A best-of-breed product that poorly integrates with your CRM suite compromises the value generated by the combined solution, such as a 360-degree customer view. Challenge point solution vendors to demonstrate integration capabilities with CRM packages.
Standalone CRM Suite
Sales Conditions: Need selling and lead management capabilities for agents to perform the sales process, along with sales dashboards and statistics.
Marketing or Communication Conditions: Need basic campaign management and ability to refresh contact records with information from social networks.
Member Service Conditions: Need to keep basic customer records with multiple fields per record and basic channels such as email and telephony.
Add a Best-of-Breed or Point Solution
Environmental Conditions: An extensive customer base with many different interactions per customer along with industry specific or “niche” needs. Point solutions will benefit firms with deep needs in specific feature areas (e.g. social media or field service).
Sales Conditions: Lengthy sales process and account management requirements for assessing and managing opportunities – in a technically complex sales process.
Marketing Conditions: Need social media functionality for monitoring and social property management.
Customer Service Conditions: Need complex multi-channel service processes and/or need for best-of-breed knowledgebase and service content management.
Info-Tech Insight
The volume and complexity of both customers and interactions have a direct effect on when to employ just a CRM suite and when to supplement with a point solution. Check to see if your CRM suite can perform a specific business requirement before deciding to evaluate potential point solutions.
2.3.9 CXM Portfolio Designer
The CXM Portfolio Designer features a set of questions geared toward understanding your needs for marketing, sales, and customer service enablement.
These results are scored and used to suggest a comprehensive solution-level set of enterprise applications for CXM that can drive your application portfolio and help you make investment decisions in different areas such as CRM, marketing management, and customer intelligence.
INFO-TECH DELIVERABLE

(Social Centered Learning, n.d.)

Use the two-by-two matrix below to structure your optimal CXM application portfolio. For more help, refer to Info-Tech’s blueprint, Use Agile Application Rationalization Instead of Going Big Bang.
0 Richness of Functionality |
INTEGRATE | RETAIN | |
| REPLACE | REPLACE OR ENHANCE | ||
0 Degree of Integration |
|||
Integrate: The application is functionally rich, so spend time and effort integrating it with other modules by building or enhancing interfaces.
Retain: The application satisfies both functionality and integration requirements, so it should be considered for retention.
Replace/Enhance: The module offers poor functionality but is well integrated with other modules. If enhancing for functionality is easy (e.g. through configuration or custom development), consider enhancement or replace it.
Replace: The application neither offers the functionality sought nor is it integrated with other modules, and thus should be considered for replacement.
2.3.10 1-2 hours
Example: Brainstorming the Art of the Possible
| Application | Gap Satisfied | Related Process | Number of Linked Requirements | Do we have the system? | Priority |
|---|---|---|---|---|---|
| LMA |
|
Sales | 8 | No | Business Critical |
| Customer Intelligence |
|
Customer Service | 6 | Yes | Business Enabling |
| ... | ... | ... | ... | ... | ... |
Now that you have developed the CXM application portfolio and identified areas of new investment, you’re well positioned to execute specific vendor selection projects. After you have built out your initiatives roadmap in phase 3, the following reports provide in-depth vendor reviews, feature guides, and tools and templates to assist with selection and implementation.
Info-Tech Insight
Not all applications are created equally well for each use case. The vendor reports help you make informed procurement decisions by segmenting vendor capabilities among major use cases. The strategic requirements identified as part of this project should be used to select the use case that best fits your needs.
2.3.2; 2.3.3 Shortlist and map the key top-level business processes
Based on experience working with organizations in similar verticals, the facilitator will help your team map out key sample workflows for marketing, sales, and customer service.
2.3.6 Create your strategic requirements for CXM
Drawing on the preceding exercises, the facilitator will work with the team to create a comprehensive list of strategic requirements that will be used to drive technology decisions and roadmap initiatives.
2.3.10 Create and finalize the CXM application portfolio
Using the strategic requirements gathered through internal, external, and technology analysis up to this point, a facilitator will assist you in assembling a categorical technology application portfolio to support CXM.
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
Integration is paramount: your CXM application portfolio must work as a unified face to the customer. Create an integration map to reflect a system of record and the exchange of data.
The points of integration that you’ll need to establish must be based on the objectives and requirements that have informed the creation of the CXM application portfolio. For instance, achieving improved customer insights would necessitate a well-integrated portfolio with customer interaction point solutions, business intelligence tools, and customer data warehouses in order to draw the information necessary to build insight. To increase customer engagement, channel integration is a must (i.e. with robust links to unified communications solutions, email, and VoIP telephony systems).
Info-Tech Insight
If the CXM application portfolio is fragmented, it will be nearly impossible to build a cohesive view of the customer and deliver a consistent customer experience. Points of integration (POIs) are the junctions between the applications that make up the CXM portfolio. They are essential to creating value, particularly in customer insight-focused and omnichannel-focused deployments. Be sure to include enterprise applications that are not included in the CXM application portfolio. Popular systems to consider for POIs include billing, directory services, content management, and collaboration tools.

"Find the absolute minimum number of ‘quick wins’ – the POIs you need from day one that are necessary to keep end users happy and deliver value." – Maria Cindric, Australian Catholic University Source: Interview
2.4.1 1 hour
Example: Mapping the Integration of CXM Applications

Data quality is king: if your customer data is garbage in, it will be garbage out. Enable strategic CXM decision making with effective planning of data quality initiatives.
Identify and Eliminate Dead Weight
Poor data can originate in the firm’s system of record, which is typically the CRM system. Custom queries, stored procedures, or profiling tools can be used to assess the key problem areas.
Loose rules in the CRM system lead to records of no significant value in the database. Those rules need to be fixed, but if changes are made before the data is fixed, users could encounter database or application errors, which will reduce user confidence in the system.
Create and Enforce Standards & Policies
Now that the data has been cleaned, protect the system from relapsing.
Work with business users to find out what types of data require validation and which fields should have changes audited. Whenever possible, implement drop-down lists to standardize values and make programming changes to ensure that truncation ceases.
Applications are a critical component of how IT supports Sales, but IT also needs to help Sales keep its data current and accurate. Conducting a sales data audit is critical to ensure Sales has the right information at the right time.
Info-Tech Insight
Data is king. More than ever, having accurate data is essential for your organization to win in hyper-competitive marketplaces. Prudent current state analysis looks at both the overall data model and data architecture, as well as assessing data quality within critical sales-related repositories. As the amount of customer data grows exponentially due to the rise of mobility and the Internet of Things, you must have a forward-looking data model and data marts/customer data warehouse to support sales-relevant decisions.
Refer to Info-Tech’s Develop a Master Data Management Strategy and Roadmap blueprint for further reference and assistance in data management for your sales-IT alignment.
2.4.2 30 minutes
Example: Data Steward Structure
Department A
Department B
Department C
A customer data warehouse (CDW) “is a subject-oriented, integrated, time-variant, non-volatile collection of data used to support the strategic decision-making process across marketing, sales, and service. It is the central point of data integration for customer intelligence and is the source of data for the data marts, delivering a common view of customer data” (Corporate Information Factory, n.d.).
Analogy
CDWs are like a buffet. All the food items are in the buffet. Likewise, your corporate data sources are centralized into one repository. There are so many food items in a buffet that you may need to organize them into separate food stations (data marts) for easier access.
Examples/Use Cases
Pros
Cons
2.4.3. 30 minutes
INFO-TECH OPPORTUNITY
Refer to Info-Tech’s Build an Agile Data Warehouse blueprint for more information on building a centralized and integrated data warehouse.
All training modules will be different, but some will have overlapping areas of interest.
– Assign Project Evangelists – Analytics Training – Mobile Training
Application Training
Info-Tech Insight
Train customers too. Keep the customer-facing sales portals simple and intuitive, have clear explanations/instructions under important functions (e.g. brief directions on how to initiate service inquiries), and provide examples of proper uses (e.g. effective searches). Make sure customers are aware of escalation options available to them if self-service falls short.
The team leading the rollout of new initiatives (be they applications, new governance structures, or data quality procedures) should establish a communication process to ensure management and users are well informed.
CXM-related department groups or designated trainers should take the lead and implement a process for:
The overall objective for inter-departmental kick-off meetings is to confirm that all parties agree on certain key points and understand alignment rationale and new sales app or process functionality.
The kick-off process will significantly improve internal communications by inviting all affected internal IT groups, including business units, to work together to address significant issues before the application process is formally activated.
The kick-off meeting(s) should encompass:
Info-Tech Insight
Determine who in each department will send out a message about initiative implementation, the tone of the message, the medium, and the delivery date.
Info-Tech Insight
Every piece of information that you give to a stakeholder that is not directly relevant to their interests is a distraction from your core message. Always remember to tailor the message, medium, and timing accordingly.
Once the sales-IT alignment committees have been formed, create organizational cadence through a variety of formal and informal gatherings between the two business functions.
Isolation

Collaboration

Synergy

2.4.1 Develop a CXM application integration map
Using the inventory of existing CXM-supporting applications and the newly formed CXM application portfolio as inputs, your facilitator will assist you in creating an integration map of applications to establish a system of record and flow of data.
2.4.2 Develop a mitigation plan for poor quality customer data
Our facilitator will educate your stakeholders on the importance of quality data and guide you through the creation of a mitigation plan for data preservation.
2.4.3 Assess the need for a customer data warehouse
Addressing important factors such as data volume, complexity, and flow, a facilitator will help you assess whether or not a customer data warehouse for CXM is the right fit for your organization.
Build a Strong Technology Foundation for Customer Experience Management
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion: 1 week
Step 3.1: Create an Initiative Rollout Plan
Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
Step 3.2: Confirm and Finalize the CXM Blueprint
Review findings with analyst:
Then complete these activities…
With these tools & templates:
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
Creating a comprehensive CXM strategy roadmap reduces the risk of rework, misallocation of resources, and project delays or abandonment.
Optimize the Change Management Process
You need to design a process that is flexible enough to meet demand for change and strict enough to protect the live environment from change-related incidents.
Create Project Management Success
Investing time up front to plan the project and implementing best practices during project execution to ensure the project is delivered with the planned outcome and quality is critical to project success.
3.1.1 45 minutes
Example: Constructing a Risk Management Plan
| Risk | Impact | Likelihood | Mitigation Effort | |
|---|---|---|---|---|
| Strategy Risks | Project over budget |
|
||
| Inadequate content governance | ||||
| System Risks | Integration with additional systems |
|
||
| .... | ... | ... | ... |
Likelihood
1 – High/ Needs Focus
2 – Can Be Mitigated
3 - Unlikely
Impact
1 - High Risk
2 - Moderate Risk
3 - Minimal Risk
Understanding technical and strategic risks can help you establish contingency measures to reduce the likelihood that risks will occur. Devise mitigation strategies to help offset the impact of risks if contingency measures are not enough.
Remember
The biggest sources of risk in a CXM strategy are lack of planning, poorly defined requirements, and lack of governance.
Apply the following mitigation tips to avoid pitfalls and delays.
Risk Mitigation Tips
Completion of initiatives for your CXM project will be contingent upon multiple variables.
Initiative complexity will define the need for enabling projects. Create a process to define dependencies:
Complex....Initiative
Simple....Initiative
3.1.2 45 minutes
Example: Importance-Capability Matrix

Pinpoint quick wins: high importance, low effort initiatives.
| The size of each plotted initiative must indicate the effort or the complexity and time required to complete. | |
|---|---|
| Top Right Quadrant | Strategic Projects |
| Top Left Quadrant | Quick Wins |
| Bottom Right Quadrant | Risky Bets |
| Bottom Left Quadrant | Discretionary Projects |
3.1.3 1 hour
Example: Project Dependencies
Initiative: Omnichannel E-Commerce
Dependency: WEM Suite Deployment; CRM Suite Deployment; Order Fulfillment Capabilities
3.1.4 30 minutes
Example: Importance-Capability Matrix
| Importance | Initiative | Owner | Completion Date | |
|---|---|---|---|---|
| Example Projects | High | Gather business requirements. | Project Manager | MM/DD/YYYY |
| Quick Wins | ||||
| Long Term | Medium | Implement e-commerce across all sites. | CFO & Web Manager | MM/DD/YYYY |
Importance
3.1.1 Create a risk management plan
Based on the workshop exercises, the facilitator will work with the core team to design a priority-based risk mitigation plan that enumerates the most salient risks to the CXM project and addresses them.
3.1.2; 3.1.3; 3.1.4 Identify initiative dependencies and create the CXM roadmap
After identifying dependencies, our facilitators will work with your IT SMEs and business stakeholders to create a comprehensive roadmap, outlining the initiatives needed to carry out your CXM strategy roadmap.
1.1 Create the Project Vision
1.2 Structure the Project
2.1 Scan the External Environment
2.2 Assess the Current State of CXM
2.3 Create an Application Portfolio
2.4 Develop Deployment Best Practices
3.1 Create an Initiative Rollout Plan
3.2 Confirm and Finalize the CXM Blueprint
Key performance indicators (KPIs) are quantifiable measures that demonstrate the effectiveness of a process and its ability to meet business objectives.
Specific
Measurable
Achievable
Realistic
Time-bound
Follow the SMART methodology when developing KPIs for each process.
Adhering to this methodology is a key component of the Lean management methodology. This framework will help you avoid establishing general metrics that aren’t relevant.
Info-Tech Insight
Metrics are essential to your ability to measure and communicate the success of the CXM strategy to the business. Speak the same language as the business and choose metrics that relate to marketing, sales, and customer service objectives.
3.2.1 1 hour
Example: Metrics for Marketing, Sales, and Customer Service Functions
| Metric | Example | |
|---|---|---|
| Marketing | Customer acquisition cost | X% decrease in costs relating to advertising spend |
| Ratio of lifetime customer value | X% decrease in customer churn | |
| Marketing originated customer % | X% increase in % of customer acquisition driven by marketing | |
| Sales | Conversion rate | X% increase conversion of lead to sale |
| Lead response time | X% decrease in response time per lead | |
| Opportunity-to-win ratio | X% increase in monthly/annual opportunity-to-win ratio | |
| Customer Service | First response time | X% decreased time it takes for customer to receive first response |
| Time-to-resolution | X% decrease of average time-to-resolution | |
| Customer satisfaction | X% improvement of customer satisfaction ratings on immediate feedback survey |
3.2.2 Stakeholder Power Map Template
Use this template and its power map to help visualize the importance of various stakeholders and their concerns. Prioritize your time according to the most powerful and most impacted stakeholders.
Answer questions about each stakeholder:
Focus on key players: relevant stakeholders who have high power, should have high involvement, and are highly impacted.
INFO-TECH DELIVERABLE
3.2.3 Stakeholder Communication Planning Template
Use the Stakeholder Communication Planning Template to document your list of initiative stakeholders so you can track them and plan communication throughout the initiative.
Track the communication methods needed to convey information regarding CXM initiatives. Communicate how a specific initiative will impact the way employees work and the work they do.
INFO-TECH DELIVERABLE
3.2.4 1 hour
3.2.5 CXM Strategy Stakeholder Presentation Template
Complete the presentation template as indicated when you see the green icon throughout this deck. Include the outputs of all activities that are marked with this icon.
Info-Tech has designed the CXM Strategy Stakeholder Presentation Template to capture the most critical aspects of the CXM strategy. Customize it to best convey your message to project stakeholders and to suit your organization.
The presentation should be no longer than one hour. However, additional slides can be added at the discretion of the presenter. Make sure there is adequate time for a question and answer period.
INFO-TECH DELIVERABLE
After the presentation, email the deck to stakeholders to ensure they have it available for their own reference.
3.2.6 30 minutes
3.2.4 Create a stakeholder power map and communication plan
An analyst will walk the project team through the creation of a communication plan, inclusive of project metrics and their respective goals. If you are planning a variety of CXM initiatives, track how the change will be communicated and to whom. Determine the employees who will be impacted by the change.
Accenture Digital. “Growing the Digital Business: Accenture Mobility Research 2015.” Accenture. 2015. Web.
Afshar, Vala. “50 Important Customer Experience Stats for Business Leaders.” Huffington Post. 15 Oct. 2015. Web.
APQC. “Marketing and Sales Definitions and Key Measures.” APQC’s Process Classification Framework, Version 1.0.0. APQC. Mar. 2011. Web.
CX Network. “The Evolution of Customer Experience in 2015.” Customer Experience Network. 2015. Web.
Genesys. “State of Customer Experience Research”. Genesys. 2018. Web.
Harvard Business Review and SAS. “Lessons From the Leading Edge of Customer Experience Management.” Harvard Business School Publishing. 2014. Web.
Help Scout. “75 Customer Service Facts, Quotes & Statistics.” Help Scout. n.d. Web.
Inmon Consulting Services. “Corporate Information Factory (CIF) Overview.” Corporate Information Factory. n.d. Web
Jurevicius, Ovidijus. “VRIO Framework.” Strategic Management Insight. 21 Oct. 2013. Web.
Keenan, Jim, and Barbara Giamanco. “Social Media and Sales Quota.” A Sales Guy Consulting and Social Centered Selling. n.d. Web.
Malik, Om. “Internet of Things Will Have 24 Billion Devices by 2020.” Gigaom. 13 Oct. 2011. Web.
McGovern, Michele. “Customers Want More: 5 New Expectations You Must Meet Now.” Customer Experience Insight. 30 July 2015. Web.
McGinnis, Devon. “40 Customer Service Statistics to Move Your Business Forward.” Salesforce Blog. 1 May 2019. Web.
Reichheld, Fred. “Prescription for Cutting Costs”. Bain & Company. n.d. Web.
Retail Congress Asia Pacific. “SAP – Burberry Makes Shopping Personal.” Retail Congress Asia Pacific. 2017. Web.
Rouse, Margaret. “Omnichannel Definition.” TechTarget. Feb. 2014. Web.
Salesforce Research. “Customer Expectations Hit All-Time High.” Salesforce Research. 2018. Web.
Satell, Greg. “A Look Back at Why Blockbuster Really Failed and Why It Didn’t Have To.” Forbes. 5 Sept. 2014. Web.
Social Centered Learning. “Social Media and Sales Quota: The Impact of Social Media on Sales Quota and Corporate Review.” Social Centered Learning. n.d. Web.
Varner, Scott. “Economic Impact of Experience Management”. Qualtrics/Forrester. 16 Aug. 2017. Web.
Wesson, Matt. “How to Use Your Customer Data Like Amazon.” Salesforce Pardot Blog. 27 Aug. 2012. Web.
Winterberry Group. “Taking Cues From the Customer: ‘Omnichannel’ and the Drive For Audience Engagement.” Winterberry Group LLC. June 2013. Web.
Wollan, Robert, and Saideep Raj. “How CIOs Can Support a More Agile Sales Organization.” The Wall Street Journal: The CIO Report. 25 July 2013. Web.
Zendesk. “The Impact of Customer Service on Customer Lifetime Value 2013.” Z Library. n.d. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
The focus of this phase is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will formally examine the many definitions of design thinking from experts in this field. At the core of this phase are several case studies that illuminate the various aspects of design thinking.
This phase will illustrate the relevance of design in strategy formulation and in service-design. At the core of this phase are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization and establish a baseline of user-experience with the journeys orchestrated by your organization.
The focus of this phase is to:
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
The focus of this module is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will also review the report on the design-centricity of your organization and subsequently, earmark the areas for improvement.
An intimate understanding of the design thinking
An assessment of design-centricity of your organization and identification of areas for improvement
1.1 Discuss case studies on how designers think and work
1.2 Define design thinking
1.3 Review report from Info-Tech’s diagnostic: How design-centric is your organization?
1.4 Earmark areas for improvement to raise the design-centricity of your organization
Report from Info-Tech’s diagnostic: ‘How design-centric is your organization?’ with identified areas for improvement.
In this module, we will discuss the relevance of design in strategy formulation and service design. At the core of this module are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization. We will establish a baseline of user experience with the journeys orchestrated by your organization.
An in-depth understanding of the relevance of design in strategy formulation and service design
An understanding of the trends that impact your organization
A taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those
2.1 Discuss relevance of design in strategy through case studies
2.2 Articulate trends that impact your organization
2.3 Discuss service design through case studies
2.4 Identify critical customer journeys and baseline customers’ satisfaction with those
2.5 Run a simulation of design in practice
Trends that impact your organization.
Taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those.
The focus of this module is to define an approach for a design program that suits your organization’s specific goals and culture.
An approach for the design program in your organization. This includes aspects of the design program such as its objectives and measures, its model (one of the five archetypes or a hybrid one), and its governance.
3.1 Identify objectives and key measures for your design thinking program
3.2 Structure your program after reviewing five main archetypes of a design program
3.3 Balance between incremental and disruptive innovation
3.4 Review best practices of a design organization
An approach for your design thinking program: objectives and key measures; structure of the program, etc.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Review the business’ perception and architecture of the current data warehouse environment.
Collaborate with business users to identify the strongest motivations for data warehouse modernization.
Combine business ideas with modernization initiatives and create a roadmap.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Discuss the general project overview for data warehouse modernization.
Establish the business and IT perspectives of the current state.
Holistic understanding of the current data warehouse.
Business user engagement from the start of the project.
1.1 Review data warehouse project history.
1.2 Evaluate data warehouse maturity.
1.3 Draw architecture diagrams.
1.4 Review supporting data management practices.
Data warehouse maturity assessment
Data architecture diagrams
Conduct a user workshop session to elicit the most pressing needs of business stakeholders.
Modernization technology selection is directly informed by business drivers.
In-depth IT understanding of the business pains and opportunities.
2.1 Review general trends and drivers in your industry.
2.2 Identify primary business frustrations, opportunities, and risks.
2.3 Identify business processes to target for modernization.
2.4 Capture business ideas for the future state.
Business ideas for modernization
Defined strategic direction for data warehouse modernization
Educate IT staff on the most common technologies for data warehouse modernization.
Improved ability for IT to match technology with business ideas.
3.1 Appoint Modernization Advisors.
3.2 Hold an open education and discussion forum for modernization technologies.
Modernization Advisors identified
Modernization technology education deck
Consolidate business ideas into modernization initiatives.
Refinement of the strategic direction for data warehouse modernization.
4.1 Match business ideas to technology solutions.
4.2 Group similar ideas to create modernization initiatives.
4.3 Create future-state architecture diagrams.
Identified strategic direction for data warehouse modernization
Defined modernization initiatives
Future-state architecture for data warehouse
Validate and build out initiatives with business users.
Define benefits and costs to establish ROI.
Identify enablers and barriers to modernization.
Completion of materials for a compelling business case and roadmap.
5.1 Validate use cases with business users.
5.2 Define initiative benefits.
5.3 Identify enablers and barriers to modernization.
5.4 Define preliminary activities for initiatives.
5.5 Evaluate initiative costs.
5.6 Determine overall ROI.
Validated modernization initiatives
Data warehouse modernization roadmap
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify and validate goals and collaboration tools that are used by your users, and the collaboration capabilities that must be supported by your desired ECS.
Map a path forward by creating a collaboration capability map and documenting your ECS requirements.
Effectively engage everyone to ensure the adoption of your new ECS. Engagement is crucial to the overall success of your project.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Create a vision for the future of your ECS.
Validate and bolster your strategy by involving your end users.
1.1 Prioritize Components of Your ECS Strategy to Improve
1.2 Create a Plan to Gather Requirements From End Users
1.3 Brainstorm the Collaboration Services That Are Used by Your Users
1.4 Focus Group
Defined vision and mission statements
Principles for your ECS
ECS goals
End-user engagement plan
Focus group results
ECS executive presentation
ECS strategy
Streamline your collaboration service portfolio.
Documented the business requirements for your collaboration services.
Reduced the number of supported tools.
Increased the effectiveness of training and enhancements.
2.1 Create a Current-State Collaboration Capability Map
2.2 Build a Roadmap for Desired Changes
2.3 Create a Future-State Capability Map
2.4 Identify Business Requirements
2.5 Identify Use Requirements and User Processes
2.6 Document Non-Functional Requirements
2.7 Document Functional Requirements
2.8 Build a Risk Register
Current-state collaboration capability map
ECS roadmap
Future-state collaboration capability map
ECS business requirements document
Ensure the system is supported effectively by IT and adopted widely by end users.
Unlock the potential of your ECS.
Stay on top of security and industry good practices.
Greater end-user awareness and adoption.
3.1 Develop an IT Training Plan
3.2 Develop a Communications Plan
3.3 Create Initial Marketing Material
IT training plan
Communications plan
App marketing one-pagers
This is a story that should make you perk up.
I know of a department that was eager to launch their new product. The strain was severe. The board was breathing down their necks. Rivals were catching up (or so they thought).
"Let's get this thing live, prove the market wants it, then we'll circle back and handle all the security and stability backlog items." For the product owner, at the time, that seemed the right thing to do.
They were hacked 48 hours after going live.
Customer information was stolen. The brand's reputation suffered. The decision led to a months-long legal nightmare. And they still had to completely rebuild the system. Making stability and security bolt-on items is never a good idea.
See, I understand. When the product owner is pressing for user experience enhancements and you're running out of time for launch, it's easy to overlook those "non-functional requirements." Yet, we should avoid blaming the product owner. The PO is under pressure from many stakeholders, and a delayed launch may also come with significant costs.
Load balancing isn't visible to customers, after all. Penetration testing doesn't excite them. Failure mechanisms don't matter to them. This statement is true until a malfunction impacts a client. Then it suddenly becomes the most important thing in the world.
However, I know that ignoring non-functional requirements (NFRs) can lead to failed businesses (or business lines). This elevates these issues beyond mere technical inconveniences. NFRs are designed with the client in mind.
Look at it this way. When your system crashes during periods of high traffic, how does the user experience change? How satisfied are customers when their personal information is stolen? When it takes 30 seconds for your website to load, how does that conversion rate look?
Let me expose you to some consultant figures. The average cost of IT outages is $5,600 per minute, according to a 2014 Gartner study. That figure can rise to $300,000 per hour for larger businesses. The reality is that in your department, you will rarely reach these numbers. When we look at current (2020-2025) and expected (2026) trends, the typical operational loss numbers in international commercial banking or insurance are closer to 100K for high-impact incidents that are handled within 2–3 hours.
Obviously, your numbers will vary. And if you don't know what your costs are, now would be a good time to discover that. This does not imply that you should simply accept the risks associated with such situations. You must fix or mitigate such opportunities for hackers to get in. Do so at the appropriate cost for your business.
Data breaches are a unique phenomenon. According to IBM's Cost of a Data Breach Report 2025, a data breach typically costs $4.44 million, and detecting and containing it takes an average of 241 days. Some preview data from the 2025 report include that 97% of organizations that reported on the study indicated that they lacked access controls for their AI systems. That means that many companies don't even have the basics in order. And AI-related breaches are just going to accelerate. AI security defenses will help lower the cost of such breaches.
Despite the decreasing cost of these breaches, I anticipate an increase in their frequency in the upcoming years.
This means that non-functional requirements in terms of security and resilience should take a more prominent place in the prioritizations. Your client depends on your systems being safe, resilient, and performant.
And yet, this is where some leaders make mistakes. I have the impression they believe that client-focused design means more functionality and elegant interfaces. They prioritize user experience enhancements over system reliability.
I want to share a key fact that distinguishes successful businesses: customers desire more than just a good product. It must always function for them. And that means following certain procedures. They are not there to hamper you; they are there to retain customers.
88% of online shoppers are less likely to visit a website again after a negative experience, according to research from Forrester. Amazon found that they lose 1% of sales for every 100 ms of latency. That 100 milliseconds adds up to millions of lost profits when billions of dollars are at stake.
You run the risk of more than just technical difficulties when you deprioritize safety. Customer trust, revenue stability, competitive advantage, adherence to the law, costs, and team morale are all at stake.
Allow me to illustrate what I see happening during development cycles.
The team tests the happy flow. The user successfully logs in. The user navigates with ease. The user makes the purchase without any problems. The user logs off without incident.
"Excellent! Publish it!"
However, what occurs if 1000 users attempt to log in at once? What occurs if an attempt is made to insert malicious code into your contact form? During a transaction, what happens if your database connection fails?
These are not extreme situations. These are real-life occurrences.
Fifty percent of data center managers and operators reported having an impactful outage in the previous three years, according to the Uptime Institute's 2025 Global Data Center Survey. Note that this is at the infra level. The biggest contributor is power outages. What role does power play in ensuring a smooth flow? Power will not always flow as you want it, so plan for lack of power and for spikes.
With regard to software failures, the spread of possible causes widens. AI is a big contributor. AI is typically brought in to accelerate development and assist in coding. But it tends to introduce subtle bugs and vulnerabilities that a seasoned developer has to review and solve.
Another upcoming article will discuss how faster release cycles often lead to a rush in testing. This should not be the case; by spending some time automating your (non-)regression test bank, you will gain speed. But you have to invest time in building the test suite.
Can your system handle success? This question should keep every executive awake at night.
I've witnessed businesses invest millions in advertising campaigns to drive traffic to systems that fail due to their success. Consider describing to your board how your greatest marketing victory became your worst operational mishap.
Managing traffic spikes is only one aspect of load balancing. It is about ensuring that your business can handle opportunities without being overwhelmed.
Let's now address the most pressing issue: security.
The majority of leaders consider security to be like insurance, something you hope you never need. The fact that security is more than just protection, however, will alter the way you approach every project. It's approval to develop.
According to the Ponemon Institute's 2025 Cost of Insider Threats Global Report, the average annualized cost of insider threats, defined as employee negligence, criminal insiders, and credential thieves, has risen to $17.4 million per incident, up from $15.4 million in 2022. The number of discovered and analyzed incidents increased from 3,269 in 2018 to 7,868 in 2025 research studies.
Cybersecurity Ventures predicts that cybercrime will cost the global economy $10.5 trillion annually by 2025.
The most fascinating thing, though, is that companies that invest in proactive security see measurable outcomes. Organizations that allocate over 10% of their IT budget to cybersecurity have a 2.5-fold higher chance of experiencing no security incidents than those that allocate less than 1%, per Deloitte's Future of Cyber Survey.
By hardening your systems against common attack vectors, you can scale quickly without worrying about the future. You can handle sensitive data with confidence, enter new markets without fear, establish partnerships that require trust, and focus on innovation instead of crisis management.
Allow me to explain this in a way that will satisfy your CFO.
Retention is equal to reliability. Customers return when a system functions reliably (given you sell items they want). The Harvard Business Review claims that a 5% increase in customer retention rates boosts profits by 25% to 95%. It is five to twenty-five times less expensive to retain customers than to acquire new ones.
Scalability is equal to security. Secure systems can handle larger client volumes, more sensitive data, and higher-value transactions. 69% of board members and C-suite executives think that privacy and cyber risks could affect their company's ability to grow, according to PwC.
Profit is equal to performance. You lose conversions for every second of load time. Google discovered that the likelihood of a bounce rises by 32% as page load time increases from 1 to 3 seconds. It increases by 90% from 1 second to 5 seconds. Walmart discovered that every second improvement in page load time led to a 2% increase in conversions.
Reputation is equal to resilience. Guess which company benefits when your system works while your competitors' systems fail? Failures reduce trust. 71% of consumers will actively advocate against companies they don't trust, and 67% of consumers will stop purchasing from them, according to Edelman's 2023 Trust Barometer. While the 2025 report does not present comparative numbers, distrust impacting consumer behavior is likely to be even more prevalent.
Reframe this discussion with your executives and team
The numbers support this point. Businesses that invest in operational resilience see three times higher profit margins and 2.5 times higher revenue growth than their counterparts, according to McKinsey's 2023 State of Organizations report. In 2025 we see a focus on AI, but the point remains.
These metrics will grab the attention when you're presenting them.
Although the average cost of downtime varies by industry, it is always high.
The impact of a security breach on customer lifetime value is equally uncomfortable. Following a data breach, 78% of consumers will cease interacting with a brand online, and 36% will never do so again, according to Ping Identity's 2023 Consumer Identity Breach Report.
Every second that the system is unavailable results in a rapidly mounting loss of money. That's about $3,170 per minute of full downtime for a business that makes $100 million a year. We're talking about $31,700 per minute for billion-dollar businesses. Again, your experience may differ, but it's important to note that this cost is often unseen yet undeniable. If you want to calculate this more granularly, then I have a calculation method for you that is easy to implement.
There is a discernible trend in the cost of rebuilding versus building correctly the first time. Resolving a problem in production can cost four to five times as much as fixing it during design, and it can cost up to 100 times as much as fixing it during the requirements and design phase, according to IBM's Systems Sciences Institute.
This is what you should do right away.
Please begin by reviewing your current primary systems. When they're under stress, what happens? What occurs if they are attacked? What occurs if they don't work? 40% of businesses that suffer a significant system failure never reopen, although only 23% of organizations have tested their disaster recovery plans in the previous year, according to Gartner. Companies we work with test their systems at least once per year. If the results are unsatisfactory, we conduct a retest to ensure they meet our standards.
Next, please determine the actual cost of addressing issues at a later stage. Add in the costs of customer attrition, security breaches, downtime, and reconstruction. To lend credibility to your calculations, try to work out exact numbers for your company. Industry standards (like in this article) will give you indicators, but you need to know your figures.
Third, recast your non-functional needs as business needs. Consider focusing on strategies for managing success rather than solely discussing load balancing. Instead of discussing security testing, focus on revenue protection.
Fourth, consider safety when defining "done." Until a feature is dependable, secure, and scalable, it isn't considered complete. Projects that incorporate non-functional requirements from the outset have a threefold higher chance of success, per the Standish Group's 2023 Chaos Report.
Fifth, use system dependability as a differentiator in the marketplace. You're up when your rivals are down. You're safe when they're compromised.
I understand that resilience isn't sexy. I am aware that UI enhancements are more exciting than infrastructure resilience.
And yet, I know that businesses that prioritize safety will survive and lead after seeing others thrive and fail based on this one choice. Customers trust them. They are capable of scaling without breaking. Because they are confident that their systems can manage whatever comes next, they are the ones who get a good night's sleep.
Resilient organizations are twice as likely to surpass customer satisfaction goals and are 2.5 times more likely to achieve revenue growth of 10% or more.
Resilience represents the most significant competitive advantage. You have a choice. Just keep in mind that your clients are depending on you to do the job correctly.
IBM i remains a vital platform and now many CIOs, CTOs, and IT leaders are faced with the same IBM i challenges regardless of industry focus: how do you evaluate the future viability of this platform, assess the future fit and purpose, develop strategies, and determine the future of this platform for your organization?
For organizations that are struggling with the iSeries/IBM i platform, resourcing challenges are typically the culprit. An aging population of RPG programmers and system administrators means organizations need to be more pro-active in maintaining in-house expertise. Migrating off the iSeries/IBM i platform is a difficult option for most organizations due to complexity, switching costs in the short term, and a higher long-term TCO.
The most common tactic is for the organization to better understand their IBM i options and adopt some level of outsourcing for the non-commodity platform retaining the application support/development in-house. To make the evident, obvious; the options here for the non-commodity are not as broad as with commodity server platforms. Options include co-location, onsite outsourcing, managed and public cloud services.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This project will help you evaluate the future viability of this platform; assess the fit, purpose, and price; develop strategies for overcoming potential challenges; and determine the future of this platform for your organization.
Use this scoring sheet to help you define and evaluate IBM i vendor responses.
IBM i remains a vital platform and now many CIO, CTO, and IT leaders are faced with the same IBM i challenges regardless of industry focus; how do you evaluate the future viability of this platform, assess the future fit and purpose, develop strategies, and determine the future of this platform for your organization?
For organizations that are struggling with the iSeries/IBM i platform, resourcing challenges are typically the culprit. An aging population of RPG programmers and system administrators means organizations need to be more proactive in maintaining in-house expertise. Migrating off the iSeries/IBM i platform is a difficult option for most organizations due to complexity, switching costs in the short term, and a higher long-term TCO.
The most common tactic is for the organization to better understand its IBM i options and adopt some level of outsourcing for the non-commodity platform, retaining the application support/development in-house. To make the evident, obvious: the options here for the non-commodity are not as broad as with commodity server platforms. Options include co-location, onsite outsourcing, managed hosting, and public cloud services.
“For over twenty years, IBM was ‘king,’ dominating the large computer market. By the 1980s, the world had woken up to the fact that the IBM mainframe was expensive and difficult, taking a long time and a lot of work to get anything done. Eager for a new solution, tech professionals turned to the brave new concept of distributed systems for a more efficient alternative. On June 21, 1988, IBM announced the launch of the AS/400, their answer to distributed computing.” (Dale Perkins)
We help IT leaders make the most of their IBM i environment.
The IBM i remains a vital platform for many businesses and continues to deliver exceptional reliability and performance and play a key role in the enterprise. With the limited resources at hand, CIOs and the like must continually review and understand their migration path with the same regard as any other distributed system roadmap.
Thought ModelWe will investigate the aspect of different IBM i scenarios as they impact business, what that means, and how that can guide the questions that you are asking as you move to an aligned IBM i IT strategy. Our model considers:
Info-Tech InsightsWith multiple control points to be addressed, care must be taken in simplifying your options while addressing all concerns to ease operational load. | ![]() |
| “The IBM i Reality” – Darin Stahl Most members relying on business applications/workloads running on non-commodity platforms (zSeries, IBM i, Solaris, AIX, etc.) are first motivated to get out from under the perceived higher costs for the hardware platform. An additional challenge for non-commodity platforms is that from an IT Operations Management perspective they become an island with a diminishing number of integrated operations skills and solutions such as backup/restore and monitoring tools. The most common tactic is for the organization to adopt some level of outsourcing for the non-commodity platform, retaining the application support and development in-house. | Key challenges with current IBM i environments:
|
| Co-Location A customer transitions their hardware environment to a provider’s data center. The provider can then manage the hardware and “system.” | Onsite Outsourcing A provider will support the hardware/system environment at the client’s site. | Managed Hosting A customer transitions their legacy application environment to an off-prem hosted, multi-tenanted environment. | Public Cloud A customer can “re-platform” the non-commodity workload into public cloud offerings or in a few offerings “re-host.” |
Provider manages the data center hardware environment.
| Abstract Here a provider manages the system data center environment and hardware; however, the client’s in-house IBM i team manages the IBM i hardware environment and the system applications. The client manages all of the licenses associated with the platform as well as the hardware asset management considerations. This is typically part of a larger services or application transformation. This effectively outsources the data center management while maintaining all IBM i technical operations in-house. Advantages
| Considerations
Info-Tech InsightsThis model is extremely attractive for organizations looking to reduce their data center management footprint. Idea for the SMB. |
A provider will support the hardware/system environment at the client’s site.
| Abstract Here a provider will support and manage the hardware/system environment at the client’s site. The provider may acquire the customer’s hardware and provide software licenses. This could also include hiring or “rebadging” staff supporting the platform. This type of arrangement is typically part of a larger services or application transformation. While low risk, it is not as cost-effective as other deployment models. Advantages
| Considerations
Info-Tech InsightsDepending on the application lifecycle and viability, in-house skill and technical depth is a key consideration when developing your IBM i strategy. |
Transition legacy application environment to an off-prem hosted multi-tenanted environment.
| Abstract This type of arrangement is typically part of an application migration or transformation. In this model, a client can “re-platform” the application into an off-premises-hosted provider platform. This would yield many of the cloud benefits however in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux) and the associated application. Advantages
| Considerations
Info-Tech InsightsThere is a difference between a “re-host” and “re-platform” migration strategy. Determine which solution aligns to the application requirements. |
Leverage “public cloud” alternatives with AWS, Google, or Microsoft AZURE.
| Abstract This type of arrangement is typically part of a larger migration or application transformation. While low risk, it is not as cost-effective as other deployment models. In this model, client can “re-platform” the non-commodity workload into public cloud offerings or in a few offerings “re-host.” This would yield many of the cloud benefits however in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux). Advantages
| Considerations
Info-Tech InsightsThis model is extremely attractive for organizations that consume primarily cloud services and have a large remote workforce. |
|
Info-Tech InsightsCreating vendor profiles will help quickly filter the solution providers that directly meet your IBM i needs. |
Vendor Profile #1 | Rowton IT | |
| Summary of Vendor “Rowton IT thrive on creating robust and simple solutions to today's complex IT problems. We have a highly skilled and motivated workforce that will guarantee the right solution. Working with select business partners, we can offer competitive and cost effective packages tailored to suit your budget and/or business requirements. Our knowledge and experience cover vast areas of IT including technical design, provision and installation of hardware (Wintel and IBM Midrange), technical engineering services, support services, IT project management, application testing, documentation and training.” | IBM i Services
| |
URL Regional Coverage: | ![]() | |
Vendor Profile #2 | Connectria | |
| Summary of Vendor “Every journey starts with a single step and for Connectria, that step happened to be with the world’s largest bank, Deutsche Bank. Followed quickly by our second client, IBM. Since then, we have added over 1,000 clients worldwide. For 25 years, each customer, large or small, has relied on Connectria to deliver on promises made to make it easy to do business with us through flexible terms, scalable solutions, and straightforward pricing. Join us on our journey.” | IBM i Services
| |
Regional Coverage: | ![]() | |
Vendor Profile #3 | Mid-Range | |
| Summary of Vendor “Founded in 1988 and profitable throughout all of those 31 years, we have a solid track record of success. At Mid-Range, we use our expertise to assess your unique needs, in order to proactively develop the most effective IT solution for your requirements. Our full-service approach to technology and our diverse and in-depth industry expertise keep our clients coming back year after year. Serving clients across North America in a variety of industries, from small and emerging organizations to large, established enterprises – we’ve seen it all. Whether you need hardware or software solutions, disaster recovery and high availability, managed services or hosting or full ERP services with our JD Edwards offerings – we have the methods and expertise to help.” | IBM i Services
| |
URL Regional Coverage: | ![]() | |
This check-point process creates transparency around agreement costs with the business and gives the business an opportunity to re-evaluate its requirements for a potentially leaner agreement.
|
Vendor Profile Template | [Vendor Name] | |
| Summary of Vendor [Vendor Summary] | IBM i Services
| |
URL Regional Coverage: | *Insert the Vendor Logo* | |
| Use the IT Infrastructure Outsourcing Scoring Tool to manage vendor responses. | |
| Use Info-Tech’s IT Infrastructure Outsourcing Scoring Tool to systematically score your vendor responses. The overall quality of the IBM i questions can help you understand what it might be like to work with the vendor. Consider the following questions:
Once you have the vendor responses, you will select two or three vendors to continue assessing in more depth leading to an eventual final selection. | ![]() |
Watch out for misleading scores that result from poorly designed criteria weightings.
Vendor Conference CallDevelop an agenda for the conference call. Here is a sample agenda:
Commonly Debated Question: Many organizations worry that if vendors can identify each other, they will price fix. However, price fixing is extremely rare due to its consequences and most vendors likely have a good idea which other vendors are participating in the bid. Another thought is that revealing vendors could either result in a higher level of competition or cause some vendors to give up:
| Vendor WorkshopA vendor workshop day is an interactive way to provide context to your vendors and to better understand the vendors’ offerings. The virtual or in-person interaction also offers a great way to understand what it’s like to work with each vendor and decide whether you could build a partnership with them in the long run. The main focus of the workshop is the vendors’ service solution presentation. Here is a sample agenda for a two-day workshop: Day 1
|
| Use the IT Infrastructure Outsourcing Scoring Tool to manage vendor responses. | |
Effectively Acquire Infrastructure Services
Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.
Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery
There are very few IT infrastructure components you should be housing internally – outsource everything else.
Build Your Infrastructure Roadmap
Move beyond alignment: Put yourself in the driver’s seat for true business value.
Define Your Cloud Vision
Make the most of cloud for your organization.
Document Your Cloud Strategy
Drive consensus by outlining how your organization will use the cloud.
Create a Right-Sized Disaster Recovery Plan
Close the gap between your DR capabilities and service continuity requirements.
Create a Better RFP Process
Improve your RFPs to gain leverage and get better results.
![]() | Darin Stahl, Principal Research Advisor, Info-Tech Research Group Principal Research Advisor within the Infrastructure Practice and leveraging 38+ years of experience, his areas of focus include: IT Operations Management, Service Desk, Infrastructure Outsourcing, Managed Services, Cloud Infrastructure, DRP/BCP, Printer Management, Managed Print Services, Application Performance Monitoring (APM), Managed FTP, and non-commodity servers (zSeries, mainframe, IBM i, AIX, Power PC). |
![]() | Troy Cheeseman, Practice Lead, Info-Tech Research Group Troy has over 24 years of experience and has championed large, enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT Operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) start-ups. |
![]() | Dan Duffy, President & Owner, Mid-Range Dan Duffy is the President and Founder of Mid-Range Computer Group Inc., an IBM Platinum Business Partner. Dan and his team have been providing the Canadian and American IBM Power market with IBM infrastructure solutions including private cloud, hosting and disaster recovery, high availability and data center services since 1988. He has served on numerous boards and associations including the Toronto Users Group for Mid-Range Systems (TUG), the IBM Business Partners of the Americas Advisory Council, the Cornell Club of Toronto, and the Notre Dame Club of Toronto. Dan holds a Bachelor of Science from Cornell University. |
![]() | George Goodall, Executive Advisor, Info-Tech Research Group George Goodall is an Executive Advisor in the Research Executive Services practice at Info-Tech Research Group. George has over 20 years of experience in IT consulting, enterprise software sales, project management, and workshop delivery. His primary focus is the unique challenges and opportunities in organizations with small and constrained IT operations. In his long tenure at Info-Tech, George has covered diverse topics including voice communications, storage, and strategy and governance. |
“Companies using IBM i (formerly known as i5/OS).” Enlyft, 21 July 2021. Web.
Connor, Clare. “IBM i and Meeting the Challenges of Modernization.” Ensono, 22 Mar. 2022. Web.
Huntington, Tom. “60+ IBM i User Groups and Communities to Join?” HelpSystems, 16 Dec. 2021. Web.
Perkins, Dale. “The Road to Power Cloud: June 21st 1988 to now. The Journey Continues.” Mid-Range, 1 Nov. 2021. Web.
Prickett Morgan, Timothy. “How IBM STACKS UP POWER8 AGAINST XEON SERVERS.” The Next Platform, 13 Oct. 2015. Web.
“Why is AS/400 still used? Four reasons to stick with a classic.” NTT, 21 July 2016. Web.
Appendix – | AWS
|
Appendix – |
|
Appendix – | Azure
|
Appendix – | IBM
|
If you have a Domino/Notes footprint that is embedded within your business units and business processes and is taxing your support organization, you may have met resistance from the business and been asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses and a multipurpose solution that, over the years, became embedded within core business applications and processes.
For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.
The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint will help you assess the fit, purpose, and price of Domino options; develop strategies for overcoming potential challenges; and determine the future of Domino for your organization.
Use this tool to input the outcomes of your various application assessments.
“HCL announced that they have somewhere in the region of 15,000 Domino customers worldwide, and also claimed that that number is growing. They also said that 42% of their customers are already on v11 of Domino, and that in the year or so since that version was released, it’s been downloaded 78,000 times. All of which suggests that the Domino platform is, in fact, alive and well.”
– Nigel Cheshire in Team Studio
You have a Domino/Notes footprint embedded within your business units and business processes. This is taxing your support organization; you are meeting resistance from the business, and you are now asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses as a multipurpose solution that, over the years, became embedded within core business applications and processes.
For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.
The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.
Is “Lotus” Domino still alive?
The number of member engagements with customers regarding the Domino platform has, as you might imagine, dwindled in the past couple of years. While many members have exited the platform, there are still many members and organizations that have entered a long exit program, but with how embedded Domino is in business processes, the migration has slowed and been met with resistance. Some organizations had replatformed the applications but found that the replacement target state was inadequate and introduced friction because the new solution was not a low-code/business-user-driven environment. This resulted in returning the Domino platform to production and working through a strategy to maintain the environment.
Believe it or not, Domino and Notes are still options to consider when determining a migration strategy. With HCL still committed to the platform, there are options organizations should seek to better understand rather than assuming SharePoint will solve all. In our research, we consider:
With multiple options to consider, take the time to clearly understand the application rationalization process within your decision making.
“There is a lot of bias toward Domino; decisions are being made by individuals who know very little about Domino and more importantly, they do not know how it impacts business environment.”
– Rob Salerno, Founder & CTO, Rivet Technology Partners
by Darin Stahl
| Key/Value | Column | ||
|---|---|---|---|
Use case: Heavily accessed, rarely updated, large amounts of data |
Use case: High availability, multiple data centers |
||
| Document | Graph | ||
Use case: Rapid development, Web and programmer friendly |
Use case: Best at dealing with complexity and relationships/networks |
||
Store the application data in a long-term repository with the means to locate and read it for regulatory and compliance purposes.
Migrate to a new version of the application, facilitating the process of moving software applications from one computing environment to another.
Replatforming is an option for transitioning an existing Domino application to a new modern platform (i.e. cloud) to leverage the benefits of a modern deployment model.
Review the current Domino platform roadmap and understand HCL’s support model. Keep the application within the Domino platform.
Retire the application, storing the application data in a long-term repository.
The most common approach is to build the required functionality in whatever new application/solution is selected, then archive the old data in PDFs and documents.
Typically this involves archiving the data and leveraging Microsoft SharePoint and the new collaborative solutions, likely in conjunction with other software-as-a-service (SaaS) solutions.
Be aware of the costs associated with archiving. The more you archive, the more it will cost you.
Migrate to a new version of the application
An application migration is the managed process of migrating or moving applications (software) from one infrastructure environment to another.
This can include migrating applications from one data center to another data center, from a data center to a cloud provider, or from a company’s on-premises system to a cloud provider’s infrastructure.
Transition an existing Domino application to a new modern platform
This type of arrangement is typically part of an application migration or transformation. In this model, client can “replatform” the application into an off-premises hosted provider platform. This would yield many benefits of cloud but in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux) and the associated application.
Two challenges are particularly significant when migrating or replatforming Domino applications:
There is a difference between a migration and a replatform application strategy. Determine which solution aligns to the application requirements.
Stay with HCL, understanding its future commitment to the platform.
Following the announced acquisition of IBM Domino and up until around December 2019, HCL had published no future roadmap for the platform. The public-facing information/website at the time stated that HCL acquired “the product family and key lab services to deliver professional services.” Again, there was no mention or emphasis on upcoming new features for the platform. The product offering on their website at the time stated that HCL would leverage its services expertise to advise clients and push applications into four buckets:
That public-facing messaging changed with release 11.0, which had references to IBM rebranded to HCL for the Notes and Domino product – along with fixes already inflight. More information can be found on HCL’s FAQ page.
“SWING Software delivers content transformation and archiving software to over 1,000 organizations worldwide. Our solutions uniquely combine key collaborative platforms and standard document formats, making document production, publishing, and archiving processes more efficient.”*
Lotus Notes Data Migration and Archiving: Preserve historical data outside of Notes and Domino
Lotus Note Migration: Replacing Lotus Notes. Boost your migration by detaching historical data from Lotus Notes and Domino.
Croatia
“Providing leading solutions, resources, and expertise to help your organization transform its collaborative environment.”*
Notes Domino Migration Solutions: Rivit’s industry-leading solutions and hardened migration practice will help you eliminate Notes Domino once and for all.
Rivive Me: Migrate Notes Domino applications to an enterprise web application
Canada
* rivit.ca
“More than 300 organizations across 40+ countries trust skybow to build no-code/no-compromise business applications & processes, and skybow’s community of customers, partners, and experts grows every day.”*
SkyBow Studio: The low-code platform fully integrated into Microsoft 365
Switzerland
“CIMtrek is a global software company headquartered in the UK. Our mission is to develop user-friendly, cost-effective technology solutions and services to help companies modernize their HCL Domino/Notes® application landscape and support their legacy COBOL applications.”*
CIMtrek SharePoint Migrator: Reduce the time and cost of migrating your IBM® Lotus Notes® applications to Office 365, SharePoint online, and SharePoint on premises.
United Kingdom
“4WS.Platform is a rapid application development tool used to quickly create multi-channel applications including web and mobile applications.”*
4WS.Platform is available in two editions: Community and Enterprise.
The Platform Enterprise Edition, allows access with an optional support pack.
4WS.Platform’s technical support provides support services to the users through support contracts and agreements.
The platform is a subscription support services for companies using the product which will allow customers to benefit from the knowledge of 4WS.Platform’s technical experts.
Italy
Application rationalization is the perfect exercise to fully understand your business-developed applications, their importance to business process, and the potential underlying financial impact.
Use this Application Rationalization Tool to input the outcomes of your various application assessments
Follow the instructions to generate recommended dispositions and populate an application portfolio roadmap.
Watch out for misleading scores that result from poorly designed criteria weightings.
Manage your application portfolio to minimize risk and maximize value.
Empower the business to implement their own applications with a trusted business-IT relationship.
Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.
Optimize your organization’s enterprise application capabilities with a refined and scalable methodology.
Leverage your vendor sourcing process to get better results.
Darin is a Principal Research Advisor within the Infrastructure practice, leveraging 38+ years of experience. His areas of focus include IT operations management, service desk, infrastructure outsourcing, managed services, cloud infrastructure, DRP/BCP, printer management, managed print services, application performance monitoring, managed FTP, and non-commodity servers (zSeries, mainframe, IBM i, AIX, Power PC).
Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.
Rob is the Founder and Chief Technology Strategist for Rivit Technology Partners. Rivit is a system integrator that delivers unique IT solutions. Rivit is known for its REVIVE migration strategy which helps companies leave legacy platforms (such as Domino) or move between versions of software. Rivit is the developer of the DCOM Application Archiving solution.
Cheshire, Nigel. “Domino v12 Launch Keeps HCL Product Strategy On Track.” Team Studio, 19 July 2021. Web.
“Is LowCode/NoCode the best platform for you?” Rivit Technology Partners, 15 July 2021. Web.
McCracken, Harry. “Lotus: Farewell to a Once-Great Tech Brand.” TIME, 20 Nov. 2012. Web.
Sharwood, Simon. “Lotus Notes refuses to die, again, as HCL debuts Domino 12.” The Register, 8 June 2021. Web.
Woodie, Alex. “Domino 12 Comes to IBM i.” IT Jungle, 16 Aug. 2021. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Set the right expectations with your stakeholders and define the context of your BizDevOps implementation.
Tailor the plays in your BizDevOps playbook to your circumstances and vision.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Discuss the goals of your BizDevOps playbook.
Identify the various perspectives who should be included in the BizDevOps discussion.
Level set expectations of your BizDevOps implementation.
Identification of the key roles who should be included in the BizDevOps discussion.
Learning of key practices to support your BizDevOps vision and goals.
Your vision of BizDevOps in your organization.
1.1 Define BizDevOps.
1.2 Understand your key stakeholders.
1.3 Define your objectives.
Your BizDevOps definition
List of BizDevOps stakeholders
BizDevOps vision and objectives
Understand the various methods to initiate the structuring of facilitated collaboration.
Share a common way of thinking and behaving with a set of principles.
Focus BizDevOps adoption on key areas of software product delivery.
A chosen collaboration method (Scrum, Kanban, Scrumban) to facilitate collaboration
A mutually understanding and beneficial set of guiding principles
Areas where BizDevOps will see the most benefit
2.1 Select your foundation method.
2.2 Define your guiding principles.
2.3 Focus on the areas that matter.
Chosen collaboration model
List of guiding principles
High-level assessment of delivery practices and its fit for BizDevOps
Review the good practices within Info-Tech’s BizDevOps Playbook.
Tailor your playbook to reflect your circumstances.
Understanding of the key plays involved in product delivery
Product delivery plays that reflect the challenges and opportunities of your organization and support your BizDevOps vision
3.1 Review and tailor the plays in your playbook
High-level discussion of key product delivery plays and its optimization to support BizDevOps
Every organization needs a data management (DM) platform that enables the DM capabilities required. This could be a daunting task because:
Understand your current environment and use proven reference architecture patterns to expedite building the data management platform that matches your needs.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess your current environment, find the right reference architecture pattern, and match identified capabilities with software features.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Gain an in-depth understanding of what digital asset management is as well as how it is supported by Info-Tech’s DAM framework.
Create a metadata program execution strategy and assess current and target states for the organization’s DAM.
Design a governance plan for ongoing DAM and metadata management.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Develop a foundation of knowledge regarding DAM and metadata, as well as the best practices for organizing the organization’s information and digital assets for ideal findability.
Design standardized processes for metadata creation and digital asset management to help to improve findability of key assets.
Gain knowledge of how DAM can benefit both IT and the business.
1.1 Build a DAM and metadata knowledge foundation.
1.2 Kick-start creation of the organization’s DAM design principles handbook.
1.3 Interview key business units to understand drivers for the program.
1.4 Develop a DAM framework.
DAM Design Principles Handbook
DAM Execution Strategy Document
Inventory the organization’s key digital assets and their repositories.
Gather the organization’s requirements for a full-time digital asset librarian, as well as the DAM system.
Determine clear and specific requirements for the organization from the DAM system and the people involved.
2.1 Conduct a digital asset inventory to identify key assets to include in DAM.
2.2 Prioritize digital assets to determine their risk and value to ensure appropriate support through the information lifecycle.
2.3 Determine the requirements of the business and IT for the DAM system and its metadata.
Digital Asset Inventory Tool
DAM Requirements Gathering Tool
Determine strategic initiatives and create a roadmap outlining key steps required to get the organization to start enabling data-driven insights.
Determine timing of the initiatives.
Establish a clear direction for the DAM program.
Build a step-by-step outline of how to create effective metadata with true business-IT collaboration.
Have prioritized initiatives with dependencies mapped out.
3.1 Assess current and target states of DAM in the organization.
3.2 Brainstorm and document practical initiatives to close the gap.
3.3 Discuss strategies rooted in business requirements to execute the metadata management program to improve findability of digital assets.
DAM Roadmap Tool
Identify the roles required for effective DAM and metadata management.
Create sample metadata according to established guiding principles and implement a feedback method to create intuitive metadata in the organization.
Metadata management is an ongoing project. Implementing it requires user input and feedback, which governance will help to support.
By integrating metadata governance with larger information or data governance bodies, DAM and metadata management will gain sustainability.
4.1 Discuss and assign roles and responsibilities for initiatives identified in the roadmap.
4.2 Review policy requirements for the information assets in the organization and strategies to address enforcement.
4.3 Integrate the governance of metadata into larger governance committees.
DAM Execution Strategy
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Begin your proactive audit management journey and leverage value from your software asset management program.
Prepare for an audit by effectively scoping and consolidating organizational response.
Execute the audit in a way that preserves valuable relationships while accounting for vendor specific criteria.
Conduct negotiations, settle on remuneration, and close out the audit.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Kick off the project
Identify challenges and red flags
Determine maturity and outline internal audit
Clarify stakeholder responsibilities
Build and structure audit team
Leverage value from your audit management program
Begin your proactive audit management journey
A documented consolidated licensing position, which ensures that you are not blindsided by a sudden audit request
1.1 Perform a maturity assessment of the current environment
1.2 Classify licensing contracts/vendors
1.3 Conduct a software inventory
1.4 Meter application usage
1.5 Manual checks
1.6 Gather software licensing data
1.7 Reconcile licenses
1.8 Create your audit team and assign accountability
Maturity assessment
Effective license position/license reconciliation
Audit team RACI chart
Create a strategy for audit response
Know the types of requests
Scope the engagement
Understand scheduling challenges
Know roles and responsibilities
Understand common audit pitfalls
Define audit goals
Take control of the situation and prepare a measured response
A dedicated team responsible for all audit-related activities
A formalized audit plan containing team responsibilities and audit conduct policies
2.1 Use Info-Tech’s readiness assessment template
2.2 Define the scope of the audit
Readiness assessment
Audit scoping email template
Overview of process conducted
Kick-off and self-assessment
Identify documentation requirements
Prepare required documentation
Data validation process
Provide resources to enable the auditor
Tailor audit management to vendor compliance position
Enforce best-practice audit behaviors
A successful audit with minimal impact on IT resources
Reduced severity of audit findings
3.1 Communicate audit commencement to staff
Audit launch email template
Clarify auditor findings and recommendations
Access severity of audit findings
Develop a plan for refuting unwarranted findings
Disclose findings to management
Analyze opportunities for remediation
Provide remediation options and present potential solutions
Ensure your audit was productive and beneficial
Improve your ability to manage audits
Come to a consensus on which findings truly necessitate organizational change
4.1 Don't accept the penalties; negotiate with vendors
4.2 Close the audit and assess the financial impact
A consensus on which findings truly necessitate organizational change
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Complete three unique assessments to define the ideal security architecture maturity for your organization.
Use the results of the assessments from Phase 1 of this research to create a roadmap for improving the security program.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Level-set the expectations for your business-managed applications.
Identify and define your application managers and owners and build a fit-for-purpose governance model.
Build a roadmap that illustrates the key initiatives to implement your BMA and governance models.
[infographic]
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define business-managed applications in your context.
Identify your business-managed application objectives.
State the value opportunities with business-managed applications.
A consensus definition and list of business-managed applications goals
Understanding of the business value business-managed applications can deliver
1.1 Define business-managed applications.
1.2 List your objectives and metrics.
1.3 State the value opportunities.
Grounded definition of a business-managed application
Goals and objectives of your business-managed applications
Business value opportunity with business-managed applications
Develop your application management framework.
Tailor your application delivery and ownership structure to fit business-managed applications.
Discuss the value of an applications committee.
Discuss technologies to enable business-managed applications.
Fit-for-purpose and repeatable application management selection framework
Enhanced application governance model
Applications committee design that meets your organization’s needs
Shortlist of solutions to enable business-managed applications
2.1 Develop your management framework.
2.2 Tune your delivery and ownership accountabilities.
2.3 Design your applications committee.
2.4 Uncover your solution needs.
Tailored application management selection framework
Roles definitions of application owners and managers
Applications committee design
List of business-managed application solution features and services
Build your roadmap to implement busines-managed applications and build the foundations of your optimized governance model.
Implementation initiatives
Adoption roadmap
3.1 Build your roadmap.
Business-managed application adoption roadmap
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the benefits of DataOps and why organizations are looking to establish agile principles in their data practice, the challenges associated with doing so, and what the new DataOps strategy needs to be successful.
Analyze DataOps using Info-Tech’s DataOps use case framework, to help you identify the gaps in your data practices that need to be matured to truly realize DataOps benefits including data integration, data security, data quality, data engineering, and data science.
Mature your data practice by putting in the right people in the right roles and establishing DataOps metrics, communication plan, DataOps best practices, and data principles.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the DataOps approach and value proposition.
A clear understanding of organization data priorities and metrics along with a simplified view of data using Info-Tech’s Onion framework.
1.1 Explain DataOps approach and value proposition.
1.2 Review the common business drivers and how the organization is driving a need for DataOps.
1.3 Understand Info-Tech’s DataOps Framework.
Organization's data priorities and metrics
Data Onion framework
Assess the DataOps maturity of the organization.
Define clear understanding of organization’s DataOps capabilities.
2.1 Assess current state.
2.2 Develop target state summary.
2.3 Define DataOps improvement initiatives.
Current state summary
Target state summary
Establish clear action items and roadmap.
Define clear and measurable roadmap to mature DataOps within the organization.
3.1 Continue DataOps improvement initiatives.
3.2 Document the improvement initiatives.
3.3 Develop a roadmap for DataOps practice.
DataOps initiatives roadmap
Define a plan for continuous improvements.
Continue to improve DataOps practice.
4.1 Create target cross-functional team structures.
4.2 Define DataOps metrics for continuous monitoring.
4.3 Create a communication plan.
DataOps cross-functional team structure
DataOps metrics
IT teams have:
Use Info-Tech’s phased approach to diagnose your team and use the IDEA model to drive team effectiveness.
The IDEA model includes four factors to identify team challenges and focus on areas for improvement: identity, decision making, exchanges within the team, and atmosphere of team psychological safety.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
The storyboard will walk you through three critical steps to assess, analyze, and build solutions to improve your team’s effectiveness.
Each stage has a deliverable that will support your journey on increasing effectiveness starting with how to communicate to the assessment which will accumulate into a team charter and action plan.
The Facilitation Guide contains instructions to facilitating several activities aligned to each area of the IDEA Model to target your approach directly to your team’s results.
The Action Plan Template captures next steps for the team on what they are committing to in order to build a more effective team.
A Team Charter captures the agreements your team makes with each other in terms of accepted behaviors and how they will communicate, make decisions, and create an environment that everyone feels safe contributing in.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine if proceeding is valuable.
Set context for team members.
1.1 Review the business context.
1.2 Identify IT team members to be included.
1.3 Determine goals and objectives.
1.4 Build execution plan and determine messaging.
1.5 Complete IDEA Model assessment.
Execution and communication plan
IDEA Model assessment distributed
Review results to identify areas of strength and opportunity.
As a team, discuss results and determine actions.
2.1 Debrief results with leadership team.
2.2 Share results with team.
2.3 Identify areas of focus.
2.4 Identify IDEA Model activities to support objectives and explore areas of focus.
IDEA assessment results
Selection of specific activities to be facilitated
Review results to identify areas of strength and opportunity.
build an action plan of solutions to incorporate into team norms.
3.1 Create team charter.
3.2 Determine action plan for improvement.
3.3 Determine metrics.
3.4 Determine frequency of check-ins.
Team Charter
Action Plan
IT often struggles to move from an effective to a high-performing team due to the very nature of their work. They work across multiple disciplines and with multiple stakeholders.
When operating across many disciplines it can become more difficult to identify the connections or points of interactions that define effective teams and separate them from being a working group or focus on their individual performance.
IT employees also work in close partnership with multiple teams outside their IT domain, which can create confusion as to what team are they a primary member of. The tendency is to advocate for or on behalf of the team they primarily work with instead of bringing the IT mindset and alignment to IT roadmap and goals to serve their stakeholders.

Amanda Mathieson
Research Director, People & Leadership Practice
Info-Tech Research Group
The Challenge
Organizations rely on team-based work arrangements to provide organizational benefits and better navigate the volatile, uncertain, complex, and ambiguous (VUCA) operating environment.
This is becoming more challenging in a hybrid environment as interactions now rely less on casual encounters and must become more intentional.
A high-performing team is more than productive. They are more resilient and able to recognize opportunities. They are proactive instead of reactive due to the trust and high level of communication and collaboration.
Common Obstacles
IT teams are more unique, which also provides unique challenges other teams don't experience:
Info-Tech's Approach
Use Info-Tech's phased approach to diagnose your team and use the IDEA model to drive team effectiveness.
The IDEA model includes four factors to identify team challenges and focus on areas for improvement: identity, decision making, exchanges within the team, and atmosphere of team psychological safety.
Info-Tech Insight
IT teams often fail to reach their full potential because teamwork presents unique challenges and complexities due to the work they do across the organization and within their own group. Silos, not working together, and not sharing knowledge are all statements that indicate a problem. As a leader it's difficult to determine what to do first to navigate the different desires and personalities on a team.
Traditionally, organizations have tried to fix ineffective teams by focusing on these four issues: composition, leadership competencies, individual-level performance, and organizational barriers. While these factors are important, our research has shown it is beneficial to focus on the four factors of effective teams addressed in this blueprint first. Then, if additional improvement is needed, shift your focus to the traditional issue areas.
48% |
of IT respondents rate their team as low maturity. Maturity is defined by the value they provide the business, ranging from firefighting to innovative partner. Source: Info-Tech Research Group, Tech Trends, 2022 |
|---|---|
20 Hours |
Data Silos: Teams waste more than 20 hours per month due to poor collaboration and communication. Source: Bloomfire, 2022 |
| How High-Performing Teams Respond: | |
|---|---|
Volatile: High degree of change happening at a rapid pace, making it difficult for organizations to respond effectively. |
Teams are more adaptable to change because they know how to take advantage of each others' diverse skills and experience. |
Uncertain: All possible outcomes are not known, and we cannot accurately assess the probability of outcomes that are known. |
Teams are better able to navigate uncertainty because they know how to work through complex challenges and feel trusted and empowered to change approach when needed. |
Complex: There are numerous risk factors, making it difficult to get a clear sense of what to do in any given situation. |
Teams can reduce complexity by working together to identify and plan to appropriately mitigate risk factors. |
Ambiguous: There is a lack of clarity with respect to the causes and consequences of events. |
Teams can reduce ambiguity through diverse situational knowledge, improving their ability to identify cause and effect. |
Poor Communication
To excel, teams must recognize and adapt to the unique communication styles and preferences of their members.
To find the "just right" amount of communication for your team, communication and collaboration expectations should be set upfront.
85% of tech workers don't feel comfortable speaking in meetings.
Source: Hypercontext, 2022
Decision Making
Decision making is a key component of team effectiveness. Teams are often responsible for decisions without having proper authority.
Establishing a team decision-making process becomes more complicated when appropriate decision-making processes vary according to the level of interdependency between team members and organizational culture.
20% of respondents say their organization excels at decision making.
Source: McKinsey, 2019
Resolving Conflicts
It is common for teams to avoid/ignore conflict – often out of fear. People fail to see how conflict can be healthy for teams if managed properly.
Leaders assume mature adults will resolve conflicts on their own. This is not always the case as people involved in conflicts can lack an objective perspective due to charged emotions.
56% of respondents prioritize restoring harmony in conflict and will push own needs aside.
Source: Niagara Institute, 2022
3.5x |
Having a shared team goal drives higher engagement. When individuals feel like part of a team working toward a shared goal, they are 3.5x more likely to be engaged. Source: McLean & Company, Employee Engagement Survey, IT respondents, 2023; N=5,427 |
|---|---|
90% |
Engaged employees are stronger performers with 90% reporting they regularly accomplish more than what is expected. Source: McLean & Company, Employee Engagement Survey, IT respondents, 2023; N=4,363 |
Effective and high-performing teams exchange information freely. They are clear on the purpose and goals of the organization, which enable empowerment.
Clear decision-making processes allow employees to focus on getting the work done versus navigating the system.
INDUSTRY: Technology
SOURCE: reWork
Google wanted to clearly define what makes a team effective to drive a consistent meaning among its employees. The challenge was to determine more than quantitative measures, because more is not always better as it can just mean more mistakes to fix, and include the qualitative factors that bring some groups of people together better than others.
There was no pattern in the data it studied so Google stepped back and defined what a team is before embarking on defining effectiveness. There is a clear difference between a work group (a collection of people with little interdependence) and a team that is highly interdependent and relies on each other to share problems and learn from one another. Defining the different meanings took time and Google found that different levels of the organization were defining effectiveness differently.
Google ended up with clear definitions that were co-created by all employees, which helped drive the meaning behind the behaviors. More importantly it was also able to define factors that had no bearing on effectiveness; one of which is very relevant in today's hybrid world – colocation.
It was discovered that teams need to trust, have clarity around goals, have structure, and know the impact their work has.
Teams often lack the skills or knowledge to increase effectiveness and performance.
It's unrealistic to expect struggling teams to improve without outside help; if they were able to, they would have already done so.
To improve, teams require:
BUT these are the very things they are lacking when they're struggling.

Begin by assessing, recognizing, and addressing challenges in:
Effective Team
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| Phase 1: Assess the team | Phase 2: Review results and action plan | Phase 3: Document and measure |
|---|---|---|
Call #1: Scope requirements, objectives, and your specific challenges. |
Call #3: Review the assessment results and plan next steps. |
Call #6: Build out your team agreement. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 6 to 12 calls over the course of 4 to 6 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Day 1 |
Day 2 |
Day 3 |
Day 4 |
|
|---|---|---|---|---|
Determine objectives and assess |
Review survey results |
Determine and conduct activities to increase effectiveness |
Bridge the gap and |
|
Activities |
With Leader – 1 hour |
2.1 Debrief results with leadership team. |
3.1 Conduct IDEA Model Activities:
3.2 Record outcomes and actions. |
4.1 Create team charter or agreement. |
Deliverables |
|
|
|
|
Phase 1 |
Phase 2 |
Phase 3 |
|---|---|---|
1.1 Identify team members |
1.1 Review results with team |
1.1 Document outcomes and actions |
Begin by assessing, recognizing, and addressing challenges in:
Effective Team
In addition to having a clear understanding of the team's goals and objectives, team members must also:
Clear goals enable employees to link their contributions to overall success of the team. Those who feel their contributions are important to the success of the department are two times more likely to feel they are part of a team working toward a shared goal compared to those who don't (McLean & Company, Employee Engagement Survey, IT respondents, 2023; N=4,551).
The goals and objectives of the team are the underlying reason for forming the team in the first place. Without a clear and agreed-upon goal, it is difficult for teams to understand the purpose of their work.
Clear goals support creating clear roles and the contributions required for team success.

Decision making adds to the complexity of teamwork.
Individual team members hold different information and opinions that need to be shared to make good decisions.
Ambiguous decision-making processes can result in team members being unable to continue their work until they get clear direction.
The most appropriate decision-making process depends on the type of team:
Spectrum of Decision Making |
||
|---|---|---|
General consensus between all team members. |
A single, final decision maker within the team. |
|
Ensure team members understand how decisions are made within the team. Ask:
Evaluate exchanges within your team using two categories:
These categories are related, but there is not always overlap. While some conflicts involve failures to successfully exchange information, conflict can also occur even when everyone is communicating successfully.
Communication |
Managing Conflict |
||
|---|---|---|---|
Information, motivations, emotions |
Accepting and expressing diverse perspectives |
Resolving conflict (unified action through diverse perspectives) |
|
Transmission |
Reception |
||
Success is defined in terms of how well information, motivations, and emotions are transmitted and received as intended. |
Success is defined in terms of how well the team can move to united action through differences of opinion. Effective teams recognize that conflict can be healthy if managed effectively. |
||
When selecting a method of communication (for example, in-person versus email), consider how that method will impact the exchange of all three aspects – not just information.
Downplaying the importance of emotional and motivational exchanges and focusing solely on information is very risky since emotional and motivational exchanges can impact human relationships and team psychological safety.
Communication affects the whole team
Effects are not limited to the team members communicating directly:
Remember to watch the reactions and behavior of participants and observers when assessing how the team behaves.
Identify how conflict management is embedded into team practices.
Successfully communicating information, emotions, and motivations is not the same as managing conflict.
Teams that are communicating well are more likely to uncover conflicting perspectives and opinions than teams that are not.
Conflict is healthy and can be an important element of team success if it is managed.
The team should have processes in place to resolve conflicts and move to united action.
A team atmosphere that exists when all members feel confident that team members can do the following without suffering negative interpersonal consequences such as blame, shame, or exclusion:
(Administrative Science Quarterly, 1999;
The New York Times, 2016)
What psychologically safe teams look like:
(Administrative Science Quarterly, 1999;
The New York Times, 2016)
What "team psychological safety" is not:
"Psychological safety refers to an individual's perception of the consequences of taking an interpersonal risk or a belief that a team is safe for risk taking in the face of being seen as ignorant, incompetent, negative, or disruptive… They feel confident that no one on the team will embarrass or punish anyone else for admitting a mistake, asking a question, or offering a new idea."
– re:Work
The impact of psychological safety on team effectiveness
Why does an atmosphere of team psychological safety matter?
Creating psychological safety in a hybrid environment requires a deliberate approach to creating team connectedness.
In the Info-Tech State of Hybrid Work in IT report autonomy and team connectedness present an interesting challenge in that higher levels of autonomy drove higher perceptions of lack of connectedness to the respondent's team. In a hybrid world, this means leaders need to be intentional in creating a safe team dynamic.
47% of employees who experienced more control over their decisions related to where, when, and how they work than before the pandemic are feeling less connected to their teams.
Source: Info-Tech, State of Hybrid Work in IT, 2022
Input
Output
Materials
Participants
Download the IT Team Effectiveness Survey
Download the IT Team Effectiveness Survey Results Tool
Paper-Based Cautions & Considerations
Online Direct Cautions & Considerations
Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
1.1 Identify team members | 1.1 Review results with team | 1.1 Document outcomes and actions |
This phase will walk you through the following activities:
This phase involves the following participants:
Deliverables:
Reviewing assessment results and creating an improvement action plan is best accomplished through a team meeting.
Analyzing and preparing for the team meeting may be done by:
Prioritize one to two factors for improvement by selecting those with:

The flatter the bars are across the top, the more agreement there was. Factors that show significant differences in opinion should be discussed to diagnose what is causing the misalignment within your team.
The alignment chart below shows varied responses; however, there are two distinct patterns. This will be an important area to review.
Things to think about:


Facilitation Factors
Select a third-party facilitator if:
Agenda
Materials
Participants
Work with the team to brainstorm and agree on an action plan of continuous improvements.
By creating an action plan together with the team, there is greater buy-in and commitment to the activities identified within the action plan.
Don't forget to include timelines and task owners in the action plan – it isn't complete without them.
Document final decisions in Info-Tech's Improve IT Team Effectiveness Action Plan Tool.
Review activity Develop Team Charter in the Improve IT Team Effectiveness Facilitation Guide and conclude the team meeting by creating a team charter. With a team charter, teams can better understand:
Facilitation Factors
Encourage and support participation from everyone.
Be sure no one on the team dismisses anyone's thoughts or opinions – they present the opportunity for further discussion and deeper insight.
Watch out for anything said or done during the activities that should be discussed in the activity debrief.
Debrief after each activity, outlining any lessons learned, action items, and next steps.
Agenda
Materials
Participants
Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
1.1 Identify team members | 1.1 Review results with team | 1.1 Document outcomes and actions |
This phase will walk you through the following activities:
Building your team charter that will include:
This phase involves the following participants:
As a team it will be important to drive your brainstormed solutions into an output that is co-created.
Set clear expectations for the team's interactions and behaviors.
One contributor to the report shared the effort and intention around maintaining their culture during the pandemic. The team agreement created became a critical tool to enable conversations between leaders and their team – it was not a policy document.
Team effectiveness is driven through thoughtful planned conversations. And it's a continued conversation.

Download the IT Team Charter Template
Baseline metrics will be improved through:
Identify the impact that improved team effectiveness will have on the organization.
Determine your baseline metrics to assess the success of your team interventions and demonstrate the impact to the rest of the organization using pre-determined goals and metrics.
Share success stories through:
Sample effectiveness improvement goal |
Sample Metric |
|---|---|
Increase employee engagement |
|
Strengthen manager/employee relationships |
|
Reduce employee turnover (i.e. increase retention) |
|
Increase organizational productivity |
|
Track the team's progress by reassessing their effectiveness six to twelve months after the initial assessment.
Identify if:
As the team matures, priorities and areas of concern may shift; it is important to regularly reassess team effectiveness to ensure ongoing alignment and suitability.
Note: It is not always necessary to conduct a full formal assessment; once teams become more effective and self-sufficient, informal check-ins by team leads will be sufficient.
If you assess team effectiveness for multiple teams, you have the opportunity to identify trends:
Identifying these trends, initiatives, training, or tactics may be used to improve team effectiveness across the department – or even the organization.
As teams mature, the team lead should become less involved in action planning. However, enabling truly effective teams takes significant time and resources from the team lead.
Use the action plan created and agreed upon during the team meeting to hold teams accountable:
The team coach should have a plan to transition into a supportive role by:
The four factors outlined in the IDEA Model of team effectiveness are very important, but they are not the only things that have a positive or negative impact on teams. If attempts to improve the four factors have not resulted in the desired level of team effectiveness, evaluate other barriers:
For organizational culture, ask if performance and reward programs do the following:
For learning and development, ask:
If an individual team member's or leader's performance is not meeting expectations, potential remedies include a performance improvement plan, reassignment, and termination of employment.
These kinds of interventions are beyond the control of the team itself. In these cases, we recommend you consult with your HR department; HR professionals can be important advocates because they possess the knowledge, influence, and authority in the company to promote changes that support teamwork.
Redesign Your IT Department
Build an IT Employee Engagement Program

Carlene McCubbin
Practice Lead
Info-Tech Research Group

Nick Kozlo
Senior Research Analyst
Info-Tech Research Group

Heather Leier-Murray
Senior Research Analyst
Info-Tech Research Group

Stephen O'Conner
Executive Counselor
Info-Tech Research Group

Jane Kouptsova
Research Director
Info-Tech Research Group

Dr. Julie D. Judd, Ed.D.
Chief Technology Officer
Ventura County Office of Education
Aminov, I., A. DeSmet, and G. Jost. "Decision making in the age of urgency." McKinsey. April 2019. Accessed January 2023.
Duhigg, Charles. "What Google Learned From Its Quest to Build the Perfect Team." The New York Times, 25 Feb. 2016. Accessed January 2023.
Edmondson, Amy. "Psychological Safety and Learning Behavior in Work Teams." Administrative Science Quarterly, vol. 44, no. 2, June 1999, pp. 350-383.
Gardner, Kate. "Julie Judd – Ventura County Office of Education." Toggle, 12 Sept. 2022. Accessed January 2023.
Google People Operations. "Guide: Understand Team Effectiveness." reWork, n.d. Accessed February 2023.
Harkins, Phil. "10 Leadership Techniques for Building High-Performing Teams." Linkage Inc., 2014. Accessed 10 April 2017.
Heath, C. and D. Heath. Decision: How to make better choices in life and work. Random House, 2013, ISBN 9780307361141.
Hill, Jon. "What is an Information Silo and How Can You Avoid It." Bloomfire, 23 March 2022. Accessed January 2023.
"IT Team Management Software for Enhanced Productivity." Freshworks, n.d. Accessed January 2023.
Jackson, Brian. "2022 Tech Trends." Info-Tech Research Group, 2022. Accessed December 2022.
Kahneman, Daniel. Thinking fast and slow. Farrar, Straus and Giroux. 2011.
Kouptsova, J., and A. Mathieson. "State of Hybrid Work in IT." Info-Tech Research Group, 2023. Accessed January 2023.
Mayfield, Clifton, et al. "Psychological Collectivism and Team Effectiveness: Moderating Effects of Trust and Psychological Safety." Journal of Organizational Culture, Communications and Conflict, vol. 20, no. 1, Jan. 2016, pp. 78-94.
Rock, David. "SCARF: A Brain-Based Model for Collaborating With and Influencing Others." NeuroLeadership Journal, 2008. Web.
"The State of High Performing Teams in Tech Hypercontext." Hypercontext. 2022. Accessed November 2022.
Weick, Carl, and Kathleen Sutcliff. Managing the unexpected. John Wiley & Sons, 2007.
"Workplace Conflict Statistics: How we approach conflict at work." The Niagara Institute, August 2022. Accessed December 2022.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Define the business’s M&A goals, assemble an IT Integration Program, and select an IT integration posture that aligns with business M&A strategy.
Refine the current state of each IT domain in both organizations, and then design the end-state of each domain.
Generate tactical operational imperatives and quick-wins, and then develop an interim action plan to maintain business function and capture synergies.
Generate initiatives and put together a long-term action plan to achieve the planned technology end-state.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identification of staffing and skill set needed to manage the IT integration.
Generation of an integration communication plan to highlight communication schedule during major integration events.
Identification of business goals and objectives to select an IT Integration Posture that aligns with business strategy.
Defined IT integration roles & responsibilities.
Structured communication plan for key IT integration milestones.
Creation of the IT Integration Program.
Generation of an IT Integration Posture.
1.1 Define IT Integration Program responsibilities.
1.2 Build an integration communication plan.
1.3 Host interviews with senior management.
1.4 Select a technology end-state and IT integration posture.
Define IT Integration Program responsibilities and goals
Structured communication plan
Customized interview guide for each major stakeholder
Selected technology end-state and IT integration posture
Identification of information sources to begin conducting discovery.
Definition of scope of information that must be collected about target organization.
Definition of scope of information that must be collected about your own organization.
Refinement of the technology end-state for each IT domain of the new entity.
A collection of necessary information to design the technology end-state of each IT domain.
Adequate information to make accurate cost estimates.
A designed end-state for each IT domain.
A collection of necessary, available information to make accurate cost estimates.
2.1 Define discovery scope.
2.2 Review the data room and conduct onsite discovery.
2.3 Design the technology end-state for each IT domain.
2.4 Select the integration strategy for each IT domain.
Tone set for discovery
Key information collected for each IT domain
Refined end-state for each IT domain
Refined integration strategy for each IT domain
Generation of tactical initiatives that are operationally imperative and will help build business credibility.
Prioritization and execution of tactical initiatives.
Confirmation of integration strategy for each IT domain and generation of initiatives to achieve technology end-states.
Prioritization and execution of integration roadmap.
Tactical initiatives generated and executed.
Confirmed integration posture for each IT domain.
Initiatives generated and executed upon to achieve the technology end-state of each IT domain.
3.1 Build quick-win and operational imperatives.
3.2 Build a tactical action plan and execute.
3.3 Build initiatives to close gaps and redundancies.
3.4 Finalize your roadmap and kick-start integration.
Tactical roadmap to fulfill short-term M&A objectives and synergies
Confirmed IT integration strategies
Finalized integration roadmap
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create a streamlined documentation process that also considers the elements of people and technology.
Track your planned budget against actual expenditures to catch areas of over- and underspending in a timely manner.
Leverage control mechanisms to manage variances in your budget.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
The first step of managing your IT budget is to make sure there is a properly documented budget that everyone agrees upon.
A properly documented budget facilitates management and communication of the budget.
1.1 Review budget for the year.
1.2 Document each budget in the tool.
1.3 Review CAPEX vs. OPEX.
1.4 Customize accounts to match your organization.
Budget broken out into monthly increments and by each account.
Budget documented in tool.
Tool customized to reflect organization's specific accounts and terminology.
A proper documentation process forms the backbone for effective budget management.
A streamlined documentation process with accurate inputs that also considers the elements of people and technology.
2.1 Draw out process flow of current documentation.
2.2 Identify bottlenecks.
2.3 Discuss and develop roadmap to solving bottlenecks.
Process flow of current documentation process with identified bottlenecks.
Plan to mitigate bottlenecks.
Track your planned budget against actual expenditures to catch areas of over- and underspending in a timely manner. Then, leverage control mechanisms to manage variances in your budget.
Tracking and controlling for variances will help the IT department stay on track towards its budget goals. It will also help with communicating IT’s value to the business.
3.1 Walk through the “Overview Bar.”
3.2 Document actual expenses incurred in fiscal to date.
3.3 Review the risk of over- and underspending.
3.4 Use the reforecast column to control for over- and underspend.
Assess the “Overview Bar.”
Document actual expenditures and committed expenses up to the current date.
Develop a strategy and roadmap for how you will mitigate any current under- or overspends.
Reforecast expenditures for each account for each month for the remainder of the fiscal year.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.
Use this tool to document and analyze turnover data to find suitable retention solutions.
The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.
Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify the main drivers of turnover at the organization.
Find out what to explore during focus groups.
1.1 Review data to determine why employees join, stay, and leave.
1.2 Identify common themes.
1.3 Prepare for focus groups.
List of common themes/pain points recorded in the Retention Plan Workbook.
Conduct focus groups to explore retention drivers.
Explore identified themes.
2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.
2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.
Focus group feedback.
Focus group feedback analyzed and organized by themes.
Home in on employee needs that are a priority.
A list of initiatives to address the identified needs
3.1 Create an empathy map to identify needs.
3.2 Shortlist retention initiatives.
Employee needs and shortlist of initiatives to address them.
Prepare to launch your retention initiatives.
A clear action plan for implementing your retention initiatives.
4.1 Select retention initiatives.
4.2 Determine goals and metrics.
4.3 Plan stakeholder communication.
4.4 Build a high-level action plan.
Finalized list of retention initiatives.
Goals and associated metrics recorded in the Retention Plan Workbook.
Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.
Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.
Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
Target employee segments and work with management to develop solutions to retain top talent.
Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.
The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).
65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.
Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.
Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).
Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.
Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.
Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).
Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

.png)
However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.
This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.
This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.
Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:
Engagement drivers are strong predictors of turnover.
Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).
Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.
Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).
Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.
Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).
Research shows managers do not appear as one of the common reasons for employee turnover.
Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).
| Turnover factors | Rank |
|---|---|
| Opportunities for career advancement | 1 |
| Satisfaction with my role and responsibilities | 2 |
| Base pay | 3 |
| Opportunities for career-related skill development | 4 |
| The degree to which my skills were used in my job | 5 |
However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:
Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).
Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.
Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.
Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.
After completing this step you will have:
| Employee engagement | Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups. |
|---|---|
| Engagement drivers such as compensation or working environment are strong predictors of turnover. | |
| Moments that matter | |
| Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization. | |
| Turnover triggers | |
| Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure. | |
Turnover triggers | This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention. |
Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure. |
IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.
Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.
Look for these icons throughout step 2. |
| Why do candidates join your organization? |
|---|---|---|
![]() | Why do employees stay with your organization? | |
![]() | Why do employees leave your organization? |
For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.
The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:
Issues or pain points that occurred during the hiring process.
Reasons why employees joined your organization.
The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.
Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.
Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.
If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.
Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:
If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.
Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.
A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.
Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.
If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.
Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).
Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.
Identify employee groups who will participate in focus groups:

Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.
The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.
Focus questions on the employees' personal experience from their perspective.
Key things to remember:
Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.
Look for discrepancies between what employees are saying and doing. | 1. Say "What words or quotes did the employee use?" | 3.Think "What might the employee be thinking?" | Record feelings and thoughts discussed, body language observed, tone of voice, and words used. Look for areas of negative emotion to determine the moments that matter that drive retention. |
2. Do "What actions or behavior did the employee demonstrate?" | 4. Feel "What might the employee be feeling?" | ||
Record them in tab 3 of the Retention Plan Workbook. | 5. Identify Needs | "Needs are verbs (activities or desires), not nouns (solutions)" | Synthesize focus group findings using Info-Tech's Empathy Map Template. |
|---|---|---|---|
6. Identify Insights | "Ask yourself, why?" |
(Based on Stanford d.school Empathy Map Method)
Take employee needs revealed by your data and focus groups and prioritize three to five needs.
Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.
Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.
Ask yourself the following questions to determine your priority employee needs:

After completing this step, you will have:
First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.
Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.
Finally, create an action plan and present to senior leadership for approval.
Look for these icons in the top right of slides in this step.
Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.
Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.
Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.
Target efforts accordingly
Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.
Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.
Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.
Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.
When assessing the impact of potential solutions, consider:
It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.
| Low Impact | Medium Impact | Large Impact | |
|---|---|---|---|
| Large Effort | ![]() | ||
| Medium Effort | |||
| Low Effort |
Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.
Leaders at all levels have a huge impact on employees.
Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.
For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.
For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.
"HR can't fix turnover. But leaders on the front line can."
– Richard P. Finnegan, CEO, C-Suite Analytics
Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.
Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.
Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM
For each initiative identified, map out timelines and actions that need to be taken.
Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.
| Insight 1 | Insight 2 | Insight 3 |
|---|---|---|
Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover. | Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers. | Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization. |
| Insight 4 | Insight 5 | Insight 6 |
HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around. | Successful retention plans must be owned by both IT leaders and HR. | IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers. Stay interviews help managers anticipate potential retention issues on their teams. |
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Info-Tech Analysts | Pre-work | Post-work |
|---|---|---|
| Client Data Gathering and Planning | Implementation Supported Through Analyst Calls | |
1.1 Discuss participants, logistics, overview of workshop activities 1.2 Provide support to client for below activities through calls. | 2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs. | |
| Client | 1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback. 2.Gather and analyze turnover data. 3.Identify key employee segment(s) and identify and organize participants for focus groups. 4.Complete cost of turnover analysis. 5.Review turnover data and prioritize list of employee segments. | 1.Obtain senior leader approval to proceed with retention plan. 2.Finalize and implement retention solutions. 3.Prepare managers to conduct stay interviews. 4.Communicate next steps to stakeholders. |
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Activities | Day 1 | Day 2 | Day 3 | Day 4 |
|---|---|---|---|---|
| Assess Current State | Conduct Focus Groups | Identify Needs and Retention Initiatives | Prepare to Communicate and Launch | |
1.1 Review data to determine why employees join, stay, and leave. 1.2 Identify common themes. 1.3 Prepare for focus groups. | 2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.. 2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme. | 3.1 Create an empathy map to identify needs 3.2 Shortlist retention initiatives | 4.1 Select retention initiatives 4.2 Determine goals and metrics 4.3 Plan stakeholder communication4.4 Build a high-level action plan | |
| Deliverables | 1.List of common themes/pain points recorded in the Retention Plan Workbook 2.Plan for focus groups documented in the Focus Group Guide | 1.Focus group feedback 2.Focus group feedback analyzed and organized by themes | 1.Employee needs and shortlist of initiatives to address them | 1.Finalized list of retention initiatives |
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Jeff Bonnell
VP HR
Info-Tech Research Group
Phillip Kotanidis
CHRO
Michael Garron Hospital
Michael McGuire
Director, Organizational Development
William Osler Health System
Dr. Iris Ware
Chief Learning Officer
City of Detroit
Richard P. Finnegan
CEO
C-Suite Analytics
Dr. Thomas Lee
Professor of Management
University of Washington
Jane Moughon
Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies
Lisa Kaste
Former HR Director
Citco
Piyush Mathur
Head of Workforce Analytics
Johnson & Johnson
Gregory P. Smith
CEO
Chart Your Course
"17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
"2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
"2020 Recruiter Nation Survey." Jobvite, 2020. Web.
"2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
"25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
"Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
"Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
"Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
"The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
"What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create a clear project vision that outlines the goals and objectives for the HRIS strategy. Subsequently, construct an HRIS business model that is informed by enablers, barriers, and the organizational, IT, and HR needs.
Gather high-level requirements to determine the ideal future state. Explore solution alternatives and choose the path that is best aligned with the organization's needs.
Identify roadmap initiatives. Prioritize initiatives based on importance and effort.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the importance of creating an HRIS strategy before proceeding with software selection and implementation.
Learn why a large percentage of HRIS projects fail and how to avoid common mistakes.
Set expectations for the HRIS strategy and understand Info-Tech’s HRIS methodology.
Complete a project charter to gain buy-in, build a project team, and track project success.
A go/no-go decision on the project appropriateness.
Project stakeholders identified.
Project team created with defined roles and responsibilities.
Finalized project charter to gain buy-in.
1.1 Set a direction for the project by clarifying the focus.
1.2 Identify the right stakeholders for your project team.
1.3 Identify HRIS needs, barriers, and enablers.
1.4 Map the current state of your HRIS.
1.5 Align your business goals with your HR goals and objectives.
Project vision
Defined project roles and responsibilities
Completed HRIS business model
Completed current state map and thorough understanding of the HR technology landscape
Strategy alignment between HR and the business
Gain a thorough understanding of the HRIS-related pains felt throughout the organization.
Use stakeholder-identified pains to directly inform the HRIS strategy and long-term solution.
Visualize your ideal processes and realize the art of the possible.
Requirements to strengthen the business case and inform the strategy.
The art of the possible.
2.1 Requirements gathering.
2.2 Sketch ideal future state processes.
2.3 Establish process owners.
2.4 Determine guiding principles.
2.5 Identify metrics.
Pain points classified by data, people, process, and technology
Ideal future process vision
Assigned process owners, guiding principles, and metrics for each HR process in scope
Brainstorm and prioritize short- and long-term HRIS tasks.
Understand next steps for the HRIS project.
3.1 Create a high-level implementation plan that shows dependencies.
3.2 Identify risks and mitigation efforts.
3.3 Finalize stakeholder presentation.
Completed implementation plan
Completed risk management plan
HRIS stakeholder presentation
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Learn about RPA, including how it compares to IT-led automation rooted in business process management practices and the role of AI.
Identify and prioritize candidate processes for RPA.
Price IT services so that business consumers find them meaningful, measurable, and manageable:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Make the case for IT chargeback, then assess the financial maturity of the organization and identify a pathway to success. Create a chargeback governance model.
Develop a chargeback model, including identifying user-facing IT services, allocating IT costs to services, and setting up the chargeback program.
Communicate the rollout of the IT chargeback model and establish a process for recovering IT services costs from business units.
Gather and analyze feedback from business owners, making necessary modifications to the chargeback model and communicating the implications.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Make the case for IT chargeback.
Identify the current and target state of chargeback maturity.
Establish a chargeback governance model.
Investigated the benefits and challenges of implementing IT chargeback.
Understanding of the reasons why traditional chargeback approaches fail.
Identified the specific pathway to chargeback success.
1.1 Investigate the benefits and challenges of implementing IT chargeback
1.2 Educate business owners and executives on IT chargeback
1.3 Identify the current and target state of chargeback maturity
1.4 Establish chargeback governance
Defined IT chargeback mandate
IT chargeback kick-off presentation
Chargeback maturity assessment
IT chargeback governance model
Develop a chargeback model.
Identify the customers and user-facing services.
Allocate IT costs.
Determine chargeable service units.
Identified IT customers.
Identified user-facing services and generated descriptions for them.
Allocated IT costs to IT services.
Identified meaningful, measurable, and manageable chargeback service units.
2.1 Identify user-facing services and generate descriptions
2.2 Allocate costs to user-facing services
2.3 Determine chargeable service units and pricing
2.4 Track consumption
2.5 Determine service charges
High-level service catalog
Chargeback model
Communicate the implementation of IT chargeback.
Establish a process for recovering the costs of IT services from business units.
Share the financial results of the charge cycle with business owners.
Managed the transition to charging and recovering the costs of IT services from business units.
Communicated the implementation of IT chargeback and shared the financial results with business owners.
3.1 Create a communication plan
3.2 Deliver a chargeback rollout presentation
3.3 Establish a process for recovering IT costs from business units
3.4 Share the financial results from the charge cycle with business owners
IT chargeback communication plan
IT chargeback rollout presentation
IT service cost recovery process
IT chargeback financial presentation
Gather and analyze feedback from business owners on the chargeback model.
Make necessary modifications to the chargeback model and communicate implications.
Gathered business stakeholder feedback on the chargeback model.
Made necessary modifications to the chargeback model to increase satisfaction and accuracy.
Managed changes by communicating the implications to business owners in a structured manner.
4.1 Address stakeholder pain points and highly disputed costs
4.2 Update the chargeback model
4.3 Communicate the chargeback model changes and implications to business units
Revised chargeback model with business feedback, change log, and modifications
Chargeback change communication
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use Info-Tech’s SOW review guidance to find common pitfalls and gotchas, to maximize the protections for your organization, and to hold vendors accountable.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Gain a better understanding of common SOW clauses and phrases.
Reduce risk
Increase vendor accountability
Improve negotiation positions
1.1 Review sample SOW provisions, identify the risks, and develop a negotiation position.
1.2 Review Info-Tech tools.
Awareness and increased knowledge
Familiarity with the Info-Tech tools
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Follow the seven steps outlined in this blueprint to design a VIP support model that best suits your organization, then communicate and evaluate the service to ensure it delivers results.
This template is designed to assist with documenting your service desk procedures for handling VIP or executive tickets. It can be adapted and customized to reflect your specific support model and procedures.
This Visio template provides an example of a VIP support process, with every step involved in resolving or fulfilling VIP service desk tickets. Use this as an example to follow and a template to document your own process.
This template can be customized to use as an executive presentation to communicate and market the service to VIP users and ensure everyone is on the same page.
Research Director,
Infrastructure & Operations
Info-Tech Research Group
In a perfect world, executives wouldn’t need any special treatment because the service desk could rapidly resolve every ticket, regardless of the submitter, keeping satisfaction levels high across the board.
But we know that’s not the case for most organizations. Executives and VIPs demand higher levels of service because the reality in most companies is that their time is worth more. And any IT leader who’s had a VIP complain about their service knows that their voice also carries more weight than that of a regular dissatisfied user.
That said, most service desks feel strapped for resources and don’t know how to improve service for VIPs without sacrificing service to the rest of the organization.
The key is to stop being reactive to VIP demands and formalize your VIP service procedures so that you can properly set expectations for the service, monitor and measure it, and continually evaluate it to make changes if necessary.
A VIP offering doesn’t have to mean a white glove concierge service, either – it could simply mean prioritizing VIP tickets differently. How do you decide which level of service to offer? Start by assessing your specific needs based on demand, gather requirements from relevant stakeholders, choose the right approach to fit your business needs and capabilities, clearly define and document all aspects of the service then communicate it so that everyone is on the same page as to what is in and out of scope, and continually monitor and evaluate the service to make changes and improvements as needed.
Your Challenge
|
Common Obstacles
|
Info-Tech's Approach
|
The reality for most organizations is that VIPs need special treatment. But providing VIP service shouldn’t come at the expense of good service delivery for the rest of the organization. To be successful with your approach, formalize the VIP offering to bring consistency and clear expectations for both users and the IT staff delivering the service.
Providing VIP support helped this company grow |
Allocating a dedicated VIP technician slowed down service delivery for this company |
|
Situation |
A SaaS company looking to build and scale its services and customers decided to set up a VIP support program, which involved giving their most valuable customers white glove treatment to ensure they had a great experience, became long-term customers, and thus had a positive influence on others to build up the company’s customer base. | VIPs were receiving executive-level support with a dedicated person for VIP tickets. The VIPs were happy with the service, but the VIP technician’s regular work was frequently impeded by having to spend most of her time doing white glove activities. The service desk found that in some cases, more critical work was slipping as a result of prioritizing all executive tickets. |
Resolution |
First, they defined who would receive VIP support, then they clearly defined the service, including what VIP support
includes, who gets the service, and what their SLAs for service are. They found that the program was an effective way to
focus their limited resources on the customers with the highest value potential to increase sales. While this model differs from an IT service desk VIP support program, the principles of dedicating resources to provide elevated support to your most important and influential customers for the benefit and growth of the company as a whole remain the same. |
The service desk decided to remove the VIP function. They demonstrated that the cost per contact was too high for dedicated executive support, and reallocating that dedicated technician to the service desk would improve the resolution time of all business incidents and requests. VIPs could still receive prioritized support through the escalation process, but they would contact the regular service desk with their issues. VIPs approved the change, and as a result of removing the dedicated support function, the service desk reduced average incident resolution times by 28% and request fulfillment times by 33%. |
Service Desk VIP Procedures TemplateUse this template to assist with documenting your service desk procedures for handling VIP or executive tickets. |
VIP Support Process Workflow ExampleUse this Visio template to document your process for resolving or fulfilling VIP tickets, from when the ticket is submitted to when it’s closed. |
VIP Support Service Communication TemplateUse this template to customize your executive presentation to communicate and market the service to VIP users. |
The reality for most organizations is that VIPs need special treatment. But providing VIP service shouldn’t be at the expense of good service delivery for the rest of the organization. To be successful with your approach, formalize the VIP offering to bring consistency and clear expectations for both users and the IT staff delivering the service.
Insight 1 |
VIP service doesn’t have to mean concierge service. There are different levels and models of VIP support that range in cost and level of service provided. Carefully evaluate your needs and capacity to choose the approach that works best for your organization. |
Insight 2 |
This service is for your most valued users, so design it right from the start to ensure their satisfaction. Involve stakeholders from the beginning, incorporate their feedback and requirements, keep them well-informed about the service, and continually collect and act on feedback to deliver the intended value. |
Insight 3 |
Intentional, continual monitoring and measurement of the program must be part of your strategy. If your metrics or feedback show that something isn’t working, fix it. If you find that the perceived value isn’t worth the high cost of the program, make changes. Even if everything seems to be working fine, identify ways to improve it or make it more efficient. |
Step overview:
VIP support from the service desk usually refers to an elevated level of service (i.e. faster, after-hours, off-site, and/or with more experienced resources) that is provided to those at the executive level of the organization.
A VIP typically includes executives across the business (e.g. CIO, CEO, CxO, VPs) and sometimes the executive assistants who work directly with them. However, it can also include non-executive-level but critical business roles in some organizations.
The level of VIP service provided can differ from receiving prioritization in the queue to having a dedicated, full-time technician providing “white glove” service.
You don’t have to use the term “VIP”, as long as you clearly define the terms you are using. Some organizations use the term “VIR” to refer to very important roles rather than people, and some define “critical users” to reflect who should receive prioritized service, for example.
VIP tickets are prioritized in the same way as every other ticket – with an assessment by impact and urgency. This allows every ticket to be prioritized appropriately according to how big the impact of the issue is and how quickly it needs to be resolved – regardless of who the submitter is. This means that VIPs with very urgent issues will still receive immediate support, as would a non-VIP user with a critical issue.
Don’t design a VIP service solely out of fear that VIPs will be unhappy with the standard level of support the service desk provides. In some cases, it is better to focus your efforts on improving your standard support for everyone rather than only for a small percentage of users, especially if providing that elevated VIP support would further deteriorate service levels for the rest of the organization.
If you’re already informally bumping VIP tickets up the queue, this may be the most appropriate model for you. Bring formalization to your process by clearly defining exactly where VIP tickets fit in your prioritization matrix to ensure they are handled consistently and that VIPs are aware of the process.
This type of model is essential in many large enterprises where the success of the company can depend on VIPs having access to dedicated support to minimize downtime as much as possible. However, it also requires the highest level of planning and dedication to get right. Without carefully documented processes and procedures and highly trained staff to support the model, it will fail to deliver the expected benefits.
Step overview:
Analyze your ticket data and reports to understand how well you’re currently meeting SLAs, your average response and resolution times, and the volume and type of requests you get from VIPs in order to understand the need for changing your current model. If you don’t have the ticket data to inform your assessment, leverage Info-Tech’s Service Desk Ticket Analysis Tool.
Use this tool to identify trends and patterns in your ticket data. The ticket summary dashboard contains multiple reports analyzing how tickets come in, who requests them, who resolves them, and how long it takes to resolve them.
If you need help understanding how well your current staff is able to handle your current ticket volume, leverage Info-Tech’s Service Desk Staffing Calculator to analyze demand and ticket volume trends. While not specifically designed to analyze VIP tickets, you could run the assessment separately for VIP volume if you have that data available.
Use this tool to help you estimate the optimal resource allocation to support your demand over time.
Follow your organization’s requirements gathering process to identify and prioritize stakeholders, conduct stakeholder interviews, and identify, track, and prioritize their requirements and expectations for service delivery.
If your organization does not have a defined requirements gathering process or template, leverage Info-Tech tools and templates:
The Improve Requirements Gathering blueprint can be adapted from software requirements gathering to service desk.
The PMO Requirements Gathering Tool can be adapted from interviewing stakeholders on their PMO requirements to service desk requirements.
Don’t guess at what your VIPs need or want – ask them and involve them in the service design. Many IT leaders sacrifice overall service quality to prioritize VIPs, thinking they expect immediate service. However, they later find out that the VIPs just assumed the service they were receiving was the standard service and many of their issues can wait.
Info-Tech's CIO Business Vision program is a low-effort, high-impact program that will give you detailed report cards on the organization’s satisfaction with IT’s core services. Use these insights to understand your key business stakeholders, find out what is important to them, and improve your interactions.
Info-Tech’s End User Satisfaction Program helps you measure end-user satisfaction and importance ratings of core IT services, IT communications, and business enablement to help you decide which IT service capabilities need to be addressed to meet the demands of the business.
Learn more about Info-Tech’s CIO Business Vision or End User Satisfaction Program .
Step overview:
The table below is a rough guide for how the results of your assessments may line up to the most appropriate model for your organization:

If you’re in the position of deciding how to improve service to VIPs, it’s unlikely that you will end up choosing the “same service” model. If your data analysis tells you that you are currently meeting every metric target for all users, this may actually indicate that you’re overstaffed at the service desk.
Step overview:
When a designated VIP user contacts the service desk with a question, incident, or service request, their ticket will be prioritized over non-VIP tickets following the prioritization matrix. This process has been designed in accordance with business needs and requirements, as defined VIP users have more urgent demands on their time and the impact of downtime is greater as it has the potential to impact the business. However, all tickets, VIP tickets included, must still be prioritized by impact and urgency. Incidents that are more critical will still be resolved before VIP tickets in accordance with the prioritization process.
VIP support is a team of dedicated field technicians available to provide an elevated level of service including deskside support for executives and designated VIP users. VIP users have the ability to contact the VIP support service through a dedicated phone number and will receive expedited ticket handling and resolution by dedicated Tier 2 specialists with experience dealing with executives and their unique needs and requirements. This process has been designed in accordance with business needs and requirements.
Use a visual workflow to document the process for resolving or fulfilling VIP tickets, from when the ticket is submitted to when it gets closed.
Your workflow should address the following:
Use the VIP Support Process Workflow Example as a template to map out your own process.
Define all aspects of the service so that every VIP request will follow the same standardized process and VIPs will have clear expectations for the service they receive. This may include:
If VIP user requests receive enhanced priority, for example, define exactly how those requests should be prioritized using your prioritization matrix. An example is found below and in the Service Desk VIP Procedures Template.
This template is designed to assist with documenting your service desk procedures for handling VIP or executive tickets. The template is not meant to cover all possible VIP support models but is an example of one support model only. It should be adapted and customized to reflect your specific support model and procedures.
Download the Service Desk VIP Procedures Template
Step overview:
If you did your due diligence, the VIP service launch won’t be a surprise to executives. However, it’s critical to
continue the engagement and communicate the details of the service well to ensure there are no misperceptions about the
service when it launches.
This step isn’t only for the launch of new services. Even if you’re enhancing or right-sizing an existing VIP service, take the opportunity to market the improvements, remind users of the correct processes, and collect feedback.
This template can be customized to use as an executive presentation to communicate and market the service to VIP users. It includes:
If you’re launching a dedicated concierge service for VIPs, highlight the exclusivity of the service in your marketing to draw users in. For example, if eligible VIPs get a separate number to call, expedited SLAs, or access to more tenured service desk experts, promote this added value of the service.
Download the VIP Support Service Communication Template
Step overview:
Targeted metrics to evaluate the success of the VIP program will be critical to understanding and demonstrating whether the service is delivering the intended value. Track key metrics to:
If your data definitively shows the VIP offering delivers enhanced service levels, publish these results to business leadership. A successful VIP service is a great accomplishment to market and build credibility for the service desk.
Download Define Service Desk Metrics that Matter and the Service Desk Metrics Workbook for help defining CSFs, KPIs, and key metrics
Step overview:
Executives are happy, resolution times are on target – now what? Even if everything seems to be working well, never stop monitoring, measuring, and evaluating the service. Not only can metrics change, but there can also always be ways to improve service.
Download Info-Tech’s Build a Continual Improvement Program blueprint to help you build a process around continual improvement, and use the Continual Improvement Register tool to help you identify and prioritize improvement initiatives.
Don’t limit your continual improvement efforts to the VIP service. Once you’ve successfully elevated the VIP service, look to how you can apply elements of that service to elevate support to the rest of the organization. For example, through providing a roaming service desk, a concierge desk, a Genius-Bar-style walk-in service, etc.
This project will help you build and improve essential service desk processes, including incident management, request fulfillment, and knowledge management to create a sustainable service desk.
This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.
This project will help you build a continual improvement plan for the service desk to review key processes and services and manage the progress of improvement initiatives.
This project will help you deliver a targeted customer service training program to your IT team to enhance their customer service skills when dealing with end users, improve overall service delivery, and increase customer satisfaction.
Munger, Nate. “Why You Should Provide VIP Customer Support.” Intercom, 13 Jan. 2016. Accessed Jan. 2023.
Ogilvie, Ryan. “We Did Away With VIP Support and Got More Efficient.” HDI, 17 Sep. 2020. Accessed Jan. 2023.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard will help you define FinOps roles and structure of the FinOps and other teams, identify key activities, and assign ownership to each. It will also provide guidance on analyzing the results of the RACI chart.
This tool will help you assess the current state of FinOps activities and assign ownership to each activity. Use the outputs of the exercise to define how roles across the organization will be involved in FinOps and where to focus efforts in maturing in FinOps.
![]() Natalie Sansone, PhD |
As cloud adoption increases, and with it the complexity of cloud environments, managing and optimizing cloud spend has become both a top challenge and priority for IT organizations. In response, the practice of FinOps has emerged to help organizations maximize the value they get from the cloud. As its popularity surges, organizations are told they must do FinOps, but many feel their practice is not yet mature. One of their biggest obstacles is empowering engineers and other cloud users to work toward this shared goal with other teams. To grow and mature your FinOps practice, your first challenge is breaking down silos, encouraging collaboration across varying business units, and getting all cloud users to be accountable for their cloud usage and spend and to understand the shared goals of FinOps. Beyond finding ways to reduce cloud costs, FinOps is a cultural shift that enables better collaboration between distributed teams. It allows them to leverage data to identify opportunities to maximize business value from cloud investments. Whether you’re starting the FinOps journey or looking to mature your practice, this blueprint will help you organize by defining the required role and tasks. Then you can work through a collective exercise to ensure everyone understands who is involved and responsible for each activity. You’ll gain the information you need and be better positioned to continuously improve and mature your processes, but success begins with everyone understanding that FinOps is a shared responsibility. |
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|---|---|---|
|
|
|
Info-Tech Insight
FinOps is not just about driving cloud savings. It’s a cultural shift empowering every cloud user to maximize the value of their spend. The first step of FinOps is therefore to help everyone understand their share of responsibility.
“FinOps is an evolving cloud financial management discipline and cultural practice that enables organizations to get maximum business value by helping engineering, finance, technology, and business teams to collaborate on data-driven spending decisions.”
Definition Updated: November 2021 by the FinOps Foundation Technical Advisory Council
FinOps is not |
FinOps is |
|---|---|
|
|
2012 - The practice of FinOps begins to emerge through early scalers in public cloud like Adobe and Intuit
2017 - Many IT departments begin to use the cloud for limited use cases, but very few enterprises are all in the cloud
2019 - Many companies begin moving to a cloud-first strategy, shifting IT spend from capital to operational expenditure (CapEx to OpEx), complicating cloud bills
February 2019 - The FinOps Foundation is born out of Cloudability’s Customer Advisory Board meeting where many cloud practitioners discuss the need for a community of practitioners
June 2020 - The FinOps Foundation merges with Linux Foundation and sets the standard for cloud financial management

The term FinOps has risen in popularity over the last few years. Originally, organizations used the term cloud cost management, then cloud cost optimization, then more broadly, cloud financial management. The latter has now been largely replaced by FinOps.
Given the variable nature of cloud costs and complex pricing structures, it can be easy to overspend without mature FinOps processes in place. Indeed, 82% of organizations cite managing cloud spend as one of their top challenges.
Respondents reported that public cloud spend was over budget by an average of 18%, up from 13% the previous year.

96% say FinOps is important to their cloud strategy
9% have a mature FinOps practice
92% report that they struggle with FinOps
Flexera’s annual report also found that year over year, cloud cost responsibilities are increasingly shifting away from Finance/Accounting and Vendor Management teams and over to FinOps teams as they emerge and mature.
There are four key scenarios or entry points for IT as the selling/divesting organization in M&As:
Consider the ideal scenario for your IT organization.
Divestitures are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:
Prepare for a sale/divestiture transaction by:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.
Create a standardized approach for how your IT organization should address divestitures or sales.
Comply with due diligence, prepare the IT environment for carve-out possibilities, and establish the separation project plan.
Deliver on the separation project plan successfully and communicate IT’s transaction value to the business.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish the transaction foundation.
Discover the motivation for divesting or selling.
Formalize the program plan.
Create the valuation framework.
Strategize the transaction and finalize the M&A strategy and approach.
All major stakeholders are on the same page.
Set up crucial elements to facilitate the success of the transaction.
Have a repeatable transaction strategy that can be reused for multiple organizations.
1.1 Conduct the CIO Business Vision and CEO-CIO Alignment diagnostics.
1.2 Identify key stakeholders and outline their relationship to the M&A process.
1.3 Understand the rationale for the company's decision to pursue a divestiture or sale.
1.4 Assess the IT/digital strategy.
1.5 Identify pain points and opportunities tied to the divestiture/sale.
1.6 Create the IT vision statement and mission statement and identify IT guiding principles and the transition team.
1.7 Document the M&A governance.
1.8 Establish program metrics.
1.9 Create the valuation framework.
1.10 Establish the separation strategy.
1.11 Conduct a RACI.
1.12 Create the communication plan.
1.13 Prepare to assess target organizations.
Business perspectives of IT
Stakeholder network map for M&A transactions
Business context implications for IT
IT’s divestiture/sale strategic direction
Governance structure
M&A program metrics
IT valuation framework
Separation strategy
RACI
Communication plan
Prepared to assess target organization(s)
Establish the foundation.
Discover the motivation for separation.
Identify expectations and create the carve-out roadmap.
Prepare and manage employees.
Plan the separation roadmap.
All major stakeholders are on the same page.
Methodology identified to enable compliance during due diligence.
Employees are set up for a smooth and successful transition.
Separation activities are planned and assigned.
2.1 Gather and evaluate the stakeholders involved, M&A strategy, future-state operating model, and governance.
2.2 Review the business rationale for the divestiture/sale.
2.3 Establish the separation strategy.
2.4 Create the due diligence charter.
2.5 Create a list of IT artifacts to be reviewed in the data room.
2.6 Create a carve-out roadmap.
2.7 Create a service/technical transaction agreement.
2.8 Measure staff engagement.
2.9 Assess the current culture and identify the goal culture.
2.10 Create employee transition and functional workplans.
2.11 Establish the separation roadmap.
2.12 Establish and align project metrics with identified tasks.
2.13 Estimate integration costs.
Stakeholder map
IT strategy assessed
IT operating model and IT governance structure defined
Business context implications for IT
Separation strategy
Due diligence charter
Data room artifacts
Carve-out roadmap
Service/technical transaction agreement
Engagement assessment
Culture assessment
Employee transition and functional workplans
Integration roadmap and associated resourcing
Establish the transaction foundation.
Discover the motivation for separation.
Plan the separation roadmap.
Prepare employees for the transition.
Engage in separation.
Assess the transaction outcomes.
All major stakeholders are on the same page.
Separation activities are planned and assigned.
Employees are set up for a smooth and successful transition.
Separation strategy and roadmap are executed to benefit the organization.
Review what went well and identify improvements to be made in future transactions.
3.1 Identify key stakeholders and outline their relationship to the M&A process.
3.2 Gather and evaluate the M&A strategy, future-state operating model, and governance.
3.3 Review the business rationale for the divestiture/sale.
3.4 Establish the separation strategy.
3.5 Prioritize separation tasks.
3.6 Establish the separation roadmap.
3.7 Establish and align project metrics with identified tasks.
3.8 Estimate separation costs.
3.9 Measure staff engagement.
3.10 Assess the current culture and identify the goal culture.
3.11 Create employee transition and functional workplans.
3.12 Complete the separation by regularly updating the project plan.
3.13 Assess the service/technical transaction agreement.
3.14 Confirm separation costs.
3.15 Review IT’s transaction value.
3.16 Conduct a transaction and separation SWOT.
3.17 Review the playbook and prepare for future transactions.
M&A transaction team
Stakeholder map
IT strategy assessed
IT operating model and IT governance structure defined
Business context implications for IT
Separation strategy
Separation roadmap and associated resourcing
Engagement assessment
Culture assessment
Employee transition and functional workplans
Updated separation project plan
Evaluated service/technical transaction agreement
SWOT of transaction
M&A Sell Playbook refined for future transactions
IT has always been an afterthought in the M&A process, often brought in last minute once the deal is nearly, if not completely, solidified. This is a mistake. When IT is brought into the process late, the business misses opportunities to generate value related to the transaction and has less awareness of critical risks or inaccuracies.
To prevent this mistake, IT leadership needs to develop strong business relationships and gain respect for their innovative suggestions. In fact, when it comes to modern M&A activity, IT should be the ones suggesting potential transactions to meet business needs, specifically when it comes to modernizing the business or adopting digital capabilities.
IT needs to stop waiting to be invited to the acquisition or divestiture table. IT needs to suggest that the table be constructed and actively work toward achieving the strategic objectives of the business.
There are four key scenarios or entry points for IT as the selling/divesting organization in M&As:
Consider the ideal scenario for your IT organization.
Some of the obstacles IT faces include:
These obstacles often arise when IT waits to be invited into the transaction process and misses critical opportunities.
Prepare for a sale/divestiture transaction by:
As the number of merger, acquisition, and divestiture transactions continues to increase, so too does IT’s opportunity to leverage the growing digital nature of these transactions and get involved at the onset.
The total value of transactions in the year after the pandemic started was $1.3 billion – a 93% increase in value compared to before the pandemic. (Nasdaq)
71% of technology companies anticipate that divestitures will take place as a result of the COVID-19 pandemic. (EY, 2020)
Only half of M&A deals involve IT (Source: IMAA Institute, 2017)
In hindsight, it’s clear to see: Involving IT is just good business.
47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion. (Source: IMAA Institute, 2017)
“Solutions exist that can save well above 50 percent on divestiture costs, while ensuring on-time delivery.” (Source: SNP)
Acquisitions and divestitures are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:
A merger looks at the equal combination of two entities or organizations. Mergers are rare in the M&A space, as the organizations will combine assets and services in a completely equal 50/50 split. Two organizations may also choose to divest business entities and merge as a new company.
The most common transaction in the M&A space, where an organization will acquire or purchase another organization or entities of another organization. This type of transaction has a clear owner who will be able to make legal decisions regarding the acquired organization.
An organization may decide to sell partial elements of a business to an acquiring organization. They will separate this business entity from the rest of the organization and continue to operate the other components of the business.
A true merger does not exist, as there is always someone initiating the discussion. As a result, most M&A activity falls into acquisition or divestiture categories.
This blueprint is only focused on the sell side:
The buy side is focused on:
For more information on acquisitions or purchases, check out Info-Tech’s Mergers & Acquisitions: The Buy Blueprint.
1. Proactive |
2. Discovery & Strategy |
3. Due Diligence & Preparation |
4. Execution & Value Realization |
|
Phase Steps |
|
|
|
|
Phase Outcomes |
Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture. |
Create a standardized approach for how your IT organization should address divestitures or sales. |
Comply with due diligence, prepare the IT environment for carve-out possibilities, and establish the separation project plan. |
Deliver on the separation project plan successfully and communicate IT’s transaction value to the business. |
1. Proactive | 2. Discovery & Strategy | 3. Valuation & Due Diligence | 4. Execution & Value Realization |
|
|
|
|
IT controls if and when it gets invited to support the business through a purchasing growth transaction. Take control of the process, demonstrate the value of IT, and ensure that separation of IT environments does not lead to unnecessary and costly decisions.
CIOs on the forefront of digital transformation need to actively look for and suggest opportunities to acquire or partner on new digital capabilities to respond to rapidly changing business needs.
IT organizations that have an effective M&A program plan are more prepared for the transaction, enabling a successful outcome. A structured strategy is particularly necessary for organizations expected to deliver M&As rapidly and frequently.
IT often faces unnecessary separation challenges because of a lack of preparation. Secure the IT environment and establish how IT will retain employees early in the transaction process.
IT needs to demonstrate value and cost savings within 100 days of the transaction. The most successful transactions are when IT continuously realizes synergies a year after the transaction and beyond.
The M&A Sell Playbook should be a reusable document that enables your IT organization to successfully deliver on any divestiture transaction.
See a one-page overview of each phase of the transaction.
Read a one-page case study for each phase of the transaction.
Manage the separation process of the divestiture/sale using this SharePoint template.
Manage the separation process of the divestiture/sale using this Excel tool if you can’t or don’t want to use SharePoint.
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 6 to 10 calls over the course of 2 to 4 months.
Phase 1 |
Phase 2 | Phase 3 | Phase 4 |
|
|
|
|
As the number of merger, acquisition, or divestiture transactions driven by digital means continues to increase, IT has an opportunity to not just be involved in a transaction but actively seek out potential deals.
In the Proactive phase, the business is not currently considering a transaction. However, the business could consider one to reach its strategic goals. IT organizations that have developed respected relationships with the business leaders can suggest these potential transactions.
Understand the business’ perspective of IT, determine who the critical M&A stakeholders are, valuate the IT environment, and examine how it supports the business goals in order to suggest an M&A transaction.
In doing so, IT isn’t waiting to be invited to the transaction table – it’s creating it.
Goal: To support the organization in reaching its strategic goals by suggesting M&A activities that will enable the organization to reach its objectives faster and with greater-value outcomes.
Before coming into the Proactive phase, you should have addressed the following:
Review the Executive Brief for more information on mergers, acquisitions, and divestitures for selling organizations.
Understand how the business perceives IT and establish strong relationships with critical M&A stakeholders.
Misalignment in target state requires further communication between the CIO and CEO to ensure IT is striving toward an agreed-upon direction.
The core services of IT are important when determining what IT should focus on. The most important services with the lowest satisfaction offer the largest area of improvement for IT to drive business value.
Input: IT organization expertise and the CEO-CIO Alignment diagnostic
Output: An understanding of an executive business stakeholder’s perception of IT
Materials: M&A Sell Playbook, CEO-CIO Alignment diagnostic
Participants: IT executive/CIO, Business executive/CEO
Download the sample report.
Record the results in the M&A Sell Playbook.
2 weeks
Input: IT organization expertise, CIO BV diagnostic
Output: An understanding of business stakeholder perception of certain IT capabilities and services
Materials: M&A Buy Playbook, CIO Business Vision diagnostic
Participants: IT executive/CIO, Senior business leaders
Download the sample report.
Record the results in the M&A Sell Playbook.
Example:
Your stakeholder map defines the influence landscape that the M&A transaction will occur within. This will identify who holds various levels of accountability and decision-making authority when a transaction does take place.
Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantial relationships with your stakeholders.
1-3 hours
Input: List of M&A stakeholders
Output: Relationships among M&A stakeholders and influencers
Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook
Participants: IT executive leadership
Record the results in the M&A Sell Playbook.
There are four areas in the map, and the stakeholders within each area should be treated differently.
Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.
Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.
Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.
Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.
30 minutes
Input: Stakeholder map, Stakeholder list
Output: Categorization of stakeholders and influencers
Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook
Participants: IT executive leadership, Stakeholders
How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?
Record the results in the M&A Sell Playbook.
| Level of Support | |||||
Supporter |
Evangelist |
Neutral |
Blocker |
||
| Stakeholder Category | Player | Critical | High | High | Critical |
| Mediator | Medium | Low | Low | Medium | |
| Noisemaker | High | Medium | Medium | High | |
| Spectator | Low | Irrelevant | Irrelevant | Low |
Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by answering the following question: How significant is that stakeholder to the M&A or divestiture process?
These parameters are used to prioritize which stakeholders are most important and should receive your focused attention.
30 minutes
Input: Stakeholder matrix
Output: Stakeholder and influencer prioritization
Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook
Participants: IT executive leadership, M&A/divestiture stakeholders
Stakeholder |
Category |
Level of Support |
Prioritization |
| CMO | Spectator | Neutral | Irrelevant |
| CIO | Player | Supporter | Critical |
Record the results in the M&A Sell Playbook.
Type |
Quadrant |
Actions |
| Players | High influence, high interest – actively engage | Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success. |
| Mediators | High influence, low interest – keep satisfied | They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders. |
| Noisemakers | Low influence, high interest – keep informed | Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them. |
| Spectators | Low influence, low interest – monitor | They are followers. Keep them in the loop by providing clarity on objectives and status updates. |
Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying stakeholder groups, the IT executive leader can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers while ensuring the needs of Mediators and Players are met.
30 minutes
Input: Stakeholder priority, Stakeholder categorization, Stakeholder influence
Output: Stakeholder communication plan
Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook
Participants: IT executive leadership, M&A/divestiture stakeholders
The purpose of this activity is to make a communication plan for each of the stakeholders identified in the previous activities, especially those who will have a critical role in the M&A transaction process.
Record the results in the M&A Sell Playbook.
Identify critical opportunities to optimize IT and meet strategic business goals through a merger, acquisition, or divestiture.
Four ways to create value through digital
1 day
Input: Valuation of data, Valuation of applications, Valuation of infrastructure and operations, Valuation of security and risk
Output: Valuation of IT
Materials: Relevant templates/tools listed on the following slides, Capital budget, Operating budget, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership
The purpose of this activity is to demonstrate that IT is not simply an operational functional area that diminishes business resources. Rather, IT contributes significant value to the business.
Consistency is key when valuating your IT organization as well as other IT organizations throughout the transaction process.
Record the results in the M&A Sell Playbook.
Data valuation identifies how you monetize the information that your organization owns.
When valuating the information and data that exists in an organization, there are many things to consider.
Info-Tech has two tools that can support this process:
Data Collection |
Insight Creation |
Value Creation |
Data Valuation |
| 01 Data Source
02 Data Collection Method 03 Data |
04 Data Analysis
05 Insight 06 Insight Delivery |
07 Consumer
08 Value in Data |
09 Value Dimension
10 Value Metrics Group 11 Value Metrics |
When valuating the applications and their users in an organization, consider using a business process map. This shows how business is transacted in the company by identifying which IT applications support these processes and which business groups have access to them. Info-Tech has a business process mapping tool that can support this process:
User Costs |
Total User Costs |
Derived Productivity Ratio (DPR) |
Total DPR |
Application Value |
|||
| # of users | % time spent using IT | Fully burdened salary | Multiply values from the 3 user costs columns | Revenue per employee | Average cost per employee | (Revenue P.E) ÷ (Average cost P.E) | (User costs) X (DPR) |
IT and Business Costs |
Total IT and Business Costs |
Net Value of Applications |
|||
| Application maintenance | Downtime costs (include disaster exposure) | Common costs allocated to applications | Fully loaded costs of active (FTE) users | Sum of values from the four IT and business costs columns | (Application value) – (IT and business costs) |
(Source: CSO)
The purpose of this exercise is to provide a high-level infrastructure valuation that will contribute to valuating your IT environment.
Calculating the value of the infrastructure will require different methods depending on the environment. For example, a fully cloud-hosted organization will have different costs than a fully on-premises IT environment.
Item |
Costs/Value |
| Hardware Assets Total Value | +$3.2 million |
| Hardware Leased/Service Agreement | -$ |
| Software Purchased | +$ |
| Software Leased/Service Agreement | -$ |
| Operational Tools | |
| Network | |
| Disaster Recovery | |
| Antivirus | |
| Data Centers | |
| Service Desk | |
| Other Licenses | |
| Total: |
For additional support, download the M&A Runbook for Infrastructure and Operations.
The purpose of this exercise is to provide a high-level risk assessment that will contribute to valuating your IT environment. For a more in-depth risk assessment, please refer to the Info-Tech tools below:
Probability of Risk Occurrence |
Occurrence Criteria
|
| Negligible | Very Unlikely; ‹20% |
| Very Low | Unlikely; 20 to 40% |
| Low | Possible; 40 to 60% |
| Moderately Low | Likely; 60 to 80% |
| Moderate | Almost Certain; ›80% |
Note: If needed, you can customize this scale with the severity designations that you prefer. However, make sure you are always consistent with it when conducting a risk assessment.
Financial & Reputational Impact |
Budgetary and Reputational Implications
|
| Negligible | (‹$10,000; Internal IT stakeholders aware of risk event occurrence) |
| Very Low | ($10,000 to $25,000; Business customers aware of risk event occurrence) |
| Low | ($25,000 to $50,000; Board of directors aware of risk event occurrence) |
| Moderately Low | ($50,000 to $100,000; External customers aware of risk event occurrence) |
| Moderate | (›$100,000; Media coverage or regulatory body aware of risk event occurrence) |
Risk Category Details |
Probability of Occurrence |
Estimated Financial Impact |
Estimated Severity (Probability X Impact) |
| Capacity Planning | |||
| Enterprise Architecture | |||
| Externally Originated Attack | |||
| Hardware Configuration Errors | |||
| Hardware Performance | |||
| Internally Originated Attack | |||
| IT Staffing | |||
| Project Scoping | |||
| Software Implementation Errors | |||
| Technology Evaluation and Selection | |||
| Physical Threats | |||
| Resource Threats | |||
| Personnel Threats | |||
| Technical Threats | |||
| Total: |
4 hours
Input: IT strategy, Digital strategy, Business strategy
Output: An understanding of an executive business stakeholder’s perception of IT, Alignment of IT/digital strategy and overall organization strategy
Materials: Computer, Whiteboard and markers, M&A Sell Playbook
Participants: IT executive/CIO, Business executive/CEO
The purpose of this activity is to review the business and IT strategies that exist to determine if there are critical capabilities that are not being supported.
Ideally, the IT and digital strategies would have been created following development of the business strategy. However, sometimes the business strategy does not directly call out the capabilities it requires IT to support.
For additional support, see Build a Business-Aligned IT Strategy.
Record the results in the M&A Sell Playbook.
Establish strong relationships with critical M&A stakeholders and position IT as an innovative business partner that can suggest reduction opportunities.
1-2 hours
Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade
Output: List of pain points or opportunities that IT can address
Materials: Computer, Whiteboard and markers, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Business stakeholders
The purpose of this activity is to determine the pain points and opportunities that exist for the organization. These can be external or internal to the organization.
Opportunities and pain points can be trends, other departments’ initiatives, business perspectives of IT, etc.
Record the results in the M&A Sell Playbook.
1-2 hours
Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade, List of pain points and opportunities
Output: An understanding of an executive business stakeholder’s perception of IT, Foundations for reduction strategy
Materials: Computer, Whiteboard and markers, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Business stakeholders
The purpose of this activity is to determine whether a growth or separation strategy might be a good suggestion to the business in order to meet its business objectives.
Record the results in the M&A Sell Playbook.
1-2 hours
Input: Growth or separation strategy opportunities to support business goals, Stakeholder communication plan, Rationale for the suggestion
Output: M&A transaction opportunities suggested
Materials: M&A Sell Playbook
Participants: IT executive/CIO, Business executive/CEO
The purpose of this activity is to recommend a merger, acquisition, or divestiture to the business.
With technology and digital driving many transactions, leverage your organizations’ IT environment as an asset and reason why the divestiture or sale should happen, suggesting the opportunity yourself.
Record the results in the M&A Sell Playbook.
Develop progressive relationships and strong communication with key stakeholders to suggest or be aware of transformational opportunities that can be achieved through sale or divestiture strategies.
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|
|
|
|
Pre-Work | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
| Establish the Transaction Foundation | Discover the Motivation for Divesting or Selling | Formalize the Program Plan | Create the Valuation Framework | Strategize the Transaction | Next Steps and Wrap-Up (offsite) | |
Activities |
|
|
|
|
|
|
Deliverables |
|
|
|
|
|
|
The Discovery & Strategy phase during a sale or divestiture is a unique opportunity for many IT organizations. IT organizations that can participate in the transaction at this stage are likely considered a strategic partner of the business.
For one-off sales/divestitures, IT being invited during this stage of the process is rare. However, for organizations that are preparing to engage in many divestitures over the coming years, this type of strategy will greatly benefit from IT involvement. Again, the likelihood of participating in an M&A transaction is increasing, making it a smart IT leadership decision to, at the very least, loosely prepare a program plan that can act as a strategic pillar throughout the transaction.
During this phase of the pre-transaction state, IT may be asked to participate in ensuring that the IT environment is able to quickly and easily carve out components/business lines and deliver on service-level agreements (SLAs).
Goal: To identify a repeatable program plan that IT can leverage when selling or divesting all or parts of the current IT environment, ensuring customer satisfaction and business continuity
Before coming into the Discovery & Strategy phase, you should have addressed the following:
Establish an M&A program plan that can be repeated across sales/divestitures.
Vision Statements |
Mission Statements |
|
Characteristics |
|
|
Samples |
To be a trusted advisor and partner in enabling business innovation and growth through an engaged IT workforce. (Source: Business News Daily) | IT is a cohesive, proactive, and disciplined team that delivers innovative technology solutions while demonstrating a strong customer-oriented mindset. (Source: Forbes, 2013) |
2 hours
Input: Business objectives, IT capabilities, Rationale for the transaction
Output: IT’s mission and vision statements for reduction strategies tied to mergers, acquisitions, and divestitures
Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to create mission and vision statements that reflect IT’s intent and method to support the organization as it pursues a reduction strategy.
Record the results in the M&A Sell Playbook.
IT guiding principles are shared, long-lasting beliefs that guide the use of IT in constructing, transforming, and operating the enterprise by informing and restricting IT investment portfolio management, solution development, and procurement decisions.
Info-Tech has identified a set of characteristics that IT principles should possess. These characteristics ensure the IT principles are relevant and followed in the organization.
Approach focused. IT principles should be focused on the approach – how the organization is built, transformed, and operated – as opposed to what needs to be built, which is defined by both functional and non-functional requirements.
Business relevant. Create IT principles that are specific to the organization. Tie IT principles to the organization’s priorities and strategic aspirations.
Long lasting. Build IT principles that will withstand the test of time.
Prescriptive. Inform and direct decision making with actionable IT principles. Avoid truisms, general statements, and observations.
Verifiable. If compliance can’t be verified, people are less likely to follow the principle.
Easily Digestible. IT principles must be clearly understood by everyone in IT and by business stakeholders. IT principles aren’t a secret manuscript of the IT team. IT principles should be succinct; wordy principles are hard to understand and remember.
Followed. Successful IT principles represent a collection of beliefs shared among enterprise stakeholders. IT principles must be continuously communicated to all stakeholders to achieve and maintain buy-in.
In organizations where formal policy enforcement works well, IT principles should be enforced through appropriate governance processes.
IT Principle Name |
IT Principle Statement |
| 1. Risk Management | We will ensure that the organization’s IT Risk Management Register is properly updated to reflect all potential risks and that a plan of action against those risks has been identified. |
| 2. Transparent Communication | We will ensure employees are spoken to with respect and transparency throughout the transaction process. |
| 3. Separation for Success | We will create a carve-out strategy that enables the organization and clearly communicates the resources required to succeed. |
| 4. Managed Data | We will handle data creation, modification, separation, and use across the enterprise in compliance with our data governance policy. |
| 5.Deliver Better Customer Service | We will reduce the number of products offered by IT, enabling a stronger focus on specific products or elements to increase customer service delivery. |
| 6. Compliance With Laws and Regulations | We will operate in compliance with all applicable laws and regulations for both our organization and the potentially purchasing organization. |
| 7. Defined Value | We will create a plan of action that aligns with the organization’s defined value expectations. |
| 8. Network Readiness | We will ensure that employees and customers have immediate access to the network with minimal or no outages. |
| 9. Value Generator | We will leverage the current IT people, processes, and technology to turn the IT organization into a value generator by developing and selling our services to purchasing organizations. |
2 hours
Input: Business objectives, IT capabilities, Rationale for the transaction, Mission and vision statements
Output: IT’s guiding principles for reduction strategies tied to mergers, acquisitions, and divestitures
Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to create the guiding principles that will direct the IT organization throughout the reduction strategy process.
Record the results in the M&A Sell Playbook.
Consider the following capabilities when looking at who should be a part of the IT Transaction Team.
Employees who have a significant role in ensuring that these capabilities are being delivered will be a top priority.
An operating model is an abstract visualization, used like an architect’s blueprint, that depicts how structures and resources are aligned and integrated to deliver on the organization’s strategy.
It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint before embarking on detailed organizational design.
The visual should highlight which capabilities are critical to attaining strategic goals and clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization.
As you assess the current operating model, consider the following:
Info-Tech Insight
Investing time up-front getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and allowing your model to change as the business changes.
4 hours
Input: Current operating model, IT strategy, IT capabilities, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements
Output: Future-state operating model for divesting organizations
Materials: Operating model, Capability overlay, Flip charts/whiteboard, Markers, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to establish what the future-state operating model will be if your organization needs to adjust to support a divestiture transaction. If your organization plans to sell in its entirety, you may choose to skip this activity.
An example operating model is included in the M&A Sell Playbook. This process benefits from strong reference architecture and capability mapping ahead of time.
Record the results in the M&A Sell Playbook.
Input: IT capabilities, Future-state operating model, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements
Output: Transition team
Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to create a team that will support your IT organization throughout the transaction. Determining which capabilities and therefore which roles will be required ensures that the business will continue to get the operational support it needs.
For more information, see Redesign Your Organizational Structure
1-2 hours
Input: List of governing bodies, Governing body committee profiles, Governance structure
Output: Documented method on how decisions are made as it relates to the M&A transaction
Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to determine the method in which decisions are made throughout the M&A transaction as it relates to IT. This will require understanding both governing bodies internal to IT and those external to IT.
Record the results in the M&A Sell Playbook.
Strategy: These groups will focus on decisions that directly connect to the strategic direction of the organization.
Design & Build: The second tier of groups will oversee prioritization of a certain area of governance as well as design and build decisions that feed into strategic decisions.
Run: The lowest level of governance will be oversight of more-specific initiatives and capabilities within IT.
Expect tier overlap. Some committees will operate in areas that cover two or three of these governance tiers.
Upper management will measure IT’s success based on your ability to support the underlying reasons for the M&A. Using business metrics will help assure business stakeholders that IT understands their needs and is working with the business to achieve them.
| S pecific | Make sure the objective is clear and detailed. |
| M easurable | Objectives are measurable if there are specific metrics assigned to measure success. Metrics should be objective. |
| A ctionable | Objectives become actionable when specific initiatives designed to achieve the objective are identified. |
| R ealistic | Objectives must be achievable given your current resources or known available resources. |
| T ime-Bound | An objective without a timeline can be put off indefinitely. Furthermore, measuring success is challenging without a timeline. |
1. Proactive | 2. Discovery & Strategy | 3. Valuation & Due Diligence | 4. Execution & Value Realization |
|
|
|
|
1-2 hours
Input: IT capabilities, Mission, vision, and guiding principles, Rationale for the acquisition
Output: Program metrics to support IT throughout the M&A process
Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to determine how IT’s success throughout a growth transaction will be measured and determined.
Record the results in the M&A Sell Playbook.
Identify IT’s plan of action when it comes to the separation/sale and align IT’s separation/sale strategy with the business’ M&A strategy.
The approach IT takes will depend on the business objectives for the M&A.
Key considerations when choosing an IT separation strategy include:
1-2 hours
Input: Business separation strategy, Guiding principles, M&A governance
Output: IT’s separation strategy
Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to determine IT’s approach to separating or selling. This approach might differ slightly from transaction to transaction. However, the businesses approach to transactions should give insight into the general separation strategy IT should adopt.
Record the results in the M&A Sell Playbook.
Business M&A Strategy |
Resultant Technology Strategy |
M&A Magnitude (% of Seller Assets, Income, or Market Value) |
IT Separation Posture |
| A. Horizontal | Adopt One Model | ‹100% | Divest |
| ›99% | Sell | ||
| B. Vertical | Create Links Between Critical Systems | Any | Divest |
| C. Conglomerate | Independent Model | Any | Joint Venture Divest |
| D. Hybrid: Horizontal & Conglomerate | Create Links Between Critical Systems | Any | Divest Joint Venture |
| Business M&A Strategy | Resultant Technology Strategy | M&A Magnitude (% of Seller Assets, Income, or Market Value) | IT Separation Posture |
M&A objectives may not affect all IT domains and business functions in the same way. Therefore, the separation requirements for each business function may differ. Organizations will often choose to select and implement a hybrid separation posture to realize the technology end state.
Each business division may have specific IT domain and capability needs that require an alternative separation strategy.
1-2 hours
Input: IT capabilities, Transition team, Separation strategy
Output: Completed RACI for Transition team
Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to identify the core accountabilities and responsibilities for the roles identified as critical to your transition team. While there might be slight variation from transaction to transaction, ideally each role should be performing certain tasks.
Record the results in the M&A Sell Playbook.
Three key dimensions determine the appetite for cultural change:
1-2 hours
Input: IT’s M&A mission, vision, and guiding principles, M&A transition team, IT separation strategy, RACI
Output: IT’s M&A communication plan
Materials: Flip charts/whiteboard, Markers, RACI, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to create a communication plan that IT can leverage throughout the initiative.
Record the results in the M&A Sell Playbook.
As soon as you have identified organizations to consider, it’s imperative to assess critical risks. Most IT leaders can attest that they will receive little to no notice when the business is pursuing a sale and IT has to assess the IT organization. As a result, having a standardized template to quickly assess the potential acquiring organization is important.
Assessing potential organizations is not just for the purchaser. The seller should also know what the purchasing organization’s history with M&As is and what potential risks could occur if remaining connected through ongoing SLAs.
Input: Publicized historical risk events, Solutions and vendor contracts likely in the works, Trends
Output: IT’s valuation of the potential organization(s) for selling or divesting
Materials: M&A Sell Playbook
Participants: IT executive/CIO
The purpose of this activity is to assess the organization(s) that your organization is considering selling or divesting to.
Record the results in the M&A Sell Playbook.
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|
|
|
|
Pre-Work | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
| Establish the Transaction Foundation | Discover the Motivation for Separation | Identify Expectations and Create the Carve-Out Roadmap | Prepare and Manage Employees | Plan the Separation Roadmap | Next Steps and Wrap-Up (offsite) | |
Activities |
|
|
|
|
|
|
Deliverables |
|
|
|
|
|
|
The Due Diligence & Preparation phase during a sale or divestiture is a critical time for IT. If IT fails to proactively participate in this phase, IT will have to merely react to separation expectations set by the business.
If your organization is being sold in its entirety, staff will have major concerns about their future in the new organization. Making this transition as smooth as possible and being transparent could go a long way in ensuring their success in the new organization.
In a divestiture, this is the time to determine where it’s possible for the organization to divide or separate from itself. A lack of IT involvement in these conversations could lead to an overcommitment by the business and under-delivery by IT.
Goal: To ensure that, as the selling or divesting organization, you comply with regulations, prepare staff for potential changes, and identify a separation strategy if necessary
Before coming into the Due Diligence & Preparation phase, you must have addressed the following:
Before coming into the Due Diligence & Preparation phase, we recommend addressing the following:
All three elements of the Technology Value Trinity work in harmony to deliver business value and achieve strategic needs. As one changes, the others need to change as well.
Too often strategy, operating model and organizational design, and governance are considered separate practices. As a result, “strategic documents” end up being wish lists, and projects continue to be prioritized based on who shouts the loudest – not based on what is in the best interest of the organization.
This step of the process is when IT should prepare and support the business in due diligence and gather the necessary information about staff changes.
1-2 hours
Input: Key roles for the transaction team, M&A governance, Target metrics, Selected separation strategy framework, RACI of key transaction tasks for the transaction team
Output: IT Due Diligence Charter
Materials: M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to create a charter leveraging the items completed in the previous phase, as listed on the Due Diligence Prerequisite Checklist slide, to gain executive sign-off.
Record the results in the M&A Sell Playbook.
4 hours
Input: Future-state operating model, M&A governance, Target metrics, Selected separation strategy framework, RACI of key transaction tasks for the transaction team
Output: List of items to acquire and verify can be provided to the purchasing organization while in the data room
Materials: Critical domain lists on following slides, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team, Legal team, Compliance/privacy officers
The purpose of this activity is to create a list of the key artifacts that you could be asked for during the due diligence process.
**Note that if your organization is not leading/initiating the data room, then you can ignore this activity.
Record the results in the M&A Sell Playbook.
Domain |
Stakeholders |
Key Artifacts |
Key Information to request |
| Business |
|
|
|
| Leadership/IT Executive |
|
|
|
| Data & Analytics |
|
|
|
| Applications |
|
|
|
| Infrastructure |
|
|
|
| Products and Services |
|
|
|
Domain | Stakeholders | Key Artifacts | Key Information to request |
| Operations |
|
|
|
| IT Processes |
|
|
|
| IT People |
|
|
|
| Security |
|
|
|
| Projects |
|
|
|
| Vendors |
|
|
|
3-4 hours
Input: Engagement survey
Output: Baseline engagement scores
Materials: Build an IT Employee Engagement Program
Participants: IT executive/CIO, IT senior leadership, IT employees of current organization
The purpose of this activity is to measure current staff engagement to have a baseline to measure against in the future state. This is a good activity to complete if you will be divesting or selling in entirety.
The results from the survey should act as a baseline to determine what the organization is doing well in terms of employee engagement and what drivers could be improved upon.
Record the results in the M&A Sell Playbook.
Target Organization's Culture. The culture that the target organization is currently embracing. Their established and undefined governance practices will lend insight into this.
Your Organization’s Culture. The culture that your organization is currently embracing. Examine people’s attitudes and behaviors within IT toward their jobs and the organization.
Ideal Culture. What will the future culture of the IT organization be once separation is complete? Are there aspects that your current organization and the target organization embrace that are worth considering?
Competitive
|
Innovative
|
Traditional
|
Cooperative
|
3-4 hours
Input: Cultural assessments for current IT organization, Cultural assessment for target IT organization
Output: Goal for IT culture
Materials: IT Culture Diagnostic
Participants: IT executive/CIO, IT senior leadership, IT employees of current organization, IT employees of target organization, Company M&A team
The purpose of this activity is to assess the different cultures that might exist within the IT environments of the organizations involved. By understanding the culture that exists in the purchasing organization, you can identify the fit and prepare impacted staff for potential changes.
Record the results in the M&A Sell Playbook.
Have an established plan of action toward separation across all domains and a strategy toward resources.
Testing the carve capabilities of the IT organization often takes 3 months. (Source: Cognizant, 2014)
Daimler-Benz lost nearly $19 billion following its purchase of Chrysler by failing to recognize the cultural differences that existed between the two car companies. (Source: Deal Room)
Separating the IT organization requires more time and effort than business leaders will know. Frequently communicate challenges and lost opportunities when carving the IT environment out.
Set up a meeting with your IT due diligence team to:
Use this opportunity to:
The approach IT takes will depend on the business objectives for the M&A.
Key considerations when choosing an IT separation strategy include:
6 hours
Input: Items included in the carve-out, Dependencies, Whether testing is completed, If the carve-out will pass audit, If the carve-out item is prepared to be separated
Output: Carve-out roadmap
Materials: Business’ divestiture plan, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Business leaders, Transition team
The purpose of this activity is to prepare the IT environment by identifying a carve-out roadmap, specifically looking at data, infrastructure, and applications. Feel free to expand the roadmap to include other categories as your organization sees fit.
Record the results in the M&A Sell Playbook.
2 hours
Input: Separation tasks, Transition team, M&A RACI
Output: Prioritized separation list
Materials: Separation task checklist, Separation roadmap
Participants: IT executive/CIO, IT senior leadership, Company M&A team
The purpose of this activity is to prioritize the different separation tasks that your organization has identified as necessary to this transaction. Some tasks might not be relevant for this particular transaction, and others might be critical.
Record the updates in the M&A Separation Project Management Tool (SharePoint).
Record the updates in the M&A Separation Project Management Tool (Excel).
Input: Prioritized separation tasks, Carve-out roadmap, Employee transition plan, Separation RACI, Costs for activities, Activity owners
Output: Separation roadmap
Materials: M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel), SharePoint Template: Step-by-Step Deployment Guide
Participants: IT executive/CIO, IT senior leadership, Transition team, Company M&A team
The purpose of this activity is to create a roadmap to support IT throughout the separation process. Using the information gathered in previous activities, you can create a roadmap that will ensure a smooth separation.
Record the updates in the M&A Separation Project Management Tool (SharePoint).
Record the updates in the M&A Separation Project Management Tool (Excel).
For more information, check out the SharePoint Template: Step-by-Step Deployment Guide.
Input: Carve-out roadmap, Separation roadmap, Up-to-date version of the agreement
Output: Buyer’s IT expectations
Materials: Questions for meeting
Participants: IT executive/CIO, IT senior leadership, Company M&A team, Purchasing company M&A team, Purchasing company IT leadership
The purpose of this activity is to determine if the buyer has specific service expectations for your IT organization. By identifying, documenting, and agreeing on what services your IT organization will be responsible for, you can obtain a final agreement to protect you as the selling organization.
6 hours
Input: Buyer's expectations, Separation roadmap
Output: SLA for the purchasing organization
Materials: Service Catalog Internal Service Level Agreement Template, M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel)
Participants: IT executive/CIO, IT senior leadership, Company M&A team, Purchasing company M&A team, Purchasing company IT leadership
The purpose of this activity is to determine if the buyer has specific service expectations for your IT organization post-transaction that your IT organization is agreeing to provide.
*For organizations being purchased in their entirety, this activity may not be relevant.
Modify the Service Catalog Internal Service Level Agreement with the agreed-upon terms of the SLA.
Separation costs are more related to the degree of change required than the size of the transaction.
3-4 hours
Input: Separation tasks, Transition team, Valuation of current IT environment, Valuation of target IT environment, Outputs from data room, Technical debt, Employees
Output: List of anticipated costs required to support IT separation
Materials: Separation task checklist, Separation roadmap, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team
The purpose of this activity is to estimate the costs that will be associated with the separation. Identify and communicate a realistic figure to the larger M&A team within your company as early in the process as possible. This ensures that the funding required for the transaction is secured and budgeted for in the overarching transaction.
Record the results in the M&A Sell Playbook.
Being transparent throughout the process is critical. Do not hesitate to tell employees the likelihood that their job may be made redundant. This will ensure a high level of trust and credibility for those who remain with the organization after the transaction.
3-4 hours
Input: IT strategy, IT organizational design
Output: Employee transition plans
Materials: M&A Sell Playbook, Whiteboard, Sticky notes, Markers
Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team
The purpose of this activity is to create a transition plan for employees.
**Note that if someone’s future role is a layoff, then there is no need to record anything for skills needed or method for skill development.
Record the results in the M&A Sell Playbook.
3-4 hours
Input: Prioritized separation tasks, Employee transition plan, Separation RACI, Costs for activities, Activity owners
Output: Employee functional workplans
Materials: M&A Sell Playbook, Learning and development tools
Participants: IT executive/CIO, IT senior leadership, IT management team, Company M&A team, Transition team
The purpose of this activity is to create a functional workplan for the different employees so that they know what their key role and responsibilities are once the transaction occurs.
It is recommended that each employee have a functional workplan. Leverage the IT managers to support this task.
Record the results in the M&A Sell Playbook.
3-4 hours
Input: Prioritized separation tasks, Employee transition plan, Separation RACI, Costs for activities, Activity owners, M&A goals
Output: Separation-specific metrics to measure success
Materials: Separation roadmap, M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Transition team
The purpose of this activity is to understand how to measure the success of the separation project by aligning metrics to each identified task.
Record the results in the M&A Sell Playbook.
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|
|
|
|
Pre-Work | Day 1 | Day 2 | Day 3 | Engage in Separation | Day 4 | |
| Establish the Transaction Foundation | Discover the Motivation for Integration | Plan the Separation Roadmap | Prepare Employees for the Transition | Engage in Separation | Assess the Transaction Outcomes (Must be within 30 days of transaction date) | |
Activities |
|
|
|
|
|
|
Deliverables |
|
|
|
|
|
|
Once the transaction comes to a close, it’s time for IT to deliver on the critical separation tasks. As the selling organization in this transaction, you need to ensure you have a roadmap that properly enables the ongoing delivery of your IT environment while simultaneously delivering the necessary services to the purchasing organization.
Throughout the separation transaction, some of the most common obstacles IT should prepare for include difficulty separating the IT environment, loss of key personnel, disengaged employees, and security/compliance issues.
Post-transaction, the business needs to understands the value they received by engaging in the transaction and the ongoing revenue they might obtain as a result of the sale. You also need to ensure that the IT environment is functioning and mitigating any high-risk outcomes.
Goal: To carry out the planned separation activities and deliver the intended value to the business.
Before coming into the Execution & Value Realization phase, you must have addressed the following:
Before coming into the Execution & Value Realization phase, we recommend addressing the following:
Successfully execute the separation of the IT environments and update the project plan, strategizing against any roadblocks as they come.
If you are entering the transaction at this point, consider and monitor the following three items above all else.
Your IT environment, reputation as an IT leader, and impact on key staff will depend on monitoring these aspects.
For more information, review:
Input: Original service agreement, Risk register
Output: Service agreement confirmed
Materials: Original service agreement
Participants: IT executive/CIO, IT senior leadership, External organization IT senior leadership
The purpose of this activity is to monitor the established service agreements on an ongoing basis. Your organization is most at risk during the initial months following the transaction.
For additional information and support for this activity, see the blueprint Build an IT Risk Management Program.
Input: Prioritized separation tasks, Separation RACI, Activity owners
Output: Updated separation project plan
Materials: M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel)
Participants: IT executive/CIO, IT senior leadership, IT transaction team, Company M&A team
The purpose of this activity is to ensure that the project plan is continuously updated as your transaction team continues to execute on the various components outlined in the project plan.
Record the updates in the M&A Separation Project Management Tool (SharePoint).
Record the updates in the M&A Separation Project Management Tool (Excel).
Review the value that IT was able to generate around the transaction and strategize about how to improve future selling or separating transactions.
3-4 hours
Input: Separation tasks, Carve-out roadmap, Transition team, Previous RACI, Estimated separation costs
Output: Actual separation costs
Materials: M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Transaction team, Company M&A team
The purpose of this activity is to confirm the associated costs around separation. While the separation costs would have been estimated previously, it’s important to confirm the costs that were associated with the separation in order to provide an accurate and up-to-date report to the company’s M&A team.
Record the results in the M&A Sell Playbook.
Throughout the transaction, the business would have communicated its goals, rationales, and expectations for the transaction. Sometimes this is done explicitly, and other times the information is implicit. Either way, IT needs to ensure that metrics have been defined and are measuring the intended value that the business expects. Ensure that the benefits realized to the organization are being communicated regularly and frequently.
3-4 hours
Input: Prioritized separation tasks, Separation RACI, Activity owners, M&A company goals
Output: Transaction value
Materials: M&A Sell Playbook
Participants: IT executive/CIO, IT senior leadership, Company's M&A team
The purpose of this activity is to track how your IT organization performed against the originally identified metrics.
Record the results in the M&A Sell Playbook.
2 hours
Input: Separation costs, Retention rates, Value that IT contributed to the transaction
Output: Strengths, weaknesses, opportunities, and threats
Materials: Flip charts, Markers, Sticky notes
Participants: IT executive/CIO, IT senior leadership, Business transaction team
The purpose of this activity is to assess the positive and negative elements of the transaction.
Record the results in the M&A Sell Playbook.
4 hours
Input: Transaction and separation SWOT
Output: Refined M&A playbook
Materials: M&A Sell Playbook
Participants: IT executive/CIO
The purpose of this activity is to revise the playbook and ensure it is ready to go for future transactions.
Record the results in the M&A Sell Playbook.
Congratulations, you have completed the M&A Sell Blueprint!
Rather than reacting to a transaction, you have been proactive in tackling this initiative. You now have a process to fall back on in which you can be an innovative IT leader by suggesting how and why the business should engage in a separation or sale transaction. You have:
Now that you have done all of this, reflect on what went well and what can be improved if you were to engage in a similar divestiture or sale again.
| Ibrahim Abdel-Kader
Research Analyst | CIO Info-Tech Research Group |
Brittany Lutes
Senior Research Analyst | CIO Info-Tech Research Group |
|
| John Annand
Principal Research Director | Infrastructure Info-Tech Research Group |
Scott Bickley
Principal Research Director | Vendor Management Info-Tech Research Group |
|
| Cole Cioran
Practice Lead | Applications Info-Tech Research Group |
Dana Daher
Research Analyst | Strategy & Innovation Info-Tech Research Group |
|
| Eric Dolinar
Manager | M&A Consulting Deloitte Canada |
Christoph Egel
Director, Solution Design & Deliver Cooper Tire & Rubber Company |
|
| Nora Fisher
Vice President | Executive Services Advisory Info-Tech Research Group |
Larry Fretz
Vice President | Industry Info-Tech Research Group |
| David Glazer
Vice President of Analytics Kroll |
Jack Hakimian
Senior Vice President | Workshops and Delivery Info-Tech Research Group |
|
| Gord Harrison
Senior Vice President | Research & Advisory Info-Tech Research Group |
Valence Howden
Principal Research Director | CIO Info-Tech Research Group |
|
| Jennifer Jones
Research Director | Industry Info-Tech Research Group |
Nancy McCuaig
Senior Vice President | Chief Technology and Data Office IGM Financial Inc. |
|
| Carlene McCubbin
Practice Lead | CIO Info-Tech Research Group |
Kenneth McGee
Research Fellow | Strategy & Innovation Info-Tech Research Group |
|
| Nayma Naser
Associate Deloitte |
Andy Neill
Practice Lead | Data & Analytics, Enterprise Architecture Info-Tech Research Group |
| Rick Pittman
Vice President | Research Info-Tech Research Group |
Rocco Rao
Research Director | Industry Info-Tech Research Group |
|
| Mark Rosa
Senior Vice President & Chief Information Officer Mohegan Gaming and Entertainment |
Tracy-Lynn Reid
Research Lead | People & Leadership Info-Tech Research Group |
|
| Jim Robson
Senior Vice President | Shared Enterprise Services (retired) Great-West Life |
Steven Schmidt
Senior Managing Partner Advisory | Executive Services Info-Tech Research Group |
|
| Nikki Seventikidis
Senior Manager | Finance Initiative & Continuous Improvement CST Consultants Inc. |
Allison Straker
Research Director | CIO Info-Tech Research Group |
|
| Justin Waelz
Senior Network & Systems Administrator Info-Tech Research Group |
Sallie Wright
Executive Counselor Info-Tech Research Group |
“5 Ways for CIOs to Accelerate Value During Mergers and Acquisitions.” Okta, n.d. Web.
Altintepe, Hakan. “Mergers and acquisitions speed up digital transformation.” CIO.com, 27 July 2018. Web.
“America’s elite law firms are booming.” The Economist, 15 July 2021. Web.
Barbaglia, Pamela, and Joshua Franklin. “Global M&A sets Q1 record as dealmakers shape post-COVID world.” Nasdaq, 1 April 2021. Web.
Boyce, Paul. “Mergers and Acquisitions Definition: Types, Advantages, and Disadvantages.” BoyceWire, 8 Oct. 2020. Web.
Bradt, George. “83% Of Mergers Fail -- Leverage A 100-Day Action Plan For Success Instead.” Forbes, 27 Jan. 2015. Web.
Capgemini. “Mergers and Acquisitions: Get CIOs, IT Leaders Involved Early.” Channel e2e, 19 June 2020. Web.
Chandra, Sumit, et al. “Make Or Break: The Critical Role Of IT In Post-Merger Integration.” IMAA Institute, 2016. Web.
Deloitte. “How to Calculate Technical Debt.” The Wall Street Journal, 21 Jan. 2015. Web.
Ernst & Young. “IT As A Driver Of M&A Success.” IMAA Institute, 2017. Web.
Fernandes, Nuno. “M&As In 2021: How To Improve The Odds Of A Successful Deal.” Forbes, 23 March 2021. Web.
“Five steps to a better 'technology fit' in mergers and acquisitions.” BCS, 7 Nov. 2019. Web.
Fricke, Pierre. “The Biggest Opportunity You’re Missing During an M&Aamp; IT Integration.” Rackspace, 4 Nov. 2020. Web.
Garrison, David W. “Most Mergers Fail Because People Aren't Boxes.” Forbes, 24 June 2019. Web.
Harroch, Richard. “What You Need To Know About Mergers & Acquisitions: 12 Key Considerations When Selling Your Company.” Forbes, 27 Aug. 2018. Web.
Hope, Michele. “M&A Integration: New Ways To Contain The IT Cost Of Mergers, Acquisitions And Migrations.” Iron Mountain, n.d. Web.
“How Agile Project Management Principles Can Modernize M&A.” Business.com, 13 April 2020. Web.
Hull, Patrick. “Answer 4 Questions to Get a Great Mission Statement.” Forbes, 10 Jan. 2013. Web.
Kanter, Rosabeth Moss. “What We Can Learn About Unity from Hostile Takeovers.” Harvard Business Review, 12 Nov. 2020. Web.
Koller, Tim, et al. “Valuation: Measuring and Managing the Value of Companies, 7th edition.” McKinsey & Company, 2020. Web.
Labate, John. “M&A Alternatives Take Center Stage: Survey.” The Wall Street Journal, 30 Oct. 2020. Web.
Lerner, Maya Ber. “How to Calculate ROI on Infrastructure Automation.” DevOps.com, 1 July 2020. Web.
Loten, Angus. “Companies Without a Tech Plan in M&A Deals Face Higher IT Costs.” The Wall Street Journal, 18 June 2019. Web.
Low, Jia Jen. “Tackling the tech integration challenge of mergers today” Tech HQ, 6 Jan. 2020. Web.
Lucas, Suzanne. “5 Reasons Turnover Should Scare You.” Inc. 22 March 2013. Web.
“M&A Trends Survey: The future of M&A. Deal trends in a changing world.” Deloitte, Oct. 2020. Web.
Maheshwari, Adi, and Manish Dabas. “Six strategies tech companies are using for successful divesting.” EY, 1 Aug. 2020. Web.
Majaski, Christina. “Mergers and Acquisitions: What's the Difference?” Investopedia, 30 Apr. 2021.
“Mergers & Acquisitions: Top 5 Technology Considerations.” Teksetra, 21 Jul. 2020. Web.
“Mergers Acquisitions M&A Process.” Corporate Finance Institute, n.d. Web.
“Mergers and acquisitions: A means to gain technology and expertise.” DLA Piper, 2020. Web.
Nash, Kim S. “CIOs Take Larger Role in Pre-IPO Prep Work.” The Wall Street Journal, 5 March 2015. Web.
O'Connell, Sean, et al. “Divestitures: How to Invest for Success.” McKinsey, 1 Aug. 2015. Web
Paszti, Laila. “Canada: Emerging Trends In Information Technology (IT) Mergers And Acquisitions.” Mondaq, 24 Oct. 2019. Web.
Patel, Kiison. “The 8 Biggest M&A Failures of All Time” Deal Room, 9 Sept. 2021. Web.
Peek, Sean, and Paula Fernandes. “What Is a Vision Statement?” Business News Daily, 7 May 2020. Web.
Ravid, Barak. “How divestments can re-energize the technology growth story.” EY, 14 July 2021. Web.
Ravid, Barak. “Tech execs focus on growth amid increasingly competitive M&A market.” EY, 28 April 2021. Web.
Resch, Scott. “5 Questions with a Mergers & Acquisitions Expert.” CIO, 25 June 2019. Web.
Salsberg, Brian. “Four tips for estimating one-time M&A integration costs.” EY, 17 Oct. 2019. Web.
Samuels, Mark. “Mergers and acquisitions: Five ways tech can smooth the way.” ZDNet, 15 Aug. 2018. Web.
“SAP Divestiture Projects: Options, Approach and Challenges.” Cognizant, May, 2014. Web.
Steeves, Dave. “7 Rules for Surviving a Merger & Acquisition Technology Integration.” Steeves and Associates, 5 Feb. 2020. Web.
Tanaszi, Margaret. “Calculating IT Value in Business Terms.” CSO, 27 May 2004. Web.
“The CIO Playbook. Nine Steps CIOs Must Take For Successful Divestitures.” SNP, 2016. Web.
“The Role of IT in Supporting Mergers and Acquisitions.” Cognizant, Feb. 2015. Web.
Torres, Roberto. “M&A playbook: How to prepare for the cost, staff and tech hurdles.” CIO Dive, 14 Nov. 2019. Web.
“Valuation Methods.” Corporate Finance Institute, n.d. Web.
Weller, Joe. “The Ultimate Guide to the M&A Process for Buyers and Sellers.” Smartsheet, 16 May 2019. Web.
A common understanding of risks, threats, and opportunities gives organizations the flexibility and agility to adapt to changing business conditions and drive corporate value.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Learn how to develop an IT risk taxonomy that will remain relevant over time while providing the granularity and clarity needed to make more effective risk-based decisions.
Leverage these tools as a starting point to develop risk levels and definitions appropriate to your organization. Take a collaborative approach when developing your IT risk taxonomy to gain greater acceptance and understanding of accountability.
Use this workbook to document outcomes of activities and brainstorming sessions.
Leverage this tool to document risk levels, risk events, and controls. Smaller organizations can leverage this tool for risk management while larger organizations may find this tool useful to structure and define risks prior to using a risk management software tool.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Review IT risk fundamentals and governance.
Learn how enterprise risk management and IT risk management intersect and the role the IT taxonomy plays in integrated risk management.
1.1 Discuss risk fundamentals and the benefits of integrated risk.
1.2 Create a cross-functional IT taxonomy working group.
IT Risk Taxonomy Committee Charter Template
Build an IT Risk Taxonomy Workbook
Identify suitable IT level 1 risk types.
Level 1 IT risk types are determined and have been tested against ERM level one risk types.
2.1 Discuss corporate strategy, business risks, macro trends, and organizational opportunities and constraints.
2.2 Establish level 1 risk types.
2.3 Test soundness of IT level 1 types by mapping to ERM level 1 types.
Build an IT Risk Taxonomy Workbook
Define level 2 and level 3 risk types.
Level 2 and level 3 risk types have been determined.
3.1 Establish level 2 risk types.
3.2 Establish level 3 risk types (and level 4 if appropriate for your organization).
3.3 Begin to test by working backward from controls to ensure risk events will aggregate consistently.
Build an IT Risk Taxonomy Design Template
Risk Register Tool
Test the robustness of your IT risk taxonomy by populating the risk register with risk events and controls.
Your IT risk taxonomy has been tested and your risk register has been updated.
4.1 Continue to test robustness of taxonomy and iterate if necessary.
4.2 Optional activity: Draft your IT risk appetite statements.
4.3 Discuss communication and continual improvement plan.
Build an IT Risk Taxonomy Design Template
Risk Register Tool
Build an IT Risk Taxonomy Workbook
|
The pace and uncertainty of the current business environment introduce new and emerging vulnerabilities that can disrupt an organization’s strategy on short notice. Having a long-term view of risk while navigating the short term requires discipline and a robust and strategic approach to risk management. Managing emerging risks such as climate risk, the impact of digital disruption on internal technology, and the greater use of third parties will require IT leaders to be more disciplined in how they manage and communicate material risks to the enterprise. Establishing a hierarchical common language of IT risks through a taxonomy will facilitate true aggregation and integration of risks, enabling more effective decision making. This holistic, disciplined approach to risk management helps to promote a more sustainable risk culture across the organization while adding greater rigor at the IT control level. Donna Bales |
|
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|---|---|---|
|
IT has several challenges when managing and responding to risk events:
|
Many IT organizations encounter obstacles in these areas:
. |
|
Info-Tech Insight
A common understanding of risks, threats, and opportunities gives organizations the flexibility and agility to adapt to changing business conditions and drive corporate value.
The risk landscape is continually evolving, putting greater pressure on the risk function to work collaboratively throughout the organization to strengthen operational resilience and minimize strategic, financial, and reputational impact.
|
Financial Impact |
Strategic Risk |
Reputation Risk |
|---|---|---|
|
In IBM’s 2021 Cost of a Data Breach Report, the Ponemon Institute found that data security breaches now cost companies $4.24 million per incident on average – the highest cost in the 17-year history of the report. |
58% percent of CROs who view inability to manage cyber risks as a top strategic risk. EY’s 2022 Global Bank Risk Management survey revealed that Chief Risk Officers (CROs) view the inability to manage cyber risk and the inability to manage cloud and data risk as the top strategic risks. |
Protiviti’s 2023 Executive Perspectives on Top Risks survey featured operational resilience within its top ten risks. An organization’s failure to be sufficiently resilient or agile in a crisis can significantly impact operations and reputation. |
Organizations should not underestimate the long-term impact on corporate performance if emerging risks are not fully understood, controlled, and embedded into decision-making.
|
Talent Risk |
Sustainability |
Digital Disruption |
|---|---|---|
|
Protiviti’s 2023 Executive Perspectives on Top Risks survey revealed talent risk as the top risk organizations face, specifically organizations’ ability to attract and retain top talent. Of the 38 risks in the survey, it was the only risk issue rated at a “significant impact” level. |
Sustainability is at the top of the risk agenda for many organizations. In EY’s 2022 Global Bank Risk Management survey, environmental, social, and governance (ESG) risks were identified as a risk focus area, with 84% anticipating it to increase in priority over the next three years. Yet Info-Tech’s Tech Trends 2023 report revealed that only 24% of organizations could accurately report on their carbon footprint. Source: Info-Tech 2023 Tech Trends Report |
The risks related to digital disruption are vast and evolving. In the short term, risks surface in compliance and skills shortage, but Protiviti’s 2023 Executive Perspectives survey shows that in the longer term, executives are concerned that the speed of change and market forces may outpace an organization’s ability to compete. |

|
IT Benefits |
Business Benefits |
|---|---|
|
|
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
|
IT Risk Taxonomy Committee Charter Template Create a cross-functional IT risk taxonomy committee. |
|
Build an IT Risk Taxonomy Guideline Use IT risk taxonomy as a baseline to build your organization’s approach. |
|
|
Build an IT Risk Taxonomy Design Template Use this template to design and test your taxonomy. |
|
Risk Register Tool Update your risk register with your IT risk taxonomy. |
|
Build an IT Risk Taxonomy Workbook
Use the tools and activities in each phase of the blueprint to customize your IT risk taxonomy to suit your organization’s needs.
As a part of our research process, we used the COSO, ISO 31000, and COBIT 2019 frameworks. Contextualizing IT risk management within these frameworks ensures that our project-focused approach is grounded in industry-leading best practices for managing IT risk.
|
COSO’s Enterprise Risk Management —Integrating with Strategy and Performance addresses the evolution of enterprise risk management and the need for organizations to improve their approach to managing risk to meet the demands of an evolving business environment. |
ISO 31000 – Risk Management can help organizations increase the likelihood of achieving objectives, improve the identification of opportunities and threats, and effectively allocate and use resources for risk treatment. |
COBIT 2019’s IT functions were used to develop and refine the ten IT risk categories used in our top-down risk identification methodology. |
DIY Toolkit“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” |
Guided Implementation“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” |
Workshop“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” |
Consulting“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.” |
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
|
Call #1: Review risk management fundamentals. |
Call #2: Review the role of an IT risk taxonomy in risk management. Call #3: Establish a cross-functional team. |
Calls #4-5: Identify level 1 IT risk types. Test against enterprise risk management. Call #6: Identify level 2 and level 3 risk types. Call #7: Align risk events and controls to level 3 risk types and test. Call #8: Update your risk register and communicate taxonomy internally. |
A Guided Implementation (GI) is a series
of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 6 to 8 calls over the course of 3 to 6 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
|
Review IT Risk Fundamentals and Governance |
Identify Level 1 IT Risk Types |
Identify Level 2 and Level 3 Risk Types |
Monitor, Report, and Respond to IT Risk |
Next Steps and |
|
| Activities |
1.1 Discuss risk fundamentals and the benefits of integrated risk. 1.2 Create a cross-functional IT taxonomy working group. |
2.1 Discuss corporate strategy, business risks, macro trends, and organizational opportunities and constraints. 2.2 Establish level 1 risk types. 2.3 Test soundness of IT level 1 types by mapping to ERM level 1 types. |
3.1 Establish level 2 risk types. 3.2 Establish level 3 risk types (and level 4 if appropriate for your organization). 3.3 Begin to test by working backward from controls to ensure risk events will aggregate consistently. |
4.1 Continue to test robustness of taxonomy and iterate if necessary. 4.2 Optional activity: Draft your IT risk appetite statements. 4.3 Discuss communication and continual improvement plan. |
5.1 Complete in-progress deliverables from previous four days. 5.2 Set up review time for workshop deliverables and to discuss next steps. |
| Deliverables |
|
|
|
|
|
|
Phase 1 |
Phase 2 |
Phase 3 |
|---|---|---|
|
|
|
GRC principles are important tools to support enterprise management.
Governance sets the guardrails to ensure that the enterprise is in alignment with standards, regulations, and board decisions. A governance framework will communicate rules and expectations throughout the organization and monitor adherence.
Risk management is how the organization protects and creates enterprise value. It is an integral part of an organization’s processes and enables a structured decision-making approach.
Compliance is the process of adhering to a set of guidelines; these could be external regulations and guidelines or internal corporate policies.
GRC principles are tightly bound and continuous
Regardless of size or structure, every organization makes strategic and operational decisions that expose it to uncertainties.
Enterprise risk management (ERM) is a strategic business discipline that supports the achievement of an organization’s objectives by addressing the full spectrum of its risks and managing the combined impact of those risks as an interrelated risk portfolio (RIMS).
An ERM is program is crucial because it will:
ERM is supported by strategy, effective processes, technology, and people
Risk frameworks are leveraged by the industry to “provide a structure and set of definitions to allow enterprises of all types and sizes to understand and better manage their risk environments.” COSO Enterprise Risk Management, 2nd edition
New NIST guidance (NISTIR 8286) emphasizes the complexity of risk management and the need for the risk management process to be carried out seamlessly across three tiers with the overall objective of continuous improvement.
“The amount of risk an organization is willing to take in pursuit of its objectives”
Change or new risks » adjust enterprise risk profile » adjust risk appetite
Risk profile is the broad parameters an organization considers in executing its business strategy. Risk appetite is the amount of risk an entity is willing to accept in pursuit of its strategic objectives. The risk appetite can be used to inform the risk profile or vice versa. Your organization’s risk culture informs and is used to communicate both.
|
Risk Tolerant |
Moderate |
Risk Averse |
|---|---|---|
|
|
|
The risk appetite has a risk lens but is also closely linked to corporate performance.
|
Risk Appetite |
Risk Tolerance |
|---|---|
|
|
Risk scenarios serve two main purposes: to help decision makers understand how adverse events can affect organizational strategy and objectives and to prepare a framework for risk analysis by clearly defining and decomposing the factors contributing to the frequency and the magnitude of adverse events.
Top-down approach – driven by the business by determining the business impact, i.e. what is the impact on my customers, reputation, and bottom line if the system that supports payment processing fails?
Bottom-up approach – driven by IT by identifying critical assets and what harm could happen if they were to fail.
Use level 1 IT risks to derive potential scenarios.
|
Risk Scenario Description |
Example: IT Risks |
|
|---|---|---|
|
Risk Scenario Title |
A brief description of the risk scenario |
The enterprise is unable to recruit and retain IT staff |
|
Risk Type |
The process or system that is impacted by the risk |
|
|
Risk Scenario Category |
Deeper insight into how the risk might impact business functions |
|
|
Risk Statement |
Used to communicate the potential adverse outcomes of a particular risk event and can be used to communicate to stakeholders to enable informed decisions |
The organization chronically fails to recruit sufficiently skilled IT workers, leading to a loss of efficiency in overall technology operation and an increased security exposure. |
|
Risk Owner |
The designated party responsible and accountable for ensuring that the risk is maintained in accordance with enterprise requirements |
|
|
Risk Oversight |
The person (role) who is responsible for risk assessments, monitoring, documenting risk response, and establishing key risk indicators |
CRO/COO |
Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
|
|
|
This phase will walk you through the following activities:
This phase involves the following participants:
Typical Tree Structure
Integrated risk management: A strategic and collaborative way to manage risks across the organization. It is a forward-looking, business-specific outlook with the objective of improving risk visibility and culture.
Drivers for Integrated Risk Management
Benefits of Integrated Risk Management
Business velocity and complexity are making real-time risk management a business necessity.
The risk taxonomy provides a common classification of risks that allows risks to roll up systematically to enterprise risk, enabling more effective risk responses and more informed decision making.
Operational resilience will often feature in ERM frameworks in organizations that deliver critical services, products, or functions, such as financial services
Although many organizations have expanded their enterprise risk management taxonomies to address new threats, most organizations will have the following level 1 risk types:
|
ERM Level 1 |
Definition |
Definition Source |
|---|---|---|
|
Financial |
The ability to obtain sufficient and timely funding capacity. |
Global Association of Risk Professionals (GARP) |
|
Non-Financial |
Non-financial risks are risks that are not considered to be traditional financial risks such as operational risk, technology risk, culture and conduct. |
Office of the Superintendent of Financial Institutions (OSFI) |
|
Reputational |
Potential negative publicity regarding business practices regardless of validity. |
US Federal Reserve Global Association of Risk Professionals (GARP) |
|
Strategic |
Risk of unsuccessful business performance due to internal or external uncertainties, whether the event is event or trend driven. Actions or events that adversely impact an organizations strategies and/or implementation of its strategies. |
The Risk Management Society (RIMS) |
|
Sustainability (ESG) |
This risk of any negative financial or reputational impact on an organizations stemming from current or prospective impacts of ESG factors on its counterparties or invested assets. |
Open Risk Manual Info-Tech Research Group |
|
Talent and Risk Culture |
The widespread behaviors and mindsets that can threaten sound decision-making, prudent risk-taking, and effective risk management and can weaken an institution’s financial and operational resilience. |
Info-Tech Research Group |
Some large organizations will elevate certain operational risks to level 1 organizational risks due to risk materiality.
Every organization will approach its risk management taxonomy differently; the number of level 1 risk types will vary and depend highly on perceived impact.
Some of the reasons why an organization would elevate a risk to a level 1 ERM risk are:
|
Level 1 |
Potential Rationale |
Industries |
Risk Definition |
|---|---|---|---|
|
Advanced Analytics |
Use of advanced analytics is considered material |
Large Enterprise, Marketing |
Risks involved with model risk and emerging risks posed by artificial intelligence/machine learning. |
|
Anti-Money Laundering (AML) and Fraud |
Risk is viewed as material |
Financial Services, Gaming, Real Estate |
The risk of exposure to financial crime and fraud. |
|
Conduct Risk |
Sector-specific risk type |
Financial Services |
The current or prospective risk of losses to an institution arising from inappropriate supply of financial services including cases of willful or negligent misconduct. |
|
Operational Resiliency |
Sector-specific risk type |
Financial Services, ICT |
Organizational risk resulting from an organization’s failure to deliver its operations, including its critical operations, through disruption. |
|
Privacy |
Board driven – perceived as material risk to organization |
Healthcare, Financial Services |
The potential loss of control over personal information. |
|
Information Security |
Board driven – regulatory focus |
All may consider |
The people, processes, and technology involved in protecting data (information) in any form – whether digital or on paper – through its creation, storage, transmission, exchange, and destruction. |
Rolling Up Risks to a Portfolio View
Commingling risk data is a major challenge when developing a risk taxonomy, but one of the underlying reasons is that the enterprise and IT look at risk from different dimensions.
|
↔ |
|
Establish a cross-functional working group.
|
Governance Layer |
Role/ Responsibilities |
|---|---|
|
Enterprise Defines organizational goals. Directs or regulates the performance and behavior of the enterprise, ensuring it has the structure and capabilities to achieve its goals. |
Enterprise Risk Council
|
|
Strategic Ensures business and IT initiatives, products, and services are aligned to the organization’s goals and strategy and provide expected value. Ensures adherence to key principles. |
IT Risk Council
|
|
Tactical Ensures key activities and planning are in place to execute strategic initiatives. |
Subcommittee
|
2-3 hours
Download Build an IT Risk Taxonomy Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
|
|
|
This phase will walk you through the following activities:
This phase involves the following participants:
Do’s
Don’ts
A successful risk taxonomy is forward looking and codifies the most frequently used risk language across your organization.
Level 1
Parent risk types aligned to organizational values
Level 2
Subrisks to level 1 risks
Level 3
Further definition
Step 1
Leverage Info-Tech’s Build an IT Risk Taxonomy Guideline and identify IT level 1 risk types. Consider corporate inputs and macro trends.
Step 2
Test level 1 IT risk types by mapping to your enterprise's ERM level 1 risk types.
Step 3
Draft your level 2 and level 3 risk types. Be mutually exclusive to the extent possible.
Step 4
Work backward – align risk events and controls to the lowest level risk category. In our examples, we align to level 3.
Step 5
Add risk levels to your risk registry.
Step 6
Optional – Add IT risk appetite statements to risk register.
To help you define your IT risk taxonomy, leverage your organization’s strategy and risk management artifacts, such as outputs from risk assessments, audits, and test results. Also consider macro trends and potential risks unique to your organization.
Step 1 – Define Level 1 Risk Types
Use corporate inputs to help structure your taxonomy
Consider macro trends that may have an impact on how you manage IT risks
Ask risk-based questions to help define level 1 IT risks for your organization.
IT Risk Type | Example Questions |
|---|---|
Technology | How reliant is our organization on critical assets for business operations? How resilient is the organization to an unexpected crisis? How many planned integrations do we have (over the next 24 months)? |
Talent Risk | What is our need for specialized skills, like digital, AI, etc.? Does our culture support change and innovation? How susceptible is our organization to labor market changes? |
Strategy | What is the extent of digital adoption or use of emerging technologies in our organization? How aligned is IT with strategy/corporate goals? How much is our business dependent on changing customer preferences? |
| Data | How much sensitive data does our organization use? How much data is used and stored aggregately? How often is data moved? And to what locations? |
Third-party | How many third-party suppliers do we have? How reliant are we on the global supply chain? What is the maturity level of our third-party suppliers? Do we have any concentration risk? |
Security | How equipped is our organization to manage cyber threats? How many security incidents occur per year/quarter/day? Do we have regulatory obligations? Is there risk of enforcement action? |
Step 2 – Consider your organization’s strategy and areas where risks may manifest and use this guidance to advance your thinking. Many factors may influence your taxonomy structure, including internal organizational structure, the size of your organization, industry trends and organizational context, etc.
Most IT organizations will include these level 1 risks in their IT risk taxonomy
IT Level 1 | Definition | Definition Source | |
|---|---|---|---|
Technology | Risk arising from the inadequacy, disruption, destruction, failure, damage from unauthorized access modifications, or malicious use of information technology assets, people or processes that enable and support business needs, and can result in financial loss and/or reputational damage. | Open Risk Manual | Note how this definition by OSFI includes cyber risk as part of technology risk. Smaller organizations and organizations that do not use large amounts of sensitive information will typically fold cyber risks under technology risks. Not all organizations will take this approach. Some organizations may elevate security risk to level 1. |
“Technology risk”, which includes “cyber risk”, refers to the risk arising from the inadequacy, disruption, destruction, failure, damage from unauthorized access, modifications, or malicious use of information technology assets, people or processes that enable and support business needs, and can result in financial loss and/or reputational damage. | Office of the Superintendent of Financial Institutions (OSFI) | ||
Talent | The risk of not having the right knowledge and skills to execute strategy. | Info-Tech Research Group/McLean & Company | Human capital challenges including succession challenges and the ability to attract and retain top talent are considered the most dominant risk to organizations’ ability to meet their value proposition (Protiviti, 2023). |
| Strategic | Risks that threaten IT’s ability to deliver expected business outcomes. | Info-Tech Research Group | IT’s role as strategic enabler to the business has never been so vital. With the speed of disruptive innovation, IT must be able to monitor alignment, support opportunities, and manage unexpected crises. |
Step 2 – Large and more complex organizations may have more level 1 risk types. Variances in approaches are closely linked to the type of industry and business in which the organization operates as well as how they view and position risks within their organization.
IT Level 1 | Definition | Definition Source | |
|---|---|---|---|
Data | Data risk is the exposure to loss of value or reputation caused by issues or limitations to an organization’s ability to acquire, store, transform, move, and use its data assets. | Deloitte | |
Data risk encompasses the risk of loss value or reputation resulting from inadequate or failed internal processes, people and systems or from external events impacting on data. | Australian Prudential Regulation Authority (APRA) CPG 235 -2013) | Data is increasingly being used for strategic growth initiatives as well as for meeting regulatory requirements. Organizations that use a lot of data or specifically sensitive information will likely have data as a level 1 IT risk type. | |
Third-Party | The risk adversely impacting the institutions performance by engaging a third party, or their associated downstream and upstream partners or another group entity (intragroup outsourcing) to provide IT systems or related services. | European Banking Association (EBA) Open Risk Manual uses EBA definition | Third-party risk (supply chain risk) received heightened attention during COVID-19. If your IT organization is heavily reliant on third parties, you may want to consider elevating third-party risk to level 1. |
Security | The risk of unauthorized access to IT systems and data from within or outside the institution (e.g., cyber-attacks). An incident is viewed as a series of events that adversely affects the information assets of an organization. The overall narrative of this type of risk event is captured as who, did what, to what (or whom), with what result. | Open Risk Manual | Some organizations and industries are subject to regulatory obligations, which typically means the board has strict oversight and will elevate security risk to a level 1. |
Deciding placement in taxonomy
|
Global Enterprise |
Midmarket |
|||
|---|---|---|---|---|
|
Privacy Requirement |
What Is Involved |
Accountable |
Responsible |
Accountable & Responsible |
|
Privacy Legal and Compliance Obligations |
|
Privacy Officer (Legal) |
Privacy Officer (Legal) |
|
|
Privacy Policy, Standards, and Governance |
|
Chief Risk Officer (Risk) |
Head of Risk Function |
|
|
Data Classification and Security Standards and Best-Practice Capabilities |
|
Chief Information Security Officer (IT) |
Chief Information Security Officer (IT) |
|
|
Technical Application of Data Classification, Management and Security Standards |
|
Chief Information Officer (IT) |
Chief Data Architect (IT) |
Chief Information Officer (IT) |
|
Data Management Standards and Best-Practice Capabilities |
|
Chief Data Officer |
Where no Head of Data Exists and IT, not the business, is seen as de facto owner of data and data quality |
|
|
Execution of Data Management |
|
L1 Business Process Owner |
L2 Business Process Owner |
|
Definitional Nuances
“Cybersecurity” describes the technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access.
“IT security” describes a function as well as a method of implementing policies, procedures, and systems to defend the confidentiality, integrity, and availability of any digital information used, transmitted, or stored throughout the organization’s environment.
“Information security” defines the people, processes, and technology involved in protecting data (information) in any form – whether digital or on paper – through its creation, storage, transmission, exchange, and destruction.
2-3 hours
Download Build an IT Risk Taxonomy Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
1-2 hours
Download Build an IT Risk Taxonomy Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Test your level 1 IT risk types by mapping to your organization’s level 1 risk types.
Step 2 – Map IT level 1 risk types to ERM
3-4 hours
Note: Smaller organizations may only define two risk levels, while larger organizations may define further to level 4.
Download Build an IT Risk Taxonomy Design Template
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Step 3 – Break down your level 1 risk types into subcategories. This is complicated and may take many iterations to reach a consistent and accepted approach. Try to make your definitions intuitive and easy to understand so that they will endure the test of time.
Security vulnerabilities often surface through third parties, but where and how you manage this risk is highly dependent on how you structure your taxonomy. Organizations with a lot of exposure may have a dedicated team and may manage and report security risks under a level 1 third-party risk type.
Step 3 – Break down your level 2 risk types into lower-level subcategories. The number of levels of risk you have will depend on the size of and magnitude of risks within your organization. In our examples, we demonstrate three levels.
Risk taxonomies for smaller organizations may only include two risk levels. However, large enterprises or more complex organizations may extend their taxonomy to level 3 or even 4. This illustration shows just a few examples of level 3 risks.
Ultimately risk events and controls need to roll up to level 1 risks in a consistent manner. Test the robustness of your taxonomy by working backward.
Step 4 – Work backward to test and align risk events and controls to the lowest level risk category.
Example – Third Party Risk
2-3 hours
Download Build an IT Risk Taxonomy Design Template
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Step 5 – Once you are satisfied with your risk categories, update your risk registry with your IT risk taxonomy.
Use Info-Tech’s Risk Register Tool or populate your internal risk software tool.
Download Info-Tech’s Risk Register Tool
Other industry-leading frameworks provide alternative ways of conceptualizing the functions and responsibilities of IT and may help you uncover additional risk events.
Example IT Risk Appetite Statement | ||
|---|---|---|
Risk Type | Technology Risk | IT should establish a risk appetite statement for each level 1 IT risk type. |
Appetite Statement | Our organization’s number-one priority is to provide high-quality trusted service to our customers. To meet this objective, critical systems must be highly performant and well protected from potential threats. To meet this objective, the following expectations have been established:
| The ideal risk appetite statement is qualitative and supported by quantitative measures. |
Risk Owner | Chief Information Officer | Ultimately, there is an accountable owner(s), but involve business and technology stakeholders when drafting to gain consensus. |
Risk Oversight | Enterprise Risk Committee | |
Supporting Framework(s) | Business Continuity Management, Information Security, Internal Audit | The number of supporting programs and frameworks will vary with the size of the organization. |
Optional Activity
2-3 hours
Download Build an IT Risk Taxonomy Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
1-2 hours
To gain acceptance of your risk taxonomy within your organization, ensure it is well understood and used throughout the organization.
Coming soon: Look for our upcoming research Communicate Any IT Initiative.
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Build an IT Risk Management Program
Integrate IT Risk Into Enterprise Risk
Coming Soon: Communicate Any IT initiative
| Term | Description |
|---|---|
| Emergent Risk | Risks that are poorly understood but expected to grow in significance. |
| Residual Risk | The amount of risk you have left after you have removed a source of risk or implemented a mitigation approach (controls, monitoring, assurance). |
| Risk Acceptance | If the risk is within the enterprise's risk tolerance or if the cost of otherwise mitigating the risk is higher than the potential loss, the enterprise can assume the risk and absorb any losses. |
| Risk Appetite | An organization’s general approach and attitude toward risk; the total exposed amount that an organization wishes to undertake on the basis of risk-return trade-offs for one or more desired and expected outcomes. |
| Risk Assessment | The process of estimating and evaluating risk. |
| Risk Avoidance | The risk response where an organization chooses not to perform a particular action or maintain an existing engagement due to the risk involved. |
| Risk Event | A risk occurrence (actual or potential) or a change of circumstances. Can consist of more than one occurrence or of something not happening. Can be referred to as an incident or accident. |
| Risk Identification | The process of finding, recognizing, describing, and documenting risks that could impact the achievement of objectives. |
| Risk Management | The capability and related activities used by an organization to identify and actively manage risks that affect its ability to achieve goals and strategic objectives. Includes principles, processes, and framework. |
| Risk Likelihood | The chance of a risk occurring. Usually measured mathematically using probability. |
| Risk Management Policy | Expresses an organization’s commitment to risk management and clarifies its use and direction. |
| Risk Mitigation | The risk response where an action is taken to reduce the impact or likelihood of a risk occurring. |
| Risk Profile | A written description of a set of risks. |
| Term | Description |
|---|---|
| Risk Opportunity | A cause/trigger of a risk with a positive outcome. |
| Risk Owner | The designated party responsible and accountable for ensuring that the risk is maintained in accordance with enterprise requirements. |
| Risk Register | A tool used to identify and document potential and active risks in an organization and to track the actions in place to manage each risk. |
| Risk Response | How you choose to respond to risk (accept, mitigate, transfer, or avoid). |
| Risk Source | The element that, alone or in combination, has potential to give rise to a risk. Usually this is the root cause of the risk. |
| Risk Statement | A description of the current conditions that may lead to the loss, and a description of the loss. |
| Risk Tolerance | The amount of risk you are prepared or able to accept (in terms of volume or impact); the amount of uncertainty an organization is willing to accept in the aggregate (or more narrowly within a certain business unit or for a specific risk category). Expressed in quantitative terms that can be monitored (such as volatility or deviation measures), risk tolerance often is communicated in terms of acceptable/unacceptable outcomes or as limited levels of risk. Risk tolerance statements identify the specific minimum and maximum levels beyond which the organization is unwilling to accept variations from the expected outcome. |
| Risk Transfer | The risk response where you transfer the risk to a third party. |
LynnAnn Brewer
Director
McLean & Company
Sandi Conrad
Principal Research Director
Info-Tech Research Group
Valence Howden
Principal Research Director
Info-Tech Research Group
John Kemp
Executive Counsellor – Executive Services
Info-Tech Research Group
Brittany Lutes
Research Director
Info-Tech Research Group
Carlene McCubbin
Practice Lead – CIO Practice
Info-Tech Research Group
Frank Sargent
Senior Workshop Director
Info-Tech Research Group
Frank Sewell
Advisory Director
Info-Tech Research Group
Ida Siahaan
Research Director
Info-Tech Research Group
Steve Willis
Practice Lead – Data Practice
Info-Tech Research Group
Andrea Tang, “Privacy Risk Management”. ISACA Journal, June 2020, Accessed January 2023
Anthony Kruizinga, “Reshaping the risk taxonomy”. PwC, April 2021, Accessed January 2023
Auditboard, "The Essentials of Integrated Risk Management (IRM)", June 2022, Accessed January 2023
Brenda Boultwood, “How to Design an ERM-Friendly Risk Data Architecture”. Global Association of Risk Professionals, February 2020, Accessed January 2023
BSI Standards Publication, "Risk Management Guidelines", ISO 31000, 2018
Dan Swinhoe, "What is Physical Security, How to keep your facilities and devices safe from onsite attackers", August 2021, Accessed January 2023
Eloise Gratton, “Data governance and privacy risk in Canada: A checklist for boards and c-suite”. Borden Ladner Gervais, November 2022 , Accessed January 2023
European Union Agency for Cyber Security Glossary
European Banking Authority, "Guidelines on ICT Risk Assessment under the Supervisory Review and Evaluation process (SREP)", September 2017, Accessed February 2023
European Banking Authority, "Regulatory Framework for Mitigating Key Resilient Risks", Sept 2018, Accessed February 2023
EY, "Seeking stability within volatility: How interdependent risks put CROs at the heart of the banking business", 12th annual EY/IFF global bank risk management survey, 2022, Accessed February 2023
Financial Stability Board, "Cyber Lexicon", November 2018, Accessed February 2023
Financial Stability Board, "Principles for Effective Risk Appetite Framework", November 2013, Accessed January 2023
Forbes Technology Council, "14 Top Data Security Risks Every Business Should Address", January 2020, Accessed January 2023
Frank Martens, Dr. Larry Rittenberg, "COSO, Risk Appetite Critical for Success, Using Risk Appetite to Thrive in a Changing World", May 2020, Accessed January 2023
Gary Stoneurmer, Alice Goguen and Alexis Feringa, "NIST, Risk Management Guide for Information Technology Systems", Special Publication, 800-30, September 2012, Accessed February 2023
Guy Pearce, "Real-World Data Resilience Demands and Integrated Approach to AI, Data Governance and the Cloud", ISACA Journal, May 2022
InfoTech Tech Trends Report, 2023
ISACA, "Getting Started with Risk Scenarios", 2022, Accessed February 2023
James Kaplan, "Creating a technology risk and cyber risk appetite framework," McKinsey & Company, August 2022, Accessed February 2023
Jean-Gregorie Manoukian, Wolters Kluwer, "Risk appetite and risk tolerance: what’s the difference?", Sept 2016, Accessed February 2023
Jennifer Bayuk, “Technology’s Role in Enterprise Risk Management”, ISACA Journal, March 2018, Accessed in February 2023
John Thackeray, "Global Association of Risk Professionals, 7 Key Elements of Effective ERM", January 2020, Accessed January 2023
KPMG, "Regulatory rigor: Managing technology and cyber risk, How FRFI’s can achieve outcomes laid out in OSFI B-13", October 2022, Accessed January 2023
Marc Chiapolino et al, “Risk and resilience priorities, as told by chief risk officers”, McKinsey and Company, December 2022, Accessed January 2023
Mike Rost, Workiva, "5 Steps to Effective Strategic Management", Updated February 2023. Accessed February 2023
NIST, "Risk Management Framework for Information Systems and Organization, The System Life Cycle Approach for Security and Privacy," December 2018, Accessed February 2023
NIST, NISTIR, "Integrating CyberSecurity and Enterprise Risk", October 2020, Accessed February 2023
Oliver Wyman, "The ORX Reference Taxonomy for operational and non-financial risk summary report", 2019, Accessed February 2023.
Office of the Superintendent of Financial Institutions, "Operational Resilience Consultation Results Summary", December 2021, Accessed January 2023
Open Risk Manual, Risk Taxonomy Definitions
Ponemon. "Cost of a Data Breach Report 2021." IBM, July 2021. Web.
Protiviti, "Executive Perspectives on Top Risks, 2023 & 2032, Key Issues being discussed in the boardroom and c-suite", February 2023, Accessed February 2023
RIMS, ISACA, "Bridging the Digital Gap, How Collaboration Between IT and Risk Management can Enhance Value Creation", September 2019, Accessed February 2023
Robert, R. Moeller, "COSO, Enterprise Risk Management, Second Edition, 2011", Accessed February 2023
Robert Putrus, "Effective Reporting to the BoD on Critical Assets, Cyberthreats and Key Controls: The Qualitative and Quantitative Model", ISACA Journal, January 2021, Accessed January 2023
Ron Brash, "Prioritizing Asset Risk Management in ICS Security", August 2020, Accessed February 2023
Ronald Van Loon, "What is Data Culture and How to Implement it?", November 2023, Accessed February 2023
SAS, "From Crisis to Opportunity, Redefining Risk Management", 2021Accessed January 2023
Satori, Cloudian, "Data Protection and Privacy: 12 Ways to Protect User Data", Accessed January 2023
Spector Information Security, "Building your Asset and Risk Register to Manage Technology Risk", November 2021, Accessed January 2023
Talend, "What is data culture", Accessed February 2023
Tom Schneider, "Managing Cyber Security Risk as Enterprise Risk", ISACA Journal, September 2022, Accessed February 2023
Tony Martin –Vegue, "How to Write Strong Risk Scenarios and Statements", ISACA Journal, September 2021, Accessed February 2023
The Wall Street Journal, "Making Data Risk a Top Priority", April 2018, Accessed February 2023
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard will help you craft a project charter, create an RFP, and outline strategies to build a long-term relationship with the vendor.
These templates will help you determine your service desk requirements and document your proposed service desk outsourcing strategy.
This template will allow you to create a detailed RFP for your outsourcing agreement, document the statement of work, provide service overview, record exit conditions, and document licensing model and estimated pricing.
Use the Reference Interview Template to outline a list of questions for interviewing current/previous customers of your candidate vendors. These interviews will help you with unbiased vendor scoring. The RFP Vendor Scoring Tool will help you facilitate vendor briefings with your list of questions and score candidate vendors efficiently through quantifying evaluations.
Cost reduction has traditionally been an incentive for outsourcing the service desk. This is especially the case for organizations that don't have minimal processes in place and those that need resources and skills to fill gaps.
Although cost reduction is usually the main reason to outsource the service desk, in most cases service desk outsourcing increases the cost in a short run. But without a proper model, you will only outsource your problems rather than solving them. A successful outsourcing strategy follows a comprehensive plan that defines objectives, assigns accountabilities, and sets expectations for service delivery prior to vendor outreach.
For outsourcing the service desk, you should plan ahead, work as a group, define requirements, prepare a strong RFP, and contemplate tension metrics to ensure continual improvement. As you build a project charter to outline your strategy for outsourcing your IT services, ensure you focus on better customer service instead of cost optimization. Ensure that the outsourcer can support your demands, considering your long-term achievement.
Think about outsourcing like a marriage deed. Take into account building a good relationship before beginning the contract, ensure to include expectations in the agreement, and make it possible to exit the agreement if expectations are not satisfied or service improvement is not achieved.

Mahmoud Ramin, PhD
Senior Research Analyst
Infrastructure and Operations
Info-Tech Research Group
In organizations where technical support is viewed as non-strategic, many see outsourcing as a cost-effective way to provide this support. However, outsourcing projects often fall short of their goals in terms of cost savings and quality of support.
Significant administrative work and up-front costs are required to outsource the service desk, and poor planning often results in project failure and the decrease of end-user satisfaction.
A complete turnover of the service desk can result in lost knowledge and control over processes, and organizations without an exit strategy can struggle to bring their service desk back in house and reestablish the confidence of end users.
Outsourcing is easy. Realizing all of the expected cost, quality, and focus benefits is hard. Successful outsourcing without being directly involved in service desk management is almost impossible.
Source: HDI 2017 | About 68.5% of the service desk fund is allocated to agent salaries, while only 9.3% of the service desk fund is spent on technology. The high ratio of salaries and expenses over other expense drives organizations to outsource their service desk without taking other considerations into account. |
The outsourcing contract must preserve your control, possession, and ownership of the intellectual property involved in the service desk operation. From the beginning of the process, repatriation should be viewed as a possibility and preserved as a capability.
A benchmark study by Zendesk from 45,000 companies reveals that timely resolution of issues and 24/7 service are the biggest factors in customer service experience.

These factors push many businesses to consider service desk outsourcing to vendors that have capabilities to fulfill such requirements.
Many organizations may not get the value they expect from outsourcing in their first year.
Poor transition planning results in delayed benefits and a poor relationship with your outsourcing service provider. A poor relationship with your service provider results in poor communication and knowledge transfer.

In your service desk outsourcing strategy, rethink downsizing first-level IT service staff. This can be an opportunity to reassign resources to more valuable roles, such as asset management, development or project backlog. Your current service desk staff are most likely familiar with the current technology, processes, and regulations within IT. Consider the ways to better use your existing resources before reducing headcount.
Conduct activities in the blueprint to pinpoint your current challenges with the service desk and find out objectives to outsource customer service.
You need to be clear about the processes that will be outsourced. Considering your objectives, we'll help you discover the processes to outsource, to help you achieve your goals.
Your expectations should be documented in a formal proposal to help vendors provide solid information about how they will satisfy your requirements and what their plan is.
Make sure to plan for continual improvement by setting expectations, tracking the services with proper metrics, and using efficient communication with the provider. Think about the rainy day and include exit conditions for ending the relationship if needed.
1. Define the Goal | 2. Design an Outsourcing Strategy | 3. Develop an RFP and Make a Long-Term Relationship | |
|---|---|---|---|
Phase Steps | 1.1 Identify goals and objectives 1.2 Assess outsourcing feasibility | 2.1 Identify project stakeholders 2.2 Outline potential risks and constraints | 3.1 Prepare service overview and responsibility matrix 3.2 Define approach to vendor relationship management 3.3 Manage the outsource relationship |
Phase Outcomes | Service Desk Outsourcing Vision and Goals Service Desk Processes to Outsource | Outsourcing Roles and Responsibilities Outsourcing Risks and Constraints Service Desk Outsourcing Project Charter | Service Desk Outsourcing RFP Continual Improvement Plan Exit Strategy |

Outsourcing is easy. Realizing all of the expected cost, quality, and focus benefits is hard. Successful outsourcing without being directly involved in service desk management is almost impossible.
Define outsourcing requirements
You don't need to standardize before you outsource, but you still need to conduct your due diligence. If you outsource without thinking about how you want the future to work, you will likely be unsatisfied with the result.
Don't focus on cost
If cost is your only driver for outsourcing, understand that there will be other challenges. Customer service quality will likely be less, and your outsourcer may not add on frills such as Continual Improvement. Be careful that your specialists don't end up spending more time working on incidents and service requests.
Emphasize on customer service
A bad outsourcer relationship will result in low business satisfaction with IT overall. The service desk is the face of IT, and if users are dissatisfied with the service desk, then they are much likelier to be dissatisfied with IT overall.
Vendors are not magicians
They have standards in place to help them succeed. Determine ITSM best practices, define your requirements, and adjust process workflows accordingly. Your staff and end users will have a much easier transition once outsourcing proceeds.
Plan ahead to guarantee success
Identify outsourcing goals, plan for service and system integrations, document standard incidents and requests, and track tension metrics to make sure the vendor does the work efficiently. Aim for building a long-term relationship but contemplate potential exit strategy.
![]() | Service Desk Outsourcing Requirements Database LibraryUse this library to guide you through processes to outsource |
![]() | Service Desk Outsourcing RFP TemplateUse this template to craft a proposal for outsourcing your service desk |
![]() | Service Desk Outsourcing Reference Interview TemplateUse this template to verify vendor claims on service delivery with pervious or current customers |
![]() | Service Desk Outsourcing Vendor Proposal Scoring ToolUse this tool to evaluate RFP submissions |
Key deliverable: | |
|---|---|
![]() | Service Desk Outsourcing Project CharterDocument your project scope and outsourcing strategy in this template to organize the project for efficient resource and requirement allocation |
IT Benefits | Business Benefits |
|---|---|
|
|
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
Call #1: Scope your specific challenges and objectives | Call #3: Identify project stakeholders, and potential risks and constraints | Call #5: Create a detailed RFP |
Call #6: Identify strategy risks. | ||
| Call #2: Assess outsourcing feasibility and processes to outsource | Call #4: Create a list of metrics to ensure efficient reporting | Call #7: Prepare for vendor briefing and scoring each vendor |
Call #8: Build a communication plan |
A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 8 to 10 calls over the course of 4 to 6 months.
Define the goal | Design an outsourcing strategy | Develop an RFP and make a long-term relationship |
|---|---|---|
1.1 Identify goals and objectives 1.2 Assess outsourcing feasibility | 2.1 Identify project stakeholders 2.2 Outline potential risks and constraints | 3.1 Prepare a service overview and responsibility matrix 3.2 Define your approach to vendor relationship management 3.3 Manage the outsource relationship |
1.1.1 Find out why you want to outsource your service desk
1.1.2 Document the benefits of outsourcing your service desk
1.1.3 Identify your outsourcing vision and goals
1.1.4 Prioritize service desk outsourcing goals to help structure your mission statement
1.1.5 Craft a mission statement that demonstrates your decision to reach your outsourcing objectives
Service desk is the face of IT. Service desk improvement increases IT efficiency, lowers operation costs, and enhances business satisfaction.
Common challenges that result in deciding to outsource the service desk are:
Participants: IT Director, Service Desk Manager, Service Desk Team
| Challenge | Example |
|---|---|
| Lack of tier 1 support | Startup does not have a dedicated service desk to handle incidents and provide services to end users. |
| Inefficient ticket handling | MTTR is very high and end users are frustrated with their issues not getting solved quickly. Even if they call service desk, they are put on hold for a long time. Due to these inefficiencies, their daily work is greatly impacted. |
| Restricted service hours | Company headquartered in Texas does not have resources to provide 24/7 IT service. When users in the East Asia branch have a laptop issue, they must wait until the next day to get response from IT. This has diminished their satisfaction. |
| Restricted languages | Company X is headquartered in New York. An end user not fluent in English from Madrid calls in for support. It takes five minutes for the agent to understand the issue and log a ticket. |
| Ticket backlog | IT is in firefighting mode, very busy with taking care of critical incidents and requests from upper management. Almost no one is committed to the SLA because of their limited availability. |
Brainstorm your challenges with the service desk. Why have you decided to outsource your service desk? Use the above table as a sample.
Download the Project Charter Template
When you outsource, the vendor's staff tend to gradually become less effective as:
You must actively manage the vendor to identify and resolve these issues. Many organizations find that service desk management takes more time after they outsource.
You need to keep spending on service desk management, and you may not get away from technology infrastructure spending.
In their first year, almost 42% of Info-Tech's clients do not get the real value of outsourcing services as expected. This iss primarily because of misalignment of organizational goals with outcomes of the outsourced services.
Expected Costs | Unexpected Costs | Example | |
|---|---|---|---|
| Transition Costs | Severance and staff retention |
|
|
| Fees | Price of the engagement |
|
|
| Management Costs | Time directing account |
|
|
| Rework Costs | Downtime, defect rate, etc. (quality metrics measured in SLAs) |
|
|
| Costs related to transitioning into the engagement | Adapting to standards and training costs |
|---|---|
Adapting to standards: Define the process improvements you will need to work with each potential vendor. Training costs for vendor staff: Reduce training costs by keeping the same vendor staff on all of your projects. | |
Fee-related costs | Fees for additional services (that you thought were included) |
Carefully review each proposed statement of work to identify and reduce extra fees. Understand why extra fees occur in the SLA, the contract, and the proposed statement of work, and take steps to protect yourself and the vendor. | |
Management-related costs | Direct management of vendor staff and dispute resolution |
Direct management of vendor staff: Avoid excessive management costs by defining a two-tier management structure on both sides of the engagement. Time spent resolving disputes: Avoid prolonged resolution costs by defining terms of divorce for the engagement up front. | |
Rework costs | Unanticipated requirements and integration with existing systems |
Unanticipated requirements: Use a two-stage process to define requirements, starting with business people and then with review by technical staff. Integration with existing systems: Obtain a commitment from vendors that deliverables will conform to standards at points of integration with your systems. |
A clear vision of strategic objectives prior to entering an outsourcing agreement will allow you to clearly communicate these objectives to the Managed Service Provider (MSP) and use them as a contracted basis for the relationship.
"People often don't have a clear direction around what they're trying to accomplish. The strategic goals should be documented. Is this a cost-savings exercise? Is it because you're deficient in one area? Is it because you don't have the tools or expertise to run the service desk yourself? Figure out what problem you're trying to solve by outsourcing, then build your strategy around that.
– Jeremy Gagne, Application Support Delivery Manager, Allegis Group
Use your goals and objectives as a management tool. Clearly outline your desired project outcomes to both your in-house team and the vendor during implementation and monitoring. It will allow a common ground to unite both parties as the project progresses.
| Desired outcome | Pitfalls to overcome |
|---|---|
| IT can focus on core competencies and strategic initiatives rather than break-fix tasks. | Escalation to second- and third-level support usually increases when the first level has been outsourced. Outsourcers will have less experience with your typical incidents and will give up on trying to solve some issues more quickly than your internal level-one staff. |
| Low outsourcing costs compared to the costs needed to employ internal employees in the same role. | Due to lack of incentive to decrease ticket volume, costs are likely to increase. As a result, organizations often find themselves paying more overall for an outsourced service desk than if they had a few dedicated IT service desk employees in-house. |
| Improved employee morale as a result of being able to focus on more interesting tasks. | Management often expects existing employee morale to increase as a result of shifting their focus to core and strategic tasks, but the fear of diminished job security often spreads to the remaining non-level-one employees. |
| ID | Goal Description | KPI | Impacted Stakeholders | Checkpoint Schedule |
|---|---|---|---|---|
| 1 | Provide capacity to take calls outside of current service desk work hours |
|
|
|
| 2 | Take calls in different languages |
|
|
|
| 3 | Provide field support at remote sites with no IT presence without having to fly out an employee |
|
|
|
| 4 | Improve ease of management by vendor helping with managing and optimizing service desk tasks |
|
|
|
Download the Project Charter Template
The size, complexity, and maturity of your organization are good indicators of service desk direction with regards to outsourcing.
Although less adherence to service desk best practices can be one of the main incentives to outsourcing the service desk, IT should have minimal processes in place to be able to set expectations with targeting vendors.
The evaluation process for outsourcing the service desk should be done very carefully. Project leaders should make sure they won't panic internal resources and impact their performance through the transition period.
If the outsourcing process is rushed, it will result in poor evaluation, inefficient decision making, and project failure.
Download the Project Charter Template
Participants: IT Director, Service Desk Manager
The IT mission statement specifies the function's purpose or reason for being. The mission should guide each day's activities and decisions. The mission statement should use simple and concise terminology and speak loudly and clearly, generating enthusiasm for the organization.
Download the Project Charter Template
1.2.1 Create a baseline of customer experience
1.2.2 Identify service desk processes to outsource
1.2.3 Design an outsourcing decision matrix for service desk processes and services
1.2.4 Discuss if you need to outsource only service desk or if additional services would benefit from outsourcing too
A decrease of business and end-user satisfaction is a big drive to outsourcing the service desk. Conduct a customer service survey to discover your end-user experience prior to and after outsourcing the service desk.
First-time outsourcers often assume they are transferring most of the operations over to the vendor, but this is often not the case.
Whether managing in-house or outsourcing, it is your job to ensure core issues have been clarified, processes defined, and standards maintained. If your processes are ad-hoc or non-existent right now, outsourcing won't fix them.
You must have the following in place before looking to outsource:
If you expect your problems to disappear with outsourcing, they might just get worse.
Don't select a vendor for what your company is today – select a vendor for what your company will be years from now. Define your future service desk requirements in addition to your current requirements and leave room for growth and development.
"You can't outsource management; you can only outsource supervision." Barry Cousins, Practice Lead, Info-Tech Research Group | |
|---|---|
What can be the vendor in charge of? | What stays in-house? |
|
|
The need for a Service Desk Manager does not go away when you outsource. In fact, the need becomes even stronger and never diminishes.
Every effective service desk has a clear definition of the services that they are performing for the end user. You can't provide a service without knowing what the services are.
MSPs typically have their own set of standards and processes in play. If your service desk is not at a similar level of maturity, outsourcing will not be pleasant.
Make sure that your metrics are reported consistently and that they tell a story.
"Establish baseline before outsourcing. Those organizations that don't have enough service desk maturity before outsourcing should work with the outsourcer to establish the baseline."
– Yev Khobrenkov, Enterprise Consultant, Solvera Solutions
Outsourcing vendors are not service desk builders; they're service desk refiners. Switching to a vendor won't improve your maturity; you must have a certain degree of process maturity and standardization before moving.
INDUSTRY: Cleaning Supplies
SOURCE: PicNet
Review your prioritized project goals from activity 1.1.4.
Brainstorm requirements and use cases for each goal and describe each use case. For example: To improve service desk timeliness, IT should improve incident management, to resolve incidents according to the defined SLA and based on ticket priority levels.
Discuss if you're outsourcing just incident management or both incident management and request fulfillment. If both, determine what level of service requests will be outsourced? Will you ask the vendor to provide a service catalog? Will you outsource self-serve and automation?
Document your findings in the service desk outsourcing requirements database library.
Download the Requirements Database Library
Participants: IT Director, Service Desk Manager, Infrastructure manager
Most successful service desk outsourcing engagements have a primary goal of freeing up their internal resources to work on complex tasks and projects. The key outsourcing success factor is to find out internal services and processes that are standardized or should be standardized, and then determine if they can be outsourced.
|
|
|
Download the Requirements Database Library
Download the Project Charter Template
For information on better knowledge management, refer to Info-Tech's blueprint Optimize the Service Desk With a Shift-Left Strategy.

SIAM Layers. Source: SIAM Foundation BoK
SIAM reduces service duplication and improves service delivery via managing internal and external service providers.
To utilize the SIAM model, determine the following components:
To learn more about adopting SIAM, visit Scopism.
Download the Requirements Database Library
Download the Project Charter Template
Problem management is a group effort. Make sure your internal team is assisted with sufficient and efficient data by the outsourcer to conduct a better problem management.
Clearly state your organization's expectations for enabling problem management. MSPs may not necessarily need, and cannot do, problem management; however, they should provide metrics to help you discover trends, define recurring issues, and enable root cause analysis.
For more information on problem management, refer to Info-Tech's blueprint Improve Incident and Problem Management.
INTAKE: Ticket data from incident management is needed for incident matching to identify problems. Critical Incidents are also a main input to problem management.
INTAKE: SMEs and operations teams monitoring system health events can identify indicators of potential future issues before they become incidents.
ACTION: Problem tickets require investigation from relevant SMEs across different IT teams to identify potential solutions or workarounds.
OUTPUT: Problem resolution may need to go through Change Management for proper authorization and risk management.
Your MSP tracks ticket volume by platform.
There are 100 network tickets/month, 200 systems tickets/month, and 5,000 end-user tickets/month.
Tracking these numbers is a good start, but the real value is in the analysis. Why are there 5,000 end-user tickets? What are the trends?
Your MSP should be providing a monthly root-cause analysis to help improve service quality.
Define the goal | Design an outsourcing strategy | Develop an RFP and make a long-term relationship |
|---|---|---|
1.1 Identify goals and objectives 1.2 Assess outsourcing feasibility | 2.1 Identify project stakeholders 2.2 Outline potential risks and constraints | 3.1 Prepare a service overview and responsibility matrix 3.2 Define your approach to vendor relationship management 3.3 Manage the outsource relationship |
2.1.1 Identify internal outsourcing roles and responsibilities
An outsourcing strategy is crucial to the proper accomplishment of an outsourcing project. By taking the time to think through your strategy beforehand, you will have a clear idea of your desired outcomes. This will make your RFP of higher quality and will result in a much easier negotiation process.
Most MSPs are prepared to offer a standard proposal to clients who do not know what they want. These are agreements that are doomed to fail. A clearly defined set of goals (discussed in Phase 1), risks, and KPIs and metrics (covered in this phase) makes the agreement more beneficial for both parties in the long run.
"You should fill the gap before outsourcing. You should make sure how to measure tickets, how to categorize, and what the cost of outsourcing will be. Then you'll be able to outsource the execution of the service. Start your own processes and then outsource their execution."
– Kris Krishan, Head of IT and business systems, Waymo
INDUSTRY: Digital Media
SOURCE: Auxis
A Canadian multi-business company with over 13,000 employees would like to maintain a growing volume of digital content with their endpoint management.
The client operated a tiered model service desk. Tier 1 was outsourced, and tier 2 tasks were done internally, for more complex tasks and projects.
As a result of poor planning and defining goals, the company had issues with:
The company structured a strategy for outsourcing service desk and defined their expectations and requirements.
They engaged with another outsourcer that would fulfill their requirements as planned.
With the help of the outsourcer's consulting team, the client was able to define the gaps in their existing processes and system to:
The proactive planning led to:
Outsourcing is a complete top-to-bottom process that involves multiple levels of engagement:
The service desk doesn't operate in isolation. The service desk interfaces with many other parts of the organization (such as finance, purchasing, field support, etc.), so it's important to ensure you engage stakeholders from other departments as well. If you only engage the service desk staff in your discussions around outsourcing strategy and RFP development, you may miss requirements that will come up when it's too late.
Download the Project Charter Template
2.2.1 Identify potential risks and constraints that may impact achievement of objectives
2.2.2 Arrange groups of tension metrics to balance your reporting
Define your constraints to outsourcing the service desk.
Consider all types of constraints and opportunities, including:
Within the scope of a scouring decision, define your needs and objectives, measure those as much as possible, and compare them with the "as-is" situation.
Start determining what alternative approaches/scenarios the organization could use to fill the gaps. Start a comparison of scenarios against drivers, goals, and risks.
Constraints | Goals and objectives |
|---|---|
|
|
Analyze the risks associated with a specific scenario. This analysis should identify and understand the most common sourcing and vendor risks using a risk-reward analysis for selected scenarios. Use tools and guidelines to assess and manage vendor risk and tailor risk evaluation criteria to the types of vendors and products.
Plan for the worst to prevent it from happening. Evaluating risk should cover a wide variety of scenarios including the worst possible cases. This type of thinking will be crucial when developing your exit strategy in a later exercise.
| Risk Description | Probability(H/M/L) | Impact(H/M/L) | Planned Mitigation |
| Lack of documentation | M | M | Use cloud-based solution to share documents. |
| Knowledge transfer | L | M | Detailed knowledge-sharing agreement in place in the RFP. |
| Processes not followed | L | H | Clear outline and definition of current processes. |
Download the Project Charter Template
Define the tiers and/or services that will be the responsibility of the MSP, as well as escalations and workflows across tiers. A sample outsourced structure is displayed here:
| External Vendor | Tickets beyond the scope of the service desk staff need to be escalated back to the vendor responsible for the affected system. |
|---|---|
| Tier 3 | Tickets that are focused on custom applications and require specialized or advanced support are escalated back to your organization's second- and third-level support teams. |
| Tier 2 | The vendor is often able to provide specialized support for standard applications. However, the desktop support still needs someone onsite as that service is very expensive to outsource. |
| Tier 1 | Service desk outsource vendors provide first-line response. This includes answering the phones, troubleshooting simple problems, and redirecting requests that are more complex. |
If you outsource everything, you'll be at the mercy of consultancy or professional services shops later on. You won't have anyone in-house to help you deploy anything; you're at the mercy of a consultant to come in and tell you what to do and how much to spend. Keep your highly skilled people in-house to offset what you'd have to pay for consultancy. If you need to repatriate your service desk later on, you will need skills in-house to do so.
"Good" metric results may simply indicate proficient reactive fixing; long-term thinking involves implementing proactive, balanced solutions.
KPIs demonstrate that you are running an effective service desk because:
While these results may appear great on the surface, metrics don't tell the whole story.
![]() | First-Contact Resolution (FCR) Rate | Percentage of tickets resolved during first contact with user (e.g. before they hang up or within an hour of submitting ticket). Could be measured as first-contact, first-tier, or first-day resolution. |
|---|---|---|
End-User Satisfaction | Perceived value of the service desk measured by a robust annual satisfaction survey of end users and/or transactional satisfaction surveys sent with a percentage of tickets. | |
| Ticket Volume and Cost Per Ticket | Monthly operating expenses divided by average ticket volume per month. Report ticket volume by department or ticket category, and look at trends for context. | |
Average Time to Resolve (incidents) or Fulfill (service requests) | Time elapsed from when a ticket is "open" to "resolved." Distinguish between ticket resolution vs. closure, and measure time for incidents and service requests separately. |
Tension metrics help create a balance by preventing teams from focusing on a single element.
For example, an MSP built incentives around ticket volume for their staff, but not the quality of tickets. As a result, the MSP staff rushed through tickets and gamed the system while service quality suffered.
Use metrics to establish baselines and benchmarking data:
"We had an average talk time of 15 minutes per call and I wanted to ensure they could handle those calls in 15 minutes. But the behavior was opposite, [the vendor] would wrap up the call, transfer prematurely, or tell the client they'd call them back. Service levels drive behavior so make sure they are aligned with your strategic goals with no unintended consequences."
– IT Services Manager, Banking
Make sure your metrics work cooperatively. Metrics should be chosen that cause tension on one another. It's not enough to rely on a fast service desk that doesn't have a high end-user satisfaction rate or runs at too high a cost; there needs to be balance.
Download the Project Charter Template
Define the goal | Design an outsourcing strategy | Develop an RFP and make a long-term relationship |
|---|---|---|
1.1 Identify goals and objectives 1.2 Assess outsourcing feasibility | 2.1 Identify project stakeholders 2.2 Outline potential risks and constraints | 3.1 Prepare a service overview and responsibility matrix 3.2 Define your approach to vendor relationship management 3.3 Manage the outsource relationship |
This phase will walk you through the following activities:
This phase involves the following participants:
3.1.1 Evaluate your technology, people, and process requirements
3.1.2 Outline which party will be responsible for which service desk processes
The RFP must cover business needs and the more detailed service desk functions required. Many enterprises only consider the functionality they need, while ignoring operational and selection requirements.
Negotiate a supply agreement with the preferred outsourcer for delivery of the required services. Ensure your RFP covers:
In addition to defining your standard requirements, don't forget to take into consideration the following factors when developing your RFP:
Although it may be tempting, don't throw everything over the wall at your vendor in the RFP. Evaluate your service desk functions in terms of quality, cost effectiveness, and the value provided from the vendor. Organizations should only outsource functions that the vendor can operate better, faster, or cheaper.
Involve the right stakeholders in developing your RFP, not just service desk. If only service desk is involved in RFP discussion, the connection between tier 1 and specialists will be broken, as some processes are not considered from IT's point of view.
Benefits of operating within your own ITSM while outsourcing the service desk: | Disadvantages of using your own ITSM while outsourcing the service desk: |
|---|---|
|
|
Defining your tool requirements can be a great opportunity to get the tool functionality you always wanted. Many MSPs offer enterprise-level ITSM tools and highly mature processes that may tempt you to operate within their ITSM environment. However, first define your goals for such a move, as well as pros and cons of operating in their service management tool to weigh if its benefits overweigh its downfalls.
Lone Star College learned that it's important to select a vendor whose tool will work with your service desk
INDUSTRY: Education
SOURCE: ServiceNow
Lone Star College has an end-user base of over 100,000 staff and students.
The college has six campuses across the state of Texas, and each campus was using its own service desk and ITSM solution.
Initially, the decision was to implement a single ITSM solution, but organizational complexity prevented that initiative from succeeding.
A decision was made to outsource and consolidate the service desks of each of the campuses to provide more uniform service to end users.
Lone Star College selected a vendor that implemented FrontRange.
Unfortunately, the tool was not the right fit for Lone Star's service and reporting needs.
After some discussion, the outsourcing vendor made the switch to ServiceNow.
Some time later, a hybrid outsourced model was implemented, with Lone Star and the vendor combining to provide 24/7 support.
The consolidated, standardized approach used by Lone Star College and its vendor has created numerous benefits:
Lone Star outsourced in order to consolidate its service desks quickly, but the tools didn't quite match.
It's important to choose a tool that works well with your vendor's, otherwise the same standardization issues can persist.
Your RFP should be worded in a way that helps you understand what your vendor's standard offerings are because that's what they're most capable of delivering. Rather than laying out all your requirements in a high level of detail, carefully craft your questions in a probing way. Then, understand what your current baseline is, what your target requirements are, and assess the gap.
It is common to receive responses that are very different – RFPs don't provide a response framework. Comparing vastly different responses can be like comparing apples to oranges. Not only are they immensely time consuming to score, their scores also don't end up accurately reflecting the provider's capabilities or suitability as a vendor.
Your RFP should not be hundreds of pages long. If it is, there is too much detail.
Providing too much detail can box your responses in and be overly limiting on your responses. It can deter potentially suitable provider candidates from sending a proposal.
Request
For
Proposal
"From bitter experience, if you're too descriptive, you box yourself in. If you're not descriptive enough, you'll be inundated with questions or end up with too few bidders. We needed to find the best way to get the message across without putting too much detail around it."
– Procurement Manager, Utilities
![]() | The main point of focus in this document is defining your requirements (discussed in Phase 1) and developing proposal preparation instructions. The rest of the RFP consists mostly of standard legal language. Review the rest of the RFP template and adapt the language to suit your organization's standards. Check with your legal departments to make sure the RFP adheres to company policies. |
Download the Service Desk Outsourcing RFP Template
With end users becoming more and more tech savvy, organizational intelligence is becoming an increasingly important aspect of IT support. Modern employees are able and willing to troubleshoot on their own before calling into the service desk. The knowledgebase and FAQs largely facilitate self-serve trouble shooting, both of which are not core concerns for the outsource vendor.
Why would the vendor help you empower end users and decrease ticket volume when it will lead to less revenue in the future? Ticket avoidance is not simply about saving money by removing support. It's about the end-user community developing organizational intelligence so that it doesn't need as much technical support.
Organizational intelligence occurs when shared knowledge and insight is used to make faster, better decisions.
When you outsource, the flow of technical insight to your end-user community slows down or stops altogether unless you proactively drive it. Retain ownership of the knowledgebase and ensure that the content is:
Include knowledge management process in your ticket handling workflows to make sure knowledge is transferred to the MSP and end users. For more information on knowledge management, refer to Info-Tech's Standardize the Service Desk and Optimize the Service Desk With a Shift-Left Strategy blueprints.
Nowadays, outsourcers provide innovative services such as self-serve options. However, bear in mind that the quality of such services is a differentiating factor. A well-maintained portal makes it easy to:
In the outsourcing process, determine your expectations from your vendor on self-serve options and discuss how they will fulfill these requirements. Similar to other processes, work internally to define a list of services your organization is providing that you can pass over to the outsourcer to convert to a service catalog.
Use Info-Tech's Sample Enterprise Services document to start determining your business's services.
Provide your MSP with access rights to enable the service desk to have account management without giving too much authentication. This way you'll enable moving tickets to the outsourcer while you keep ownership and supervision.
This activity is an expansion to the outcomes of activity 1.2.1, where you determined the outsourcing requirements and the party to deliver each requirement.
Download the Service Desk Outsourcing RFP Template
3.2.1 Define your SLA requirements
3.2.2 Score each vendor to mitigate the risk of failure
3.2.3 Score RFP responses
3.2.4 Get referrals, conduct reference interviews and evaluate responses for each vendor
The most common mistake in vendor evaluation is moving too quickly. The process leading to an RFP evaluation can be exhausting, and many organizations simply want to be done with the whole process and begin outsourcing.
The most common mistake in vendor evaluation is moving too quickly. The process leading to an RFP evaluation can be exhausting, and many organizations simply want to be done with the whole process and begin outsourcing.
Vendors often include certain conditions in their proposals that masquerade as appealing but may spell disaster. Watch for these red flags:
Vendor sales and marketing people know just what to say to sway you: don't talk to them until you know what you're looking for.
Do you prefer global or local data centers? Do you need multiple locations for redundancy in case of disaster? Will language barriers be a concern?
Ensure you can terminate a poor arrangement by having shorter terms with optional renewals. It's better to renew and renegotiate if one side is losing in the deal in order to keep things fair. Don't assume that proposed long-term cost savings will provide a satisfactory service.
Vendors are aiming at different business segments, from startups to large enterprises. Some will accept existing virtual machines, and others enforce compliance to appeal to government and health agencies.
A robust SLA strengthens a vendor's reliability and accountability. Agencies with special needs should have room in negotiations for customization. Providers should also account for regular SLA reviews and updates. Vendors should be tracking call volume and making projections that should translate directly to SLAs.
Even if you don't need a vendor with 24/7 availability, vendors who cannot support this timing should be eliminated. You may want to upgrade later and will want to avoid the hassle of switching.
Vendors must have the willingness and ability to improve processes and efficiencies over time. Maintaining the status-quo isn't acceptable in the constantly evolving IT world.
Consider which model makes the most sense: will you go with per call or per user pricing? Which model will generate vendor motivation to continually improve and meet your long-term goals? Watch out for variable pricing models.
SLAs define the performance of the service desk and clarify what the provider and customer can expect in their outsourcing relationship.
Each MSP's RFP response will help you understand their basic SLA terms and enhanced service offerings. You need to understand the MSP's basic SLA terms to make sure they are adequate enough for your requirements. A well-negotiated SLA will balance the requirements of the customer and limit the liability of the provider in a win/win scenario.
For more information on defining service level requirements, refer to Info-Tech's blueprint Reduce Risk With Rock-Solid Service-Level Agreements.
Use the sample table as a starting point to determine your current incident management SLA:
Participants: IT Managers, Service Desk Manager, Project Team
| Response | ||||
|---|---|---|---|---|
| Priority | Response SLO | Resolution SLO | Escalation Time | |
| T1 | ||||
| Severity 1 | Critical | Within 10 minutes | 4 hours to resolve | Immediate |
| Severity 2 | High | Within 1 business hour | 8 business hours to resolve | 20 minutes |
| Severity 3 | Medium | Within 4 business hours | 24 business hours to resolve | After 20 minutes without progress |
| Severity 4 | Low | Same day (8 hours) | 72 business hours to resolve | After 1 hour without progress |
| SLO Response | Time it takes for service desk to respond to service request or incident. | Target response is 80% of SLO | ||
| SLO Resolution | Time it takes to resolve incident and return business services to normal. | Target resolution is 80% of SLO | ||
Download the Service Desk Outsourcing RFP Template
Use section 5 of Info-Tech's Service Desk Outsourcing RFP Template for commonly used questions and requirements for outsourcing the service desk. Ask the right questions to secure an agreement that meets your needs. If you are already in a contract with an MSP, tale the opportunity of contract renewal to improve the contract and service.

Download the Service Desk Outsourcing RFP Template
Add your finalized assessment questions into Info-Tech's Service Desk Outsourcing RFP Scoring Tool to aggregate responses in one repository for comparison. Since the vendors are asked to respond in a standard format, it is easier to bring together all the responses to create a complete view of your options.

Download the Service Desk Vendor Proposal Scoring Tool
Include the right requirements for your organization and analyze candidate vendors on their capability to satisfy them.
Download the Service Desk Outsourcing RFP Template
Download the Service Desk Vendor Proposal Scoring Tool
Download the Service Desk Vendor Proposal Scoring Tool
Research different pricing models and accurately assess which model fits your organization. Consider the following pricing models:
In this model, a flat rate is allocated to agents tackling your service desk tickets. This is a good option for building long-term relationship with outsourcer's agents and efficient knowledge transfer to the external team; however, it's not ideal for small organizations that deal with few tickets. This is potentially an expensive model for small teams.
This model considers the number of tickets handled by the outsourcer. This model is ideal if you only want to pay for your requirement. Although the internal team needs to have a close monitoring strategy to make sure the outsourcer's efficiency in ticket resolution.
This is based on outbound and inbound calls. This model is proper for call centers and can be less expensive than the other models; however, tracking is not easy, as you should ensure service desk calls result in efficient resolution rather than unnecessary follow-up.
The time spent on tickets is considered in this model. With this model, you pay for the work done by agents, so that it may be a good and relatively cheap option. As quicker resolution SLA is usually set by the organization, customer satisfaction may drop, as agents will be driven to faster resolution, not necessarily quality of work.
This model is based on number of all users, or number of users for particular applications. In this model, correlation between number of users and number of tickets should be taken into account. This is an ideal model if you want to deal with impact of staffing changes on service price. Although you should first track metrics such as mean time to resolve and average number of tickets so you can prevent unnecessary payment based on number of users when most users are not submitting tickets.
3.3.1 Analyze your outsourced service desk for continual improvement
3.3.2 Make a case to either rehabilitate your outsourcing agreement or exit
3.3.3 Develop an exit strategy in case you need to end your contract early

Key Activity:
Measure performance levels with an agreed upon standard scorecard.
Key Activity:
Periodical assessment of the vendors to ensure they are meeting compliance standards.
Key Activity:
Manage the contracts and renewal dates, the level of demand for the services/products provided, and the costs accrued.
Key Activity:
Develop a plan with procurement and key internal stakeholders to define clear, consistent, and stable requirements.
Key Activity:
Develop a consistent and effective process for selecting the most appropriate vendor.
Key Activity:
Contracts are consistently negotiated to ensure the vendor and the client have a documented and consistent understanding of mutual expectations.
You need this level of visibility into the service desk process, whether in-house or outsourced
Each of these steps requires documentation – either through standard operating procedures, SLAs, logs, or workflow diagrams.
"Make sure what they've presented to you is exactly what's happening."
– Service Desk Manager, Financial Services
Designate a relationship manager to act as a liaison at the business to be a conduit between the business and the MSP.
"When my company decided to outsource, I performed the same role but for a different company. There was a huge disruption to the business flow and a lack of communication to manage the change. The transition took weeks before any end users figured out what the new processes were for submitting a ticket and who to ask for help, and from a personal side, it became difficult to maintain relationships with colleagues."
– IT Specialist for a financial institution
Educate the enterprise on expectations and processes that are handled by the MSP. Identify stakeholder groups affected by the outsourced processes then build a communication plan on what's been changed, what the benefits are, and how they will be impacted. Determine a timeline for communicating these initiatives and how these announcements will be made. Use InfoTech's Sample Communication Plan as a starting point.
Build a feedback program for your outsourced services. Utilize transactional surveys to discover and tell outsourcing success to the impacted stakeholders.
Ensure you apply steps for providing feedback to make sure processes are handled as expected. Service desk is the face of IT. Customer satisfaction on ticket transactions reflects satisfaction with IT and the organization.
Build customer satisfaction surveys and conduct them for every transaction to get a better sense of outsourced service desk functionality. Collaborate with the vendor to make sure you build a proper strategy.
Download the Project Charter Template
MSPs often offer clients credit requests (service credits) for their service failures, which are applied to the previous month's monthly recurring charge. They are applied to the last month's MRC (monthly reoccurring charges) at the end of term and then the vendor pays out the residual.
However, while common, service credits are not always perceived to be a strong incentive for the provider to continually focus on improvement of mean-time-to-respond/mean-time-to-resolve.
Efficient outsourced service desk causes positive impacts on business satisfaction. To address the true value of the services outsourced, you should evaluate the return on investment (ROI) in these areas: Emotional ROI, Time ROI, Financial ROI
Service desk's main purpose should be to provide topnotch services to end users. Build a customer experience program and leverage transactional surveys and relationship surveys to constantly analyze customer feedback on service quality.
Ask yourself:
Besides customer satisfaction, SLA commitment is a big factor to consider when conducting ROI analysis.
Ask these questions:
As already mentioned in Phase 1, the main motivation for outsourcing the service desk should not be around cost reduction, but to improve performance. Regardless, it's still important to understand the financial implications of your decision.
To evaluate the financial impact of your outsourced service desk, ask these questions:
For more information on conducting this activity, refer to InfoTech's blueprint Terminate the IT Infrastructure Outsourcing Relationship
The end of outsourcing is difficult. Your organization needs to maintain continuity of service during the transition. Your MSP needs to ensure that its resources can be effectively transitioned to the next deployment with minimal downtime. It is crucial to define your exit conditions so that both sides can prepare accordingly.
If things start going south with your MSP, negotiate a "get well plan." Outline your problems to the MSP and have them come back to you with a list of how they're going to fix these problems to get well before you move forward with the contract.
You may consider terminating your outsourcing agreement if you are dissatisfied with the current agreement or there has been a change in circumstances (either the vendor has changed, or your organization has changed).
Diagnose the cause of the problem before assuming it's the MSP's fault. The issue may lie with poorly defined requirements and processes, lack of communication, poor vendor management, or inappropriate SLAs. Re-assess your strategy and re-negotiate your contract if necessary.
There are many reasons why outsourcing relationships fail, but it's not always the vendor's fault.
Clients often think their MSP isn't doing a great job, but a lot of the time the reason comes back to the client. They may not have provided sufficient documentation on processes, were not communicating well, didn't have a regular point of contact, and weren't doing regular service reviews. Before exiting the relationship, evaluate why it's not working and try to fix things first.
Plan out your transition timeline, taking into account current contract terms and key steps required. Be prepared to handle tickets immediately upon giving notice.
Develop a transition plan about six months before the contract notice date. Be proactive by constantly tracking the MSP, running ROI analyses and training staff before moving the services to the internal team or the next MSP. This will help you manage the transition smoothly and handle intake channels so that upon potential exit, users won't be disrupted.
Your exit strategy should encompass both the conditions under which you would need to end your contract with the MSP and the next steps you will take to transition your services.
Download the Service Desk Outsourcing RFP Template
You have now re-envisioned your service desk by building a solid strategy for outsourcing it to a vendor. You first analyzed your challenges with the current service desk and evaluated the benefits of outsourcing services. Then you went through requirements assessment to find out which processes should be outsourced. Thereafter, you developed an RFP to communicate your proposal and evaluate the best candidates.
You have also developed a continual improvement plan to ensure the outsourcer provides services according to your expectations. Through this plan, you're making sure to build a good relationship through incentivizing the vendor for accomplishments rather than punishing for service failures. However, you've also contemplated an exit plan in the RFP for potential consistent service failures.
Ideally, this blueprint has helped you go beyond requirements identification and served as a means to change your mindset and strategy for outsourcing the service desk efficiently to gain long-term benefits.
if you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop
Contact your account representative for more information
workshops@infotech.com
1-888-670-8889
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop
To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.

Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889

Identify Processes to Outsource
Identify service desk tasks that will provide the most value upon outsourcing.

Score Candidate Vendors
Evaluate vendors on their capabilities for satisfying your service desk requirements.
Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery
Terminate the IT Infrastructure Outsourcing Relationship
Yev Khovrenkov; Enterprise Consultant, Solvera Solutions
Kamil Salagan; I&O Manager, Bartek Ingredients
Satish Mekerira; VP of IT, Coherus BioSciences
Kris Krishan; Head of IT and Business Systems, Waymo
Kris Arthur; Infra & Security Director, SEKO Logistics
Valance Howden; Principal Research Advisor, Info-Tech Research Group
Sandi Conrad; Principal Research Director, Info-Tech Research Group
Graham Price; Senior Director of Executive Services, Info-Tech Research Group
Barry Cousins; Practice Lead, Info-Tech Research Group
Mark Tauschek; VP of I&O Research, Info-Tech Research Group
Darin Stahl; Principal Research Advisor, Info-Tech Research Group
Scott Yong; Principal Research Advisor, Info-Tech Research Group
A special thank-you to five anonymous contributors
Allnutt, Charles. "The Ultimate List of Outsourcing Statistics." MicroSourcing, 2022. Accessed July 2022.
"Considerations for outsourcing the service desk. A guide to improving your service desk and service delivery performance through outsourcing." Giva. Accessed May 2022.
Hurley, Allison. "Service Desk Outsourcing | Statistics, Challenges, & Benefits." Forward BPO Inc., 2019. Accessed June 2022.
Mtsweni, Patricia, et al. "The impact of outsourcing information technology services on business operations." South African Journal of Information Management, 2021, Accessed May 2022.
"Offshore, Onshore or Hybrid–Choosing the Best IT Outsourcing Model." Calance, 2021. Accessed June 2022. Web.
"Service Integration and Management (SIAM) Foundation Body of Knowledge." Scopism, 2020. Accessed May 2022.
Shultz, Aaron. "IT Help Desk Outsourcing Pricing Models Comparison." Global Help Desk Services. Accessed June 2022. Web.
Shultz, Aaron. "4 Steps to Accurately Measure the ROI of Outsourced Help Desk Services" Global Help Desk Services, Accessed June 2022. Web.
Sunberg, John. "Great Expectations: What to Look for from Outsourced Service Providers Today." HDI. Accessed June 2022. Web.
Walters, Grover. "Pivotal Decisions in outsourcing." Muma Case Review, 2019. Accessed May 2022.
Wetherell, Steve. "Outsourced IT Support Services: 10 Steps to Better QA" Global Held Desk Services. Accessed May 2022. Web.
Building a smaller digital workspace doesn’t mean that the workspace will have a smaller impact on the business.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create a list of benefits that the organization will find compelling and build a cross-functional team to champion the workspace.
Design the digital workspace’s value proposition to drive your requirements.
Take an agile approach to building your digital workspace.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Ensure that the digital workspace addresses real problems the business is facing.
Defined benefits that will address business problems
Identified strategic business partners
1.1 Identify the digital workspace’s direction.
1.2 Prioritize benefits and define a vision.
1.3 Assemble a team of digital workspace champions.
Vision statement
Mission statement
Guiding principles
Prioritized business benefits
Metrics and key performance indicators
Service Owner, Business Owner, and Project Sponsor role definitions
Project roles and responsibilities
Operational roles and responsibilities
Drive requirements through a well-designed value proposition.
Identified requirements that are based in employees’ needs
2.1 Design the value proposition.
2.2 Identify required policies.
2.3 Identify required level of input from users and business units.
2.4 Document requirements for user experiences, processes, and services.
2.5 Identify in-scope training and culture requirements.
Prioritized functionality requirements
Value proposition for three business roles
Value proposition for two service provider roles
Policy requirements
Interview and focus group plan
Business process requirements
Training and culture initiatives
Ensure that technology is an enabler.
Documented requirements for IT and service provider technology
3.1 Identify systems of record requirements.
3.2 Identify requirements for apps.
3.3 Identify information storage requirements.
3.4 Identify management and security integrations.
3.5 Identify requirements for internal and external partners.
Requirements for systems for record
Prioritized list of apps
Storage system requirements
Data and security requirements
Outsourcing requirements
Businesses are expected to balance achieving innovation through initiatives that transform the organization with effective risk management. While this is nothing new, added challenges arise due to:
Address digital risk to build digital resilience. In the process, you will drive transformation and maintain digital trust among your employees, end users, and consumers by:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Discover an overview of what digital risk is, learn how to assess risk factors for the five primary categories of digital risk, see several industry-specific scenarios, and explore how to plan for and mitigate identified risks.
Begin building the digital risk profile for your organization, identify where your key areas of risk exposure exist, and assign ownership and accountability among the organization’s business units.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Develop an understanding and standard definition of what digital risk is, who it impacts, and its relevance to the organization.
Understand what digital risk means and how it differs from traditional enterprise or cybersecurity risk.
Develop a definition of digital risk that recognizes the unique external and internal considerations of your organization.
1.1 Review the business context
1.2 Review the current roles of enterprise, IT, and cyber risk management within the organization
1.3 Define digital transformation and list transformation initiatives
1.4 Define digital risk in the context of the organization
1.5 Define digital resilience in the context of the organization
Digital risk drivers
Applicable definition of digital risk
Applicable definition of digital resilience
Understand the roles digital risk management and your digital risk profile have in helping your organization achieve safe, transformative growth.
An overview and understanding of digital risk categories and subsequent individual digital risk factors for the organization
Industry considerations that highlight the importance of managing digital risk
A structured approach to managing the categories of digital risk
2.1 Review and discuss industry case studies and industry examples of digital transformation and digital risk
2.2 Revise the organization's list of digital transformation initiatives (past, current, and future)
2.3 Begin to build your organization's Digital Risk Management Charter (with inputs from Module 1)
2.4 Revise, customize, and complete a Digital Risk Management Charter for the organization
Digital Risk Management Charter
Industry-specific digital risks, factors, considerations, and scenarios
The organization's digital risks mapped to its digital transformation initiatives
Develop an initial digital risk profile that identifies the organization’s core areas of focus in managing digital risk.
A unique digital risk profile for the organization
Digital risk management initiatives that are mapped against the organization's current strategic initiatives and aligned to meet your digital resilience objectives and benchmarks
3.1 Review category control questions within the Digital Risk Profile Tool
3.2 Complete all sections (tabs) within the Digital Risk Profile Tool
3.3 Assess the results of your Digital Risk Profile Tool
3.4 Discuss and assign initial weightings for ownership of digital risk among the organization's stakeholders
Completion of all category tabs within the Digital Risk Profile Tool
Initial stakeholder ownership assignments of digital risk categories
Refine the digital risk management plan for the organization.
A targeted, organization-specific approach to managing digital risk as a part of the organization's projects and initiatives on an ongoing basis
An executive presentation that outlines digital risk management for your senior leadership team
4.1 Conduct brief information sessions with the relevant digital risk stakeholders identified in Module 3.
4.2 Review and revise the organization's Digital Risk Profile as necessary, including adjusting weightings for the digital risk categories
4.3 Begin to build an actionable digital risk management plan
4.4 Present your findings to the organization's relevant risk leaders and executive team
A finalized and assessed Digital Risk Profile Tool
Stakeholder ownership for digital risk management
A draft Digital Risk Management plan and Digital Risk Management Executive Report
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Leverage the top metrics for every CIO to help focus your attention and provide insight into actionable steps.
Be the strategic CIO who monitors the right metrics relevant to their priorities – regardless of industry or organization. When CIOs provide a laundry list of metrics they are consistently measuring and monitoring, it demonstrates a few things.
First, they are probably measuring more metrics than they truly care about or could action. These “standardized” metrics become something measured out of expectation, not intention; therefore, they lose their meaning and value to you as a CIO. Stop spending time on these metrics you will be unable or unwilling to address.
Secondly, it indicates a lack of trust in the IT leadership team, who can and should be monitoring these commonplace operational measures. An empowered IT leader will understand the responsibility they have to inform the CIO should a metric be derailing from the desired outcome.
|
Brittany Lutes
Senior Research Analyst Organizational Transformation Practice Info-Tech Research Group |
| Your Challenge
CIOs need to measure a set of specific metrics that:
|
Common Obstacles
CIOs often cannot define these metrics because:
|
Info-Tech’s Approach
For every CIO, there are six areas that should be a focus, no matter your organization or industry. These six priorities will inform the metrics worth measuring:
|
The top metrics for a CIO to measure and monitor have very little to do with IT and everything to do with ensuring the success of the business.
CIOs are not using metrics as a personal tool to advance the organization:
|
“CIOs are businesspeople first and technology people second.” (Myles Suer, Source: CIO, 2019.) |
These barriers make this challenge difficult to address for many CIOs:
|
CIO priorities are business priorities
46% of CIOs are transforming operations, focused on customer experiences and employee productivity. (Source: Foundry, 2022.) Finances (41.3%) and customers (28.1%) remain the top two focuses for CIOs when measuring IT effectiveness. All other focuses combine for the remaining 30.6%. (Source: Journal of Informational Technology Management, 2018.) |
| Organizational goals inform CIO metrics
|
The Info-Tech difference:
|
| MANAGING TO A BUDGET
Reducing operational costs and increasing strategic IT spend. |
|
DELIVERING ON BUSINESS OBJECTIVES
Aligning IT initiatives to the vision of the organization. |
| CUSTOMER SATISFACTION
Directly and indirectly impacting customer experience. |
EMPLOYEE ENGAGEMENT
Creating an IT workforce of engaged and purpose-driven people. |
|
| RISK MANAGEMENT
Actively knowing and mitigating threats to the organization. |
BUSINESS LEADERSHIP RELATONS
Establishing a network of influential business leaders. |
|
Using priority-based metrics allows you to make incremental improvements that can be measured and reported on, which makes program maturation a natural process. |

* Arrow indicates month-over-month trend
|
"The way to make a metric successful is by understanding why you are measuring it." (Jeff Neyland CIO) |
|
As a CIO, avoid spending time on operational metrics such as:
|
While operational metrics are important to your organization, IT leaders should be empowered and responsible for their management.
The impact of IT risks to your organization cannot be ignored any further
|
Risk management metric:Number of critical IT threats that were detected and prevented before impact to the organization. |
Other risk-related metrics:
|
49%Investing in RiskHeads of IT “cited increasing cybersecurity protections as the top business initiative driving IT investments this year” (Source: Foundry, 2022.) |
Deliver on initiatives that bring value to your organization and stop benchmarking
|
Business Objective Alignment Metric:Percentage of IT metrics have a direct line of impact to the business goals |
Other business alignment metrics:
|
50%CIOs drive the businessThe percentage of CEOs that recognize the CIO as the main driver of the business strategy in the next 2-3 years. (Source: Deloitte, 2020.) |
Directly or indirectly, IT influences how satisfied the customer is with their product or service
|
Customer satisfaction metric:What is the positive impact ($ or %) of IT initiatives on customer satisfaction? |
Be the one to suggest new IT initiatives that will impact the customer experience – stop waiting for other business leaders to make the recommendation.
Other customer satisfaction metrics:
|
41%Direct CX interactionIn 2022, 41% of IT heads were directly interacting with the end customer. (Source: Foundry, 2022.) |
This is about more than just an annual engagement survey
|
Employee engagement metric:Number of employees who feel empowered to complete purposeful activities related to their job each day |
Other employee engagement metrics:
|
26%Act on engagementOnly 26% of leaders actually think about and act on engagement every single day. (Source: SHRM, 2022.) |
Leverage your relationships with other C-suite executives to demonstrate IT’s value
|
Business leadership relationship metric:Ability to influence business decisions with trusted partners. |
Other business relations metrics:
|
60%Enterprise-wide collaboration“By 2023, 60% of CIOs will be primarily measured for their ability to co-create new business models and outcomes through extensive enterprise and ecosystem-wide collaboration.” (Source: IDC, 2021.) |
Every CIO needs to be able to spend within budget while increasing their strategic impact
|
Budget management metric:Proportion of IT budget that is strategic versus operational. |
CIOs need to see their IT function as its own business – budget and spend like a CEO.
Other budget management metrics:
Action steps to take:
| 90%Direct CX interactionNinety percent of CIOs expect their budget to increase or remain the same in their next fiscal year. (Source: Foundry, 2022.) |
|
Jeff Neyland
Chief Information Officer – University of Texas at Arlington |
|
Brett Trelfa
SVP and CIO – Arkansas Blue Cross Blue Shield |
|
Lynn Fyhrlund
Chief Information Officer – Milwaukee County Department of Administrative Services |
| Vicki Van Alphen | Executive Counselor | Ibrahim Abdel-Kader | Research Analyst |
| Mary Van Leer | Executive Counselor | Graham Price | Executive Counselor |
| Jack Hakimian | Vice President Research | Valence Howden | Principal Research Director |
| Mike Tweedie | CIO Practice Lead | Tony Denford | Organization Transformation Practice Lead |
|
IT Metrics Library
|
|
Define Service Desk Metrics That Matter
|
|
CIO Priorities 2022
|
“Developing and Sustaining Employee Engagement.” SHRM, 2022.
Dopson, Elise. “KPIs Vs. Metrics: What’s the Difference & How Do You Measure Both?” Databox, 23 Jun. 2021.
Shirer, Michael, and Sarah Murray. “IDC Unveils Worldwide CIO Agenda 2022 Predictions.” IDC, 27 Oct. 2021.
Suer, Myles. “The Most Important Metrics to Drive IT as a Business.” CIO, 19 Mar. 2019.
“The new CIO: Business Savvy.” Deloitte Insights. Deloitte, 2020.
“2022 State of the CIO: Rebalancing Act: CIO’s Operational Pandemic-Era Innovation.” Foundry, 2022.
“Why Employee Engagement Matters for Leadership at all Levels.” Walden University, 20 Dec. 2019.
Zhang, Xihui, et al. “How to Measure IT Effectiveness: The CIO’s Perspective.” Journal of Informational Technology Management, 29(4). 2018.
Build a chatbot that creates value for your business
Read our concise Executive Brief to find out why you building a chatbot proof of concept is a good idea, review our methodology, and understand the four ways we can support you to successfully complete this project. Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Build the right metrics to measure the success of your chatbot POC
Architect the chatbot to maximize business value
Now take your chatbot proof of concept to production
Data security consultancy makes up one of Tymans Group’s areas of expertise as a corporate consultancy firm. We are happy to offer our insights and solutions regarding data security and risk to businesses, both through online and offline channels. Read on and discover how our consultancy company can help you set up practical data security management solutions within your firm.
Data security management should be an important aspect of your business. As a data security consultancy firm, Tymans Group is happy to assist your small or medium-sized enterprise with setting up clear protocols to keep your data safe. As such, we can advise on various aspects comprising data security management. This ranges from choosing a fit-for-purpose data architecture to introducing IT incident management guidelines. Moreover, we can perform an external IT audit to discover which aspects of your company’s data security are vulnerable and which could be improved upon.
Embed security thinking through aligning your security strategy to business goals and values
Data security is just one aspect with which our consultancy firm can assist your company. Tymans Group offers its extensive expertise in various corporate management domains, such as quality management and risk management. Our solutions all stem from our vast expertise and have proven their effectiveness. Moreover, when you choose to employ our consultancy firm for your data security management, you benefit from a holistic, people-oriented approach.
Do you wish to learn more about our data security management solutions and services for your company? We are happy to analyze any issues you may be facing and offer you a practical solution if you contact us for an appointment. You can book a one-hour online talk or elect for an on-site appointment with our experts. Contact us to set up your appointment now.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Decide if an EA tool is needed in your organization and define the requirements of EA tool users.
Determine your organization’s preferences in terms of product capabilities and vendor characteristics.
Gather information on shortlisted vendors and make your final decision.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Read our executive brief to understand why you should develop a PPM strategy and understand how our methodology can help you. We show you how we can support you.
Ensure your strategy is a cultural fit or cultural-add for your company.
Use the advice and tools in this stage to align the PPM processes.
Use the inputs from the previous stages and add a cost-benefit analysis and tool recommendation.
Define quality standards in maintenance practices. Enforce these in alignment with the governance you have set up. Show a high degree of transparency and open discussions on development challenges.
Most organizations go through an organizational redesign to:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
The purpose of this storyboard is to provide a four-phased approach to organizational redesign.
Use this templated Communication Deck to ensure impacted stakeholders have a clear understanding of why the new organizational structure is needed and what that structure will look like.
This template provides IT leaders with an opportunity to present their case for a change in organizational structure and roles to secure the funding and buy-in required to operate in the new structure.
This Workbook allows IT and business leadership to work through the steps required to complete the organizational redesign process and document key rationale for those decisions.
Refer to this tool when working through the redesign process to better understand the operating model sketches and the capability definitions. Each capability has been tied back to core frameworks that exist within the information and technology space.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process.
Clearly articulate why this organizational redesign is needed and the implications the strategies and context will have on your structure.
1.1 Define the org design drivers.
1.2 Document and define the implications of the business context.
1.3 Align the structure to support the strategy.
1.4 Establish guidelines to direct the organizational design process.
Clear definition of the need to redesign the organizational structure
Understanding of the business context implications on the organizational structure creation.
Strategic impact of strategies on organizational design.
Customized Design Principles to rationalize and guide the organizational design process.
Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment.
A customized operating model sketch that informs what capabilities will make up your IT organization and how those capabilities will align to deliver value to your organization.
2.1 Augmented list of IT capabilities.
2.2 Capability gap analysis
2.3 Identified capabilities for outsourcing.
2.4 Select a base operating model sketch.
2.5 Customize the IT operating model sketch.
Customized list of IT processes that make up your organization.
Analysis of which capabilities require dedicated focus in order to meet goals.
Definition of why capabilities will be outsourced and the method of outsourcing used to deliver the most value.
Customized IT operating model reflecting sourcing, centralization, and intended delivery of value.
Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities.
A detailed organizational chart reflecting team structures, reporting structures, and role responsibilities.
3.1 Categorize your IT capabilities within your defined functional work units.
3.2 Create a mandate statement for each work unit.
3.3 Define roles inside the work units and assign accountability and responsibility.
3.4 Finalize your organizational structure.
Capabilities Organized Into Functional Groups
Functional Work Unit Mandates
Organizational Chart
Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders.
A clear plan of action on how to transition to the new structure, communicate the new organizational structure, and measure the effectiveness of the new structure.
4.1 Identify and mitigate key org design risks.
4.2 Define the transition plan.
4.3 Create the change communication message.
4.4 Create a standard set of FAQs.
4.5 Align sustainment metrics back to core drivers.
Risk Mitigation Plan
Change Communication Message
Standard FAQs
Implementation and sustainment metrics.
Allison Straker
Research Director,
Organizational Transformation
Brittany Lutes
Senior Research Analyst,
Organizational Transformation
An organizational structure is much more than a chart with titles and names. It defines the way that the organization operates on a day-to-day basis to enable the successful delivery of the organization’s information and technology objectives. Moreover, organizational design sees beyond the people that might be performing a specific role. People and role titles will and often do change frequently. Those are the dynamic elements of organizational design that allow your organization to scale and meet specific objectives at defined points of time. Capabilities, on the other hand, are focused and related to specific IT processes.
Redesigning an IT organizational structure can be a small or large change transformation for your organization. Create a structure that is equally mindful of the opportunities and the constraints that might exist and ensure it will drive the organization towards its vision with a successful implementation. If everyone understands why the IT organization needs to be structured that way, they are more likely to support and adopt the behaviors required to operate in the new structure.
Your organization needs to reorganize itself because:
Many organizations struggle when it comes redesigning their IT organizational structure because they:
Successful IT organization redesign includes:
A successful redesign requires a strong foundation and a plan to ensure successful adoption. Without these, the organizational chart has little meaning or value.
Organizational design is a challenge for many IT and digital executives
69% of digital executives surveyed indicated challenges related to structure, team silos, business-IT alignment, and required roles when executing on a digital strategy.
To overcome these barriers:
75% The percentage of change efforts that fail.
55% The percentage of practitioners who identify how information flows between work units as a challenge for their organization.
IT organizational design refers to the process of aligning the organization’s structure, processes, metrics, and talent to the organization’s strategic plan to drive efficiency and effectiveness.
Why is the right IT organizational design so critical to success? |
||
Adaptability is at the core of staying competitive today |
Structure is not just an organizational chart |
Organizational design is a never-ending process |
Digital technology and information transparency are driving organizations to reorganize around customer responsiveness. To remain relevant and competitive, your organizational design must be forward looking and ready to adapt to rapid pivots in technology or customer demand. |
The design of your organization dictates how roles function. If not aligned to the strategic direction, the structure will act as a bungee cord and pull the organization back toward its old strategic direction (ResearchGate.net, 2014). Structure supports strategy, but strategy also follows structure. |
Organization design is not a one-time project but a continuous, dynamic process of organizational self-learning and continuous improvement. Landing on the right operating model will provide a solid foundation to build upon as the organization adapts to new challenges and opportunities. |
Organizational design the process in which you intentionally align the organizational structure to the strategy. It considers the way in which the organization should operate and purposely aligns to the enterprise vision. This process often considers centralization, sourcing, span of control, specialization, authority, and how those all impact or are impacted by the strategic goals.
Operating models provide an architectural blueprint of how IT capabilities are organized to deliver value. The placement of the capabilities can alter the culture, delivery of the strategic vision, governance model, team focus, role responsibility, and more. Operating model sketches should be foundational to the organizational design process, providing consistency through org chart changes.
The organizational structure is the chosen way of aligning the core processes to deliver. This can be strategic, or it can be ad hoc. We recommend you take a strategic approach unless ad hoc aligns to your culture and delivery method. A good organizational structure will include: “someone with authority to make the decisions, a division of labor and a set of rules by which the organization operates” (Bizfluent, 2019).
The capstone of this change initiative is an easy-to-read chart that visualizes the roles and reporting structure. Most organizations use this to depict where individuals fit into the organization and if there are vacancies. While this should be informed by the structure it does not necessarily depict workflows that will take place. Moreover, this is the output of the organizational design process.
All three elements of the Technology Value Trinity work in harmony to delivery business value and achieve strategic needs. As one changes, the others need to change as well.
How do these three elements relate?
Too often strategy, organizational design, and governance are considered separate practices – strategies are defined without teams and resources to support. Structure must follow strategy.
Like a story, a strategy without a structure to deliver on it is simply words on paper.
Books begin by setting the foundation of the story.
Introduce your story by:
The plot cannot thicken without the foundation. Your organizational structure and chart should not exist without one either.
The steps to establish your organizational chart - with functional teams, reporting structure, roles, and responsibilities defined – cannot occur without a clear definition of goals, need, and context. An organizational chart alone won’t provide the insight required to obtain buy-in or realize the necessary changes.
Conclude your story through change management and communication.
Good stories don’t end without referencing what happened before. Use the literary technique of foreshadowing – your change management must be embedded throughout the organizational redesign process. This will increase the likelihood that the organizational structure can be communicated, implemented, and reinforced by stakeholders.
Once your IT strategy is defined, it is critical to identify the capabilities that are required to deliver on those strategic initiatives. Each initiative will require a combination of these capabilities that are only supported through the appropriate organization of roles, skills, and team structures.
For each phase of this blueprint, its important to consider change management. These are the points when you need to communicate the structure changes:
Do not undertake an organizational redesign initiative if you will not engage in change management practices that are required to ensure its successful adoption.
Given that the organizational redesign is intended to align with the overall vision and objectives of the business, many of the metrics that support its success will be tied to the business. Adapt the key performance indicators (KPIs) that the business is using to track its success and demonstrate how IT can enable the business and improve its ability to reach those targets.
The percentage of resources dedicated to strategic priorities and initiatives supported by IT operating model. While operational resources are necessary, ensuring people are allocating time to strategic initiatives as well will drive the business towards its goal state. Leverage Info-Tech’s IT Staffing Assessment diagnostic to benchmark your IT resource allocation.
Assess the improvement in business satisfaction overall with IT year over year to ensure the new structure continues to drive satisfaction across all business functions. Leverage Info-Tech’s CIO Business Vision diagnostic to see how your IT organization is perceived.
The degree of clarity that IT employees have around their role and its core responsibilities can lead to employee engagement and retention. Consider measuring this core job driver by leveraging Info-Tech’s Employee Engagement Program.
Measure customer satisfaction with technology-enabled business services or products and improvements in technology-enabled client acquisition or retention processes. Assess the percentage of users satisfied with the quality of IT service delivery and leverage Info-Tech’s End-User Satisfaction Survey to determine improvements.
Phase |
1. Establish the Organizational Design Foundation |
2. Create the Operating Model Sketch |
3. Formalize the Organizational Structure |
4. Plan for Implementation and Change |
|---|---|---|---|---|
Phase Outcomes |
Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process. |
Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment. |
Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities. |
Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders. |
Organizational redesign processes focus on defining the ways in which you want to operate and deliver on your strategy – something an organizational chart will never be able to convey.
Focus on your organization, not someone else's’. Benchmarking your organizational redesign to other organizations will not work. Other organizations have different strategies, drivers, and context.
An operating model sketch that is customized to your organization’s specific situation and objectives will significantly increase the chances of creating a purposeful organizational structure.
If you follow the steps outlined in the first three phases, creating your new organizational chart should be one of the fastest activities.
Throughout the creation of a new organizational design structure, it is critical to involve the individuals and teams that will be impacted.
You could have the best IT employees in the world, but if they aren’t structured well your organization will still fail in reaching its vision.
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Communication Deck
Communicate the changes to other key stakeholders such as peers, managers, and staff.
Workbook
As you work through each of the activities, use this workbook as a place to document decisions and rationale.
Reference Deck
Definitions for every capability, base operating model sketches, and sample organizational charts aligned to those operating models.
Job Descriptions
Key deliverable:
Executive Presentation
Leverage this presentation deck to gain executive buy-in for your new organizational structure.
INDUSTRY: Government
SOURCE: Analyst Interviews and Working Sessions
IT was tasked with providing equality to the different business functions through the delivery of shared IT services. The government created a new IT organizational structure with a focus on two areas in particular: strategic and operational support capabilities.
When creating the new IT structure, an understanding of the complex and differing needs of the business functions was not reflected in the shared services model.
As a result, the new organizational structure for IT did not ensure adequate meeting of business needs. Only the operational support structure was successfully adopted by the organization as it aligned to the individual business objectives. The strategic capabilities aspect was not aligned to how the various business lines viewed themselves and their objectives, causing some partners to feel neglected.
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
Diagnostics and consistent frameworks are used throughout all four options.
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is 8 to 12 calls over the course of 4 to 6 months.
Phase 1
Call #1: Define the process, understand the need, and create a plan of action.
Phase 2
Call #2: Define org. design drivers and business context.
Call #3: Understand strategic influences and create customized design principles.
Call #4: Customize, analyze gaps, and define sourcing strategy for IT capabilities.
Call #5: Select and customize the IT operating model sketch.
Phase 3
Call #6: Establish functional work units and their mandates.
Call #7: Translate the functional organizational chart to an operational organizational chart with defined roles.
Phase 4
Call #8: Consider risks and mitigation tactics associated with the new structure and select a transition plan.
Call #9: Create your change message, FAQs, and metrics to support the implementation plan.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Day 1 |
Day 2 |
Day 3 |
Day 4 |
Day 5 |
|
|---|---|---|---|---|---|
Establish the Organizational Redesign Foundation |
Create the Operating Model Sketch |
Formalize the Organizational Structure |
Plan for Implementation and Change |
Next Steps and |
|
Activities |
1.1 Define the org. design drivers. 1.2 Document and define the implications of the business context. 1.3 Align the structure to support the strategy. 1.4 Establish guidelines to direct the organizational design process. |
2.1 Augment list of IT capabilities. 2.2 Analyze capability gaps. 2.3 Identify capabilities for outsourcing. 2.4 Select a base operating model sketch. 2.5 Customize the IT operating model sketch. |
3.1 Categorize your IT capabilities within your defined functional work units. 3.2 Create a mandate statement for each work unit. 3.3 Define roles inside the work units and assign accountability and responsibility. 3.4 Finalize your organizational structure. |
4.1 Identify and mitigate key org. design risks. 4.2 Define the transition plan. 4.3 Create the change communication message. 4.4 Create a standard set of FAQs. 4.5 Align sustainment metrics back to core drivers. |
5.1 Complete in-progress deliverables from previous four days. 5.2 Set up review time for workshop deliverables and to discuss next steps. |
Deliverables |
|
|
|
|
|
PART 1: DESIGN |
PART 2: STRUCTURE |
PART 3: IMPLEMENT |
|||
|---|---|---|---|---|---|
IT Organizational Architecture |
Organizational Sketch |
Organizational Structure |
Organizational Chart |
Transition Strategy |
Implement Structure |
|
1. Define the organizational design drivers, business context, and strategic alignment. 2. Create customized design principles. 3. Develop and customize a strategically aligned operating model sketch. 4. Define the future-state work units. 5. Create future-state work unit mandates. |
6. Define roles by work unit. 7. Turn roles into jobs with clear capability accountabilities and responsibilities. 8. Define reporting relationships between jobs. 9. Assess options and select go-forward organizational sketch. |
11. Validate organizational sketch. 12. Analyze workforce utilization. 13. Define competency framework. 14. Identify competencies required for jobs. |
15. Determine number of positions per job 16. Conduct competency assessment. 17. Assign staff to jobs. 18. Build a workforce and staffing plan. |
19. Form an OD implementation team. 20. Develop change vision. 21. Build communication presentation. 22. Identify and plan change projects. 23. Develop organizational transition plan. |
24. Train managers to lead through change. 25. Define and implement stakeholder engagement plan. 26. Develop individual transition plans. 27. Implement transition plans. |
Risk Management: Create, implement, and monitor risk management plan.
HR Management: Develop job descriptions, conduct job evaluation, and develop compensation packages.
Monitor and Sustain Stakeholder Engagement
This phase will walk you through the following activities:
1.1 Define the organizational redesign driver(s)
1.2 Create design principles based on the business context
1.3a (Optional Exercise) Identify the capabilities from your value stream
1.3b Identify the capabilities required to deliver on your strategies
1.4 Finalize your list of design principles
This phase involves the following participants:
Changes are most successful when leaders clearly articulate the reason for the change – the rationale for the organizational redesign of the IT function. Providing both staff and executive leaders with an understanding for this change is imperative to its success. Despite the potential benefits to a redesign, they can be disruptive. If you are unable to answer the reason why, a redesign might not be the right initiative for your organization.
Employees who understand the rationale behind decisions made by executive leaders are 3.6 times more likely to be engaged.
Successful adoption of the new organizational design requires change management from the beginning. Start considering how you will convey the need for organizational change within your IT organization.
All aspects of your IT organization’s structure should be designed with the business’ context and strategic direction in mind.
Use the following set of slides to extract the key components of your drivers, business context, and strategic direction to land on a future structure that aligns with the larger strategic direction.
Driver(s) can originate from within the IT organization or externally. Ensuring the driver(s) are easy to understand and articulate will increase the successful adoption of the new organizational structure.
Defines the interactions that occur throughout the organization and between the organization and external stakeholders. The context provides insight into the environment by both defining the purpose of the organization and the values that frame how it operates.
The IT strategy should be aligned to the overall business strategy, providing insight into the types of capabilities required to deliver on key IT initiatives.
Where are we today?
Determine the current overall maturity level of the IT organization.
Where do we want to be as an organization?
Use the inputs from Info-Tech’s diagnostic data to determine where the organization should be after its reorganization.
How can you leverage these results?
The result of these diagnostics will inform the design principles that you’ll create in this phase.
CIO Business Vision Diagnostic
Management & Governance Diagnostic
Effectiveness is a concern:
New capabilities are needed:
Lack of business understanding
Workforce challenges
Avoid change for change’s sake. Restructuring could completely miss the root cause of the problem and merely create a series of new ones.
1-2 hours
Input |
Output |
|
|
Materials |
Participants |
|
|
Record the results in the Organizational Design Communications Deck
Workforce Considerations:
Business Context Consideration |
IT Org. Design Implication |
|
Culture: Culture, "the way we do things here,” has huge implications for executing strategy, driving engagement, and providing a guiding force that ensures organizations can work together toward common goals.
|
Consider whether your organization’s culture can accept the operating model and organizational structure changes that make sense on paper. Certain cultures may lean toward particular operating models. For example, the demand-develop-service operating model may be supported by a cooperative culture. A traditional organization may lean towards the plan-build-run operating model. Ensure you have considered your current culture and added exercises to support it. If more capacity is required to accomplish the goals of the organization, you’ll want to prepare the leaders and explain the need in your design principles (to reflect training, upskilling, or outsourcing). Unionized environments require additional consideration. They may necessitate less structural changes, and so your principles will need to reflect other alternatives (hiring additional resources, creative options) to support organizational needs. Hybrid or fully remote workforces may impact how your organization interacts. |
Business Context Consideration | IT Org. Design Implication |
Control & Governance: It is important to consider how your organization is governed, how decisions are made, and who has authority to make decisions. Strategy tells what you do, governance validates you’re doing the right things, and structure is how you execute on what’s been approved.
| Organizations that require more controls may lean toward more centralized governance. Organizations that are looking to better enable and empower their divisions (products, groups, regions, etc.) may look to embed governance in these parts of the organization. For enterprise organizations, consider where IT has authority to make decisions (at the global, local, or system level). Appropriate governance needs to be built into the appropriate levels. |
Business Context Consideration | IT Org. Design Implication |
Financial Constraints: Follow the money: You may need to align your IT organization according to the funding model.
| Determine if you can move forward with a new model or if you can adjust your existing one to suit the financial constraints. If you have no say over your funding, pre-work may be required to build a business case to change your funding model before you look at your organizational structure – without this, you might have to rule out centralized and focus on hybrid/centralized. If you don’t control the budget (funding comes from your partners), it will be difficult to move to a more centralized model. A federated business organization may require additional IT governance to help prioritize across the different areas. Budgets for digital transformation might come from specific areas of the business, so resources may need to be aligned to support that. You’ll have to consider how you will work with those areas. This may also impact the roles that are going to exist within your IT organization – product owners or division owners might have more say. |
Business Context Consideration | IT Org. Design Implication |
Business Perspective of IT: How the business perceives IT and how IT perceives itself are sometimes not aligned. Make sure the business’ goals for IT are well understood.
Business Organization Structure and Growth:
| If IT needs to become more of a business partner, you’ll want to define what that means to your organization and focus on the capabilities to enable this. Educating your partners might also be required if you’re not aligned. For many organizations, this will include stakeholder management, innovation, and product/project management. If IT and its business partners are satisfied with an order-taker relationship, be prepared for the consequences of that. A global organization will require different IT needs than a single location. Specifically, site reliability engineering (SRE) or IT support services might be deployed in each region. Organizations growing through mergers and acquisitions can be structured differently depending on what the organization needs from the transaction. A more centralized organization may be appropriate if the driver is reuse for a more holistic approach, or the organization may need a more decentralized organization if the acquisitions need to be handled uniquely. |
Business Context Consideration | IT Org. Design Implication |
Sourcing Strategy:
Change Tolerance:
| Your sourcing strategy affects your organizational structure, including what capabilities you group together. Since managing outsourced capabilities also includes the need for vendor management, you’ll need to ensure there aren’t too many capabilities required per leader. Look closely at what can be achieved through your operating model if IT is done through other groups. Even though these groups may not be in scope of your organization changes, you need to ensure your IT team works with them effectively. If your organization is going to push back if there are big structural changes, consider whether the changes are truly necessary. It may be preferred to take baby steps – use an incremental versus big-bang approach. A need for incremental change might mean not making a major operating model change. |
Business Context Consideration | IT Org Design. Implication |
Stakeholder Engagement & Focus: Identify who your customers and stakeholders are; clarify their needs and engagement model.
Business Vision, Services, and Products: Articulate what your organization was built to do.
| For a customer or user focus, ensure capabilities related to understanding needs (stakeholder, UX, etc.) are prioritized. Hybrid, decentralized, or demand-develop-service models often have more of a focus on customer needs. Outsourcing the service desk might be a consideration if there’s a high demand for the service. A differentiation between these users might mean there’s a different demand for services. Think broadly in terms of your organizational vision, not just the tactical (widget creation). You might need to choose an operating model that supports vision. Do you need to align your organization with your value stream? Do you need to decentralize specific capabilities to enable prioritization of the key capabilities? |
1-3 hours
| Input | Output |
|
|
Materials | Participants |
|
|
Record the results in the Organizational Design Communications Deck
Designing your IT organization requires an assessment of what it needs to be built to do:
The IT organization must reflect your business needs:
1 hour
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Communications Deck
Ensure that you have a clear view of the goals and initiatives that are needed in your organization. Your IT, digital, business, and/or other strategies will surface the IT capabilities your organization needs to develop. Identify the goals of your organization and the initiatives that are required to deliver on them. What capabilities are required to enable these? These capabilities will need to be reflected in your design principles.
Sample initiatives and capabilities from an organization’s strategies
1 hour
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Communications Deck
Your organizational design principles should define a set of loose rules that can be used to design your organizational structure to the specific needs of the work that needs to be done. These rules will guide you through the selection of the appropriate operating model that will meet your business needs. There are multiple ways you can hypothetically organize yourself to meet these needs, and the design principles will point you in the direction of which solution is the most appropriate as well as explain to your stakeholders the rationale behind organizing in a specific way. This foundational step is critical: one of the key reasons for organizational design failure is a lack of requisite time spent on the front-end understanding what is the best fit.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Communications Deck
Design Principle |
Description |
Decision making |
We will centralize decision making around the prioritization of projects to ensure that the initiatives driving the most value for the organization as a whole are executed. |
Fit for purpose |
We will build and maintain fit-for-purpose solutions based on business units’ unique needs. |
Reduction of duplication |
We will reduce role and application duplication through centralized management of assets and clearly differentiated roles that allow individuals to focus within key capability areas. |
Managed security |
We will manage security enterprise-wide and implement compliance and security governance policies. |
Reuse > buy > build |
We will maximize reuse of existing assets by developing a centralized application portfolio management function and approach. |
Managed data |
We will create a specialized data office to provide data initiatives with the focus they need to enable our strategy. |
Design Principle |
Description |
Controlled technical diversity |
We will control the variety of technology platforms we use to allow for increased operability and reduction of costs. |
Innovation |
R&D and innovation are critical – we will build an innovation team into our structure to help us meet our digital agenda. |
Resourcing |
We will separate our project and maintenance activities to ensure each are given the dedicated support they need for success and to reduce the firefighting mentality. |
Customer centricity |
The new structure will be directly aligned with customer needs – we will have dedicated roles around relationship management, requirements, and strategic roadmapping for business units. |
Interoperability |
We will strengthen our enterprise architecture practices to best prepare for future mergers and acquisitions. |
Cloud services |
We will move toward hosted versus on-premises infrastructure solutions, retrain our data center team in cloud best practices, and build roles around effective vendor management, cloud provisioning, and architecture. |
This phase will walk you through the following activities:
2.1 Augment the capability list
2.2 Heatmap capabilities to determine gaps in service
2.3 Identify the target state of sourcing for your IT capabilities
2.4 Review and select a base operating model sketch
2.5 Customize the selected overlay to reflect the desired future state
This phase involves the following participants:
Obtain desire from stakeholders to move forward with organizational redesign initiative by involving them in the process to gain interest. This will provide the stakeholders with assurance that their concerns are being heard and will help them to understand the benefits that can be anticipated from the new organizational structure.
“You’re more likely to get buy-in if you have good reason for the proposed changes – and the key is to emphasize the benefits of an organizational redesign.”
Just because people are aware does not mean they agree. Help different stakeholders understand how the change in the organizational structure is a benefit by specifically stating the benefit to them.
Capabilities
Competencies
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Assess the gaps between where you currently are and where you need to be. Evaluate how critical and how effective your capabilities are:
Remember to identify what allows the highly effective capabilities to perform at the capacity they are. Leverage this when increasing effectiveness elsewhere.
High Gap
There is little to no effectiveness (high gap) and the capability is highly important to your organization.
Medium Gap
Current ability is medium in effectiveness (medium gap) and there might be some priority for that capability in your organization.
Low Gap
Current ability is highly effective (low gap) and the capability is not necessarily a priority for your organization.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
There are a few different “types” of outsourcing:
Insourcing |
Staff Augmentation |
Managed Service |
Competitive Advantage |
|
|---|---|---|---|---|
Description |
The organization maintains full responsibility for the management and delivery of the IT capability or service. |
Vendor provides specialized skills and enables the IT capability or service together with the organization to meet demand. |
Vendor completely manages the delivery of value for the IT capability, product or service. |
Vendor has unique skills, insights, and best practices that can be taught to staff to enable insourced capability and competency. |
Benefits |
|
|
|
|
Drawbacks |
|
|
|
|
Capability |
Capacity |
Outsourcing Model |
|---|---|---|
Low |
Low |
Your solutions may be with you for a long time, so it doesn’t matter whether it is a strategic decision to outsource development or if you are not able to attract the talent required to deliver in your market. Look for a studio, agency, or development shop that has a proven reputation for long-term partnership with its clients. |
Low |
High |
Your team has capacity but needs to develop new skills to be successful. Look for a studio, agency, or development shop that has a track record of developing its customers and delivering solutions. |
High |
Low |
Your organization knows what it is doing but is strapped for people. Look at “body shops” and recruiting agencies that will support short-term development contracts that can be converted to full-time staff or even a wholesale development shop acquisition. |
High |
High |
You have capability and capacity for delivering on your everyday demands but need to rise to the challenge of a significant, short-term rise in demand on a critical initiative. Look for a major system integrator or development shop with the specific expertise in the appropriate technology. |
Sourcing Criteria | Description | |
|---|---|---|
Determine whether you’ll outsource using these criteria | 1. Critical or commodity | Determine whether the component to be sourced is critical to your organization or if it is a commodity. Commodity components, which are either not strategic in nature or related to planning functions, are likely candidates for outsourcing. Will you need to own the intellectual property created by the third party? Are you ok if they reuse that for their other clients? |
2. Readiness to outsource | Identify how easy it would be to outsource a particular IT component. Consider factors such as knowledge transfer, workforce reassignment or reduction, and level of integration with other components. Vendor management readiness – ensuring that you have sufficient capabilities to manage vendors – should also be considered here. | |
3. In-house capabilities | Determine if you have the capability to deliver the IT solutions in-house. This will help you establish how easy it would be to insource an IT component. | |
4. Ability to attract resources (internal vs. outsourced) | Determine if the capability is one that is easily sourced with full-time, internal staff or if it is a specialty skill that is best left for a third-party to source. | |
Determine your sourcing model using these criteria | 5. Cost | Consider the total cost (investment and ongoing costs) of the delivery of the IT component for each of the potential sourcing models for a component. |
| 6. Quality | Define the potential impact on the quality of the IT component being sourced by the possible sourcing models. | |
| 7. Compliance | Determine whether the sourcing model would fit with regulations in your industry. For example, a healthcare provider would only go for a cloud option if that provider is HIPAA compliant. | |
| 8. Security | Identify the extent to which each sourcing option would leave your organization open to security threats. | |
| 9. Flexibility | Determine the extent to which the sourcing model will allow your organization to scale up or down as demand changes. |
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
An IT operating model sketch is a visual representation of the way your IT organization needs to be designed and the capabilities it requires to deliver on the business mission, strategic objectives, and technological ambitions. It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint.
The visual should be the optimization and alignment of the IT organization’s structure to deliver the capabilities required to achieve business goals. Additionally, it should clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization. Investing time in the front end getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and your model to change as the business changes.
Every structure decision you make should be based on an identified need, not on a trend.Build your IT organization to enable the priorities of the organization.
Centralized |
Hybrid |
Decentralized |
|
|---|---|---|---|
| Advantages |
|
|
|
Disadvantages |
|
|
|
Decentralization can take a number of different forms depending on the products the organization supports and how the organization is geographically distributed. Use the following set of explanations to understand the different types of decentralization possible and when they may make sense for supporting your organizational objectives.
Decentralization by lines of business (LoB) aligns decision making with business operating units based on related functions or value streams. Localized priorities focus the decision making from the CIO or IT leadership team. This form of decentralization is beneficial in settings where each line of business has a unique set of products or services that require specific expertise or flexible resourcing staffing between the teams.
Decentralization by product line organizes your team into operationally aligned product families to improve delivery throughput, quality, and resource flexibility within the family. By adopting this approach, you create stable product teams with the right balance between flexibility and resource sharing. This reinforces value delivery and alignment to enterprise goals within the product lines.
Geographical decentralization reflects a shift from centralized to regional influences. When teams are in different locations, they can experience a number of roadblocks to effective communication (e.g. time zones, regulatory differences in different countries) that may necessitate separating those groups in the organizational structure, so they have the autonomy needed to make critical decisions.
Functional decentralization allows the IT organization to be separated by specialty areas. Organizations structured by functional specialization can often be organized into shared service teams or centers of excellence whereby people are grouped based on their technical, domain, or functional area within IT (Applications, Data, Infrastructure, Security, etc.). This allows people to develop specialized knowledge and skills but can also reinforce silos between teams.
1 hour
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
The following bridges might be necessary to augment your divisions:
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Document the final operating model sketch in the Communications Deck
This phase will walk you through the following activities:
3.1 Create work units
3.2 Create work unit mandates
3.3 Define roles inside the work units
3.4 Finalize the organizational chart
3.5 Identify and mitigate key risks
This phase involves the following participants:
You don’t have to make the change in one big bang. You can adopt alternative transition plans such as increments or pilots. This allows people to see the benefits of why you are undergoing the change, allows the change message to be repeated and applied to the individuals impacted, and provides people with time to understand their role in making the new organizational structure successful.
“Transformational change can be invigorating for some employees but also highly disruptive and stressful for others.”
Without considering the individual impact of the new organizational structure on each of your employees, the change will undoubtedly fail in meeting its intended goals and your organization will likely fall back into old structured habits.
The organizational sketch is the outline of the organization that encompasses the work units and depicts the relationships among them. It’s important that you create the structure that’s right for your organization, not one that simply fits with your current staff’s skills and knowledge. This is why Info-Tech encourages you to use your operating model as a mode of guidance for structuring your future-state organizational sketch.
The organizational sketch is made up of unique work units. Work units are the foundational building blocks on which you will define the work that IT needs to get done. The number of work units you require and their names will not match your operating model one to one. Certain functional areas will need to be broken down into smaller work units to ensure appropriate leadership and span of control.
A work unit is a functional group or division that has a discrete set of processes or capabilities that it is responsible for, which don’t overlap with any others. Your customized list of IT capabilities will form the building blocks of your work units. Step one in the process of building your structure is grouping IT capabilities together that are similar or that need to be done in concert in the case of more complex work products. The second step is to iterate on these work units based on the organizational design principles from Phase 1 to ensure that the future-state structure is aligned with enablement of the organization’s objectives.
Here is a list of example work units you can use to brainstorm what your organization’s could look like. Some of these overlap in functionality but should provide a strong starting point and hint at some potential alternatives to your current way of organizing.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
A group consists of two or more individuals who are working toward a common goal. Group formation is how those individuals are organized to deliver on that common goal. It should take into consideration the levels of hierarchy in your structure, the level of focus you give to processes, and where power is dispersed within your organizational design.
Importance: Balance highly important capabilities with lower priority capabilities
Specialization: The scope of each role will be influenced by specialized knowledge and a dedicated leader
Effectiveness: Group capabilities that increase their efficacy
Span of Control: Identify the right number of employees reporting to a single leader
Smaller organizations will require less specialization simply out of necessity. To function and deliver on critical processes, some people might be asked to wear several hats.
When you say you are looking for a team that is a “jack of all trades,” you are likely exceeding appropriate cognitive loads for your staff and losing productivity to task switching.
Complexity: More complex work should have fewer direct reports. This often means the leader will need to provide lots of support, even engaging in the work directly at times.
Demand: Dynamic shifts in demand require more managerial involvement and therefore should have a smaller span of control. Especially if this demand is to support a 24/7 operation.
Competency Level: Skilled employees should require less hands-on assistance and will be in a better position to support the business as a member of a larger team than those who are new to the role.
Purpose: Strategic leaders are less involved in the day-to-day operations of their teams, while operational leaders tend to provide hands-on support, specifically when short-staffed.
Pick your poison…
It’s important to understand the impacts that team design has on your services and products. The solutions that a team is capable of producing is highly dependent on how teams are structured. For example, Conway’s Law tells us that small distributed software delivery teams are more likely to produce modular service architecture, where large collocated teams are better able to create monolithic architecture. This doesn’t just apply to software delivery but also other products and services that IT creates. Note that small distributed teams are not the only way to produce quality products as they can create their own silos.
The work unit mandate should provide a quick overview of the work unit and be clear enough that any reader can understand why the work unit exists, what it does, and what it is accountable for.
Each work unit will have a unique mandate. Each mandate should be distinguishable enough from your other work units to make it clear why the work is grouped in this specific way, rather than an alternative option. The mandate will vary by organization based on the agreed upon work units, design archetype, and priorities.
Don’t just adopt an example mandate from another organization or continue use of the organization’s pre-existing mandate – take the time to ensure it accurately depicts what that group is doing so that its value-added activities are clear to the larger organization.
The Office of the CIO will be a strategic enabler of the IT organization, driving IT organizational performance through improved IT management and governance. A central priority of the Office of the CIO is to ensure that IT is able to respond to evolving environments and challenges through strategic foresight and a centralized view of what is best for the organization.
The Project Management Office will provide standardized and effective project management practices across the IT landscape, including an identified project management methodology, tools and resources, project prioritization, and all steps from project initiation through to evaluation, as well as education and development for project managers across IT.
The Solutions Development Group will be responsible for the high-quality development and delivery of new solutions and improvements and the production of customized business reports. Through this function, IT will have improved agility to respond to new initiatives and will be able to deliver high-quality services and insights in a consistent manner.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Now that you have identified the main units of work in the target IT organization, it is time to identify the roles that will perform that work. At the end of this step, the key roles will be identified, the purpose statement will be built, and accountability and responsibility for roles will be clearly defined. Make sure that accountability for each task is assigned to one role only. If there are challenges with a role, change the role to address them (e.g. split roles or shift responsibilities).
Do not bias your role design by focusing on your existing staff’s competencies. If you begin to focus on your existing team members, you run the risk of artificially narrowing the scope of work or skewing the responsibilities of individuals based on the way it is, rather than the way it should be.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Despite popular belief, there is no such thing as the Spotify model, and organizations that structured themselves based on the original Spotify drawing might be missing out on key opportunities to obtain productivity from employees.
The primary goal of any product delivery team is to improve the delivery of value for customers and the business based on your product definition and each product’s demand. Each organization will have different priorities and constraints, so your team structure may take on a combination of patterns or may take on one pattern and then transform into another.
Delivery Team Structure Patterns |
How Are Resources and Work Allocated? |
|
|---|---|---|
Functional Roles |
Teams are divided by functional responsibilities (e.g. developers, testers, business analysts, operations, help desk) and arranged according to their placement in the software development lifecycle (SDLC). |
Completed work is handed off from team to team sequentially as outlined in the organization’s SDLC. |
Shared Service and Resource Pools |
Teams are created by pulling the necessary resources from pools (e.g. developers, testers, business analysts, operations, help desk). |
Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high. |
Product or System |
Teams are dedicated to the development, support, and management of specific products or systems. |
Work is directly sent to the teams who are directly managing the product or directly supporting the requester. |
Skills and Competencies |
Teams are grouped based on skills and competencies related to technology (e.g. Java, mobile, web) or familiarity with business capabilities (e.g. HR, Finance). |
Work is directly sent to the teams who have the IT and business skills and competencies to complete the work. |
Functional Roles | Shared Service and Resource Pools | Product or System | Skills and Competencies |
|---|---|---|---|
When your people are specialists versus having cross-functional skills | Leveraged when specialists such as Security or Operations will not have full-time work on the product | When you have people with cross-functional skills who can self-organize around a product’s needs | When you have a significant investment in a specific technology stack |
![]() | ![]() | ![]() | ![]() |
For more information about delivering in a product operating model, refer to our Deliver Digital Products at Scale blueprint.
1-3 hours
Input | Output |
|---|---|
|
|
Materials | Participants |
|
|
Record the results in the Organizational Design Workbook & Executive Communications Deck
Every organizational structure will include certain risks that should have been considered and accepted when choosing the base operating model sketch. Now that the final organizational structure has been created, consider if those risks were mitigated by the final organizational structure that was created. For those risks that weren’t mitigated, have a tactic to control risks that remain present.
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
This phase will walk you through the following activities:
4.1 Select a transition plan
4.2 Establish the change communication messages
4.3 Be consistent with a standard set of FAQs
4.4 Define org. redesign resistors
4.5 Create a sustainment plan
This phase involves the following participants:
Change management is: |
Managing a change that requires replanning and reorganizing and that causes people to feel like they have lost control over aspects of their jobs. – Padar et al., 2017 |
| People Process Technology |
| PREPARE | A | Awareness: Establish the need for organizational redesign and ensure this is communicated well. |
This blueprint is mostly focused on the prepare and transition components. |
| D | Desire: Ensure the new structure is something people are seeking and will lead to individual benefits for all. |
||
| TRANSITION | K | Knowledge: Provide stakeholders with the tools and resources to function in their new roles and reporting structure. |
|
| A | Ability: Support employees through the implementation and into new roles or teams. |
||
| FUTURE | R | Reinforcement: Emphasize and reward positive behaviors and attitudes related to the new organizational structure. |
Implementation Plan |
Transition Plan: Identify the appropriate approach to making the transition, and ensure the transition plan works within the context of the business. |
Communication Strategy: Create a method to ensure consistent, clear, and concise information can be provided to all relevant stakeholders. |
|
Plan to Address Resistance: Given that not everyone will be happy to move forward with the new organizational changes, ensure you have a method to hear feedback and demonstrate concerns have been heard. |
|
Employee Development Plan: Provide employees with tools, resources, and the ability to demonstrate these new competencies as they adjust to their new roles. |
|
Monitor and Sustain the Change: Establish metrics that inform if the implementation of the new organizational structure was successful and reinforce positive behaviors. |
As a result, your organization must adopt OCM practices to better support the acceptance and longevity of the changes being pursued.
Incremental Change |
Transformational Change |
Organizational change management is highly recommended and beneficial for projects that require people to:
|
Organizational change management is required for projects that require people to:
|
How you transition to the new organizational structure can be heavily influenced by HR. This is the time to be including them and leveraging their expertise to support the transition “how.”
Description | Pros | Cons | Example | |
Big Bang Change | Change that needs to happen immediately – “ripping the bandage off.” |
|
| A tsunami in Japan stopped all imports and exports. Auto manufacturers were unable to get parts shipped and had to immediately find an alternative supplier. |
Incremental Change | The change can be rolled out slower, in phases. |
|
| A change in technology, such as HRIS, might be rolled out one application at a time to ensure that people have time to learn and adjust to the new system. |
Pilot Change | The change is rolled out for only a select group, to test and determine if it is suitable to roll out to all impacted stakeholders. |
|
| A retail store is implementing a new incentive plan to increase product sales. They will pilot the new incentive plan at select stores, before rolling it out broadly. |
1-3 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Success of your new organizational structure hinges on adequate preparation and effective communication.
The top challenge facing organizations in completing the organizational redesign is their organizational culture and acceptance of change. Effective planning for the implementation and communication throughout the change is pivotal. Make sure you understand how the change will impact staff and create tailored plans for communication.
65% of managers believe the organizational change is effective when provided with frequent and clear communication.
Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.
The organizational change message should:
2 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Be Clear |
|
Be Consistent |
|
Be Concise |
|
Be Relevant |
|
As a starting point for building an IT organizational design implementation, look at implementing an FAQ that will address the following:
Questions to consider answering:
1 hour
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
People resist changes for many reasons. When it comes to organizational redesign changes, some of the most common reasons people resist change include a lack of understanding, a lack of involvement in the process, and fear.
Assess employee to determine competency levels and interests.
Employee drafts development goals; manager reviews.
Manager helps with selection of development activities.
Manager provides ongoing check-ins, coaching, and feedback.
Sustain the change by following through with stakeholders, gathering feedback, and ensuring that the change rationale and impacts are clearly understood. Failure to so increases the potential that the change initiative will fail or be a painful experience and cost the organization in terms of loss of productivity or increase in turnover rates.
Obtaining qualitative feedback from employees, customers, and business partners can provide insight into where the new organizational structure is operating optimally versus where there are further adjustments that could be made to support the change.
1 hour
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the Organizational Design Workbook
Jardena London
Transformation Catalyst, Rosetta Technology Group
Jodie Goulden
Consultant | Founder, OrgDesign Works
Shan Pretheshan
Director, SUPA-IT Consulting
Chris Briley
CIO, Manning & Napier
Dean Meyer
President N. Dean Meyer and Associates Inc.
Jimmy Williams
CIO, Chocktaw Nation of Oklahoma
Cole Cioran, Managing Partner
Dana Daher, Research Director
Hans Eckman, Principal Research Director
Ugbad Farah, Research Director
Ari Glaizel, Practice Lead
Valence Howden, Principal Research Director
Youssef Kamar, Senior Manager, Consulting
Carlene McCubbin, Practice Lead
Baird Miller, Executive Counsellor
Josh Mori, Research Director
Rajesh Parab, Research Director
Gary Rietz, Executive Counsellor
“A Cheat Sheet for HR Professionals: The Organizational Development Process.” AIHR, 2021. Web.
Acharya, Ashwin, Roni Lieber, Lissa Seem, and Tom Welchman. “How to identify the right ‘spans of control’ for your organization.” McKinsey, 21 December 2017. Web.
Anand. N., and Jean-Louis Barsoux. “What everyone gets wrong about change management. Harvard Business Review, December 2017. Web.
Atiken, Chris. “Operating model design-first principles.” From Here On, 24 August 2018. Web.
“Avoid common digital transformation challenges: Address your IT Operating Model Now.” Sofigate, 5 May 2020. Web.
Baumann, Oliver, and Brian Wu. “The many dimensions of research on designing flat firms.” Journal of Organizational Design, no. 3, vol. 4. 09 May 2022.Web.
Bertha, Michael. “Cross the project to product chasm.” CIO, 1 May 2020. Web.
Blenko, Marcia, and James Root. “Design Principles for a Robust Operating Model.” Bain & Company, 8 April 2015. Web.
Blenko, Marcia, Leslie Mackrell, and Kevin Rosenberg. “Operating models: How non-profits get from strategy to results.” The Bridge Span Group, 15 August 2019. Web.
Boulton, Clint. “PVH finds perfect fit in hybrid IT operating model amid pandemic.” CIO, 19 July 2021. Web.
Boulton, Clint. “Why digital disruption leaves no room for bimodal IT.” CIO, 11 May 2017. Web.
Bright, David, et al. “Chapter 10: Organizational Structure & Change.” Principles of Management, OpenStax, Rice University, 20 March 2019. Book.
Campbell, Andrew. “Design Principles: How to manage them.” Ashridge Operating Models. 1 January 2022. Web.
D., Maria. “3 Types of IT Outsourcing Models and How to Choose Between Them.” Cleveroad, 29 April 2022. Web.
Devaney, Eric. “9 Types of Organizational Structure Every Company Should Consider.” HubSpot, 11 February 2022. Web.
Devaney, Erik. “The six building blocks of organizational structure.” Hubspot, 3 June 2020. Web.
Eisenman, M., S. Paruchuri, and P. Puranam. “The design of emergence in organizations.” Journal of Organization Design, vol. 9, 2020. Web.
Forbes Business Development Council. “15 Clear Signs It’s Time to Restructure the Business.” Forbes, 10 February 2020. Web.
Freed, Joseph. “Why Cognitive Load Could Be The Most Important Employee Experience Metric In The Next 10 Years.” Forbes, 30 June 2020. Web.
Galibraith, Jay. “The Star Model.” JayGalbraith.com, n.d. Web.
Girod, Stéphane, and Samina Karim. “Restructure or reconfigure?” Harvard Business Review, April 2017. Web.
Goldman, Sharon. “The need for a new IT Operating Model: Why now?” CIO, 27 August 2019. Web.
Halapeth, Milind. “New age IT Operating Model: Creating harmony between the old and the new.” Wirpo, n.d. Web.
Harvey, Michelle. “Why a common operating model is efficient for business productivity.” CMC, 10 May 2020. Web.
Helfand, Heidi. “Dynamic Reteaming.” O’Reilly Media, 7 July 2020. Book.
JHeller, Martha. “How Microsoft CIO Jim DuBois changed the IT Operating Model.” CIO, 2 February 2016. Web.
Heller, Martha. “How Stryker IT Shifted to a global operating model.” CIO, 19 May 2021. Web.
Heller, Michelle. “Inside blue Shields of California’s IT operating model overhaul.” CIO, 24 February 2021. Web.
Hessing, Ted. “Value Stream Mapping.” Six Sigma Study Guide, 11 April 2014. Web.
Huber, George, P. “What is Organization Design.” Organizational Design Community, n.d. Web.
Indeed Editorial Team. “5 Advantages and Disadvantages of the Matrix Organizational Structure.” Indeed, 23 November 2020. Web.
Indeed Editorial Team. “How to plan an effective organization restructure.” Indeed, 10 June 2021. Web.
“Insourcing vs Outsourcing vs Co-Sourcing.” YML Group, n.d. Web.
“Investing in more strategic roles.” CAPS Research, 3 February 2022. Web.
Jain, Gagan. “Product IT Operating Model: The next-gen model for a digital work.” DevOps, 22 July 2019. Web.
Kane, Gerald, D. Plamer, and Anh Phillips. “Accelerating Digital Innovation Inside and Out.” Deloitte Insights, 4 June 2019. Web.
Krush, Alesia. “IT companies with ‘flat’ structures: utopia or innovative approach?” Object Style, 18 October 2018. Web.
Law, Michael. “Adaptive Design: Increasing Customer Value in Your Organisation.” Business Agility Institute, 5 October 2020. Web.
LucidContent Team. “How to get buy-in for changes to your organizational structure.” Lucid Chart, n.d. Web.
Matthews, Paul. “Do you know the difference between competence and capability?” The People Development Magazine, 25 September 2020. Web.
Meyer, Dean N. “Analysis: Common symptoms of organizational structure problems.” NDMA, n.d. Web.
Meyer, N. Dean. “Principle-based Organizational Structure.” NDMA Publishing, 2020. Web.
Morales Pedraza, Jorge. Answer to posting, “What is the relationship between structure and strategy?” ResearchGate.net, 5 March 2014. Web.
Nanjad, Len. “Five non-negotiables for effective organization design change.” MNP, 01 October 2021. Web.
Neilson, Gary, Jaime Estupiñán, and Bhushan Sethi. “10 Principles of Organizational Design.” Strategy & Business, 23 March 2015. Web.
Nicastro, Dom. “Understanding the Foundational Concepts of Organizational Design.” Reworked, 24 September 2020. Web.
Obwegeser, Nikolaus, Tomoko Yokoi, Michael Wade, and Tom Voskes. “7 Key Principles to Govern Digital Initiatives.” MIT Sloan, 1 April 2020. Web.
“Operating Models and Tools.” Business Technology Standard, 23 February 2021. Web.
“Organizational Design Agility: Journey to a combined community.” ODF-BAI How Space, Organizational Design Forum, 2022. Web.
“Organizational Design: Understanding and getting started.” Ingentis, 20 January 2021. Web.
Padar, Katalin, et al. “Bringing project and change management roles into sync.” Journal of Change Management, 2017. Web.
Partridge, Chris. “Evolve your Operating Model- It will drive everything.” CIO, 30 July 2021. Web.
Pijnacker, Lieke. “HR Analytics: role clarity impacts performance.” Effectory, 25 September 2019. Web.
Pressgrove, Jed. “Centralized vs. Federated: Breaking down IT Structures.” Government Technology, March 2020. Web.
Sherman, Fraser. “Differences between Organizational Structure and Design.” Bizfluent, 20 September 2019. Web.
Skelton, Matthew, and Manual Pais. “Team Cognitive Load.” IT Revolution, 19 January 2021. Web.
Skelton, Matthew, and Manual Pais. Team Topologies. IT Revolution Press, 19 September 2019. Book
Spencer, Janet, and Michael Watkins. “Why organizational change fails.” TLNT, 26 November 2019. Web.
Storbakken, Mandy. “The Cloud Operating Model.” VMware, 27 January 2020. Web.
"The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2010. Web.
“Understanding Organizational Structures.” SHRM, 31 August 2021. Web.
"unfix Pattern: Base.” AgilityScales, n.d. Web.
Walker, Alex. “Half-Life: Alyx helped change Valve’s Approach to Development.” Kotaku, 10 July 2020. Web.
"Why Change Management.” Prosci, n.d. Web.
Wittig, Cynthia. “Employees' Reactions to Organizational Change.” OD Practioner, vol. 44, no. 2, 2012. Web.
Woods, Dan. “How Platforms are neutralizing Conway’s Law.” Forbes, 15 August 2017. Web.
Worren, Nicolay, Jeroen van Bree, and William Zybach. “Organization Design Challenges. Results from a practitioner survey.” Journal of Organizational Design, vol. 8, 25 July 2019. Web.
Internal and external obstacles beyond IT’s control make these challenges with gaining IT budget approval even harder to overcome:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This deck applies Info-Tech’s proven ITFM Cost Model to the IT budgeting process and offers five phases that cover the purpose of your IT budget and what it means to your stakeholders, key budgeting resources, forecasting, selecting and fine-tuning your budget message, and delivering your IT budget executive presentation for approval.
This Excel workbook offers a step-by-step approach for mapping your historical and forecasted IT expenditure and creating visualizations you can use to populate your IT budget executive presentation.
This sample workbook offers a completed example of the “IT Cost Forecasting and Budgeting Workbook” that accompanies the Create a Transparent & Defensible IT Budget blueprint.
This presentation template offers a recommended structure for presenting your proposed IT budget for next fiscal year to your executive stakeholders for approval.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand your IT budget in the context of your organization and key stakeholders, as well as gather your budgeting data and review previous years’ financial performance.
Understand your organization’s budget process and culture.
Understand your stakeholders’ priorities and perspectives regarding your IT budget.
Gain insight into your historical IT expenditure.
Set next fiscal year’s IT budget targets.
1.1 Review budget purpose.
1.2 Understand stakeholders and approvers.
1.3 Gather your data.
1.4 Map and review historical financial performance.
1.5 Rationalize last year’s variances and set next year's budget targets.
Budget process and culture assessment.
Stakeholder alignment assessment and pre-selling strategy.
Data prepared for next steps.
Mapped historical expenditure.
Next fiscal year’s budget targets.
Develop a forecast of next fiscal year’s proposed capital IT expenditure driven by your organization’s strategic projects.
Develop project CapEx forecast according to the four different stakeholder views of Info-Tech’s ITFM Cost Model.
Ensure that no business projects that have IT implications (and their true costs) are missed.
2.1 Review the ITFM cost model
2.2 List projects.
2.3 Review project proposals and costs.
2.4 Map and tally total project CapEx.
2.5 Develop and/or confirm project-business alignment, ROI, and cost-benefit statements.
Confirmed ITFM cost mdel.
A list of projects.
Confirmed list of project proposals and costs.
Forecasted project-based capital expenditure mapped against the four views of the ITFM Cost Model.
Projects financials in line.
Develop a forecast of next fiscal year’s proposed “business as usual” non-project capital and operating IT expenditure.
Develop non-project CapEx and non-project OpEx forecasts according to the four different stakeholder views of Info-Tech’s ITFM Cost Model.
Make “business as usual” costs fully transparent and rationalized.
3.1 Review non-project capital and costs.
3.2 Review non-project operations and costs.
3.3 Map and tally total non-project CapEx and OpEx.
3.4 Develop and/or confirm proposed expenditure rationales.
Confirmation of non-project capital and costs.
Confirmation of non-project operations and costs.
Forecasted non-project-based capital expenditure and operating expenditure against the four views of the ITFM Cost Model.
Proposed expenditure rationales.
Aggregate and sanity-check your forecasts, harden your rationales, and plan/develop the content for your IT budget executive presentation.
Create a finalized proposed IT budget for next fiscal year that offers different views on your budget for different stakeholders.
Select content for your IT budget executive presentation that will resonate with your stakeholders and streamline approval.
4.1 Aggregate forecast totals and sanity check.
4.2 Generate graphical outputs and select content to include in presentation.
4.3 Fine-tune rationales.
4.4 Develop presentation and write commentary.
Final proposed IT budget for next fiscal year.
Graphic outputs selected for presentation.
Rationales for budget.
Content for IT Budget Executive Presentation.
Finalize and polish the IT budget executive presentation.
An approval-ready presentation that showcases your business-aligned proposed IT budget backed up with rigorous rationales.
5.1 Complete in-progress deliverables from previous four days.
5.2 Set up review time for workshop deliverables and to discuss next steps.
Completed IT Budget Executive Presentation.
Review scheduled.
EXECUTIVE BRIEF
![]() |
It’s that time of year again – budgeting. Most organizations invest a lot of time and effort in a capital project selection process, tack a few percentage points onto last year’s OpEx, do a round of trimming, and call it a day. However, if you want to improve IT financial transparency and get your business stakeholders and the CFO to see the true value of IT, you need to do more than this. Yourcrea IT budget is more than a once-a-year administrative exercise. It’s an opportunity to educate, create partnerships, eliminate nasty surprises, and build trust. The key to doing these things rests in offering a range of budget perspectives that engage and make sense to your stakeholders, as well as providing iron-clad rationales that tie directly to organizational objectives. The work of setting and managing a budget never stops – it’s a series of interactions, conversations, and decisions that happen throughout the year. If you take this approach to budgeting, you’ll greatly enhance your chances of creating and presenting a defensible annual budget that gets approved the first time around. |
Jennifer Perrier |
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|---|---|---|
IT struggles to gain budget approval year after year, largely driven by a few key factors:
|
Internal and external obstacles beyond IT’s control make these challenges even harder to overcome:
|
CIOs need a straightforward way to create and present an approval-ready budget.
|
Info-Tech Insight
CIOs need a straightforward way to create and present an approval-ready IT budget that demonstrates the value IT is delivering to the business and speaks directly to different stakeholder priorities.
Capability challenges |
Administrative challenges |
Operating challenges |
Visibility challenges |
Relationship challenges |
||
|---|---|---|---|---|---|---|
IT is seen as a cost center, not an enabler or driver of business strategy. |
IT leaders are not seen as business leaders. |
Economic pressures drive knee-jerk redirection of IT’s budgetary focus from strategic initiatives back to operational tactics. |
The vast majority of IT’s |
Most business leaders don’t know how many IT resources their business units are really consuming. |
Other departments in the organization see IT as a competitor for funding, not a business partner. |
Lack of transparency |
IT and the business aren’t speaking the same language. |
IT leaders don’t have sufficient access to information about, or involvement in, business decisions and objectives. |
Outmoded finance department expenditure categorizations don’t accommodate IT’s real cost categories. |
IT absorbs unplanned spend because business leaders don’t realize or consider the impact of their decisions on IT. |
The business doesn’t understand what IT is, what it does, or what it can offer. |
IT and the business don’t have meaningful conversations about IT costs, opportunities, or investments. |
|
Defining and demonstrating the value of IT and its investments isn’t straightforward. |
IT leaders may not have the financial literacy or acumen needed to translate IT activities and needs into business terms. |
CapEx and OpEx approval and tracking mechanisms are handled separately when, in reality, they’re highly interdependent. |
IT activities usually have an indirect relationship with revenue, making value calculations more complicated. |
Much of IT, especially infrastructure, is invisible to the business and is only noticed if it’s not working. |
The relationship between IT spending and how it supports achievement of business objectives is not clear. |

Principle 1: |
Principle 2: |
Principle 3: |
|---|
The three principles above are all about IT’s changing relationship to the business. IT leaders need a systematic and repeatable approach to budgeting that addresses these principles by:
“The culture of the organization will drive your success with IT financial management.”
– Dave Kish, Practice Lead, IT Financial Management Practice, Info-Tech Research Group
IT budget approval cycle

The Info-Tech difference:
This blueprint provides a framework, method, and templated exemplars for building and presenting your IT budget to different stakeholders. These will speed the approval process and ensure that a higher percentage of your proposed spend is approved.
1. Lay Your Foundation |
2. Get Into Budget-Starting Position |
3. Develop Your Forecasts |
4. Build Your Proposed Budget |
5. Create and Deliver Your Budget Presentation |
|
|---|---|---|---|---|---|
Phase steps |
|
|
|
|
|
Phase outcomes |
An understanding of your stakeholders and what your IT budget means to them. |
Information and goals for planning next fiscal year’s IT budget. |
Completed forecasts for project and non-project CapEx and OpEx. |
A final IT budget for proposal including scenario-based alternatives. |
An IT budget presentation. |
Overarching insight: Create a transparent and defensible IT budget
CIOs need a straightforward way to create and present an approval-ready IT budget that demonstrates the value IT is delivering to the business and speaks directly to different stakeholder priorities.
Phase 1 insight: Lay your foundation
IT needs to step back and look at it’s budget-creation process by first understanding exactly what a budget is intended to do and learning what the IT budget means to IT’s various business stakeholders.
Phase 2 Insight: Get into budget-starting position
Presenting your proposed IT budget in the context of past IT expenditure demonstrates a pattern of spend behavior that is fundamental to next year’s expenditure rationale.
Phase 3 insight: Develop your forecasts
Forecasting costs according to a range of views, including CapEx vs. OpEx and project vs. non-project, and then positioning it according to different stakeholder perspectives, is key to creating a transparent budget.
Phase 4 insight: Build your proposed budget
Fine-tuning and hardening the rationales behind every aspect of your proposed budget is one of the most important steps for facilitating the budgetary approval process and increasing the amount of your budget that is ultimately approved.
Phase 5 insight: Create and deliver your budget presentation
Selecting the right content to present to your various stakeholders at the right level of granularity ensures that they see their priorities reflected in IT’s budget, driving their interest and engagement in IT financial concerns.
IT Cost Forecasting and Budgeting Workbook This Excel tool allows you to capture and work through all elements of your IT forecasting from the perspective of multiple key stakeholders and generates compelling visuals to choose from to populate your final executive presentation. |
![]() |
Also download this completed sample:
Sample: IT Cost Forecasting and Budgeting Workbook
IT Budget Executive Presentation Template
Phase 5: Create a focused presentation for your proposed IT budget that will engage your audience and facilitate approval.

IT benefits |
Business benefits |
|---|---|
|
|
Ease budgetary approval and improve its accuracy.
Near-term goals
Long-term goal
In Phases 1 and 2 of this blueprint, we will help you understand what your approvers are looking for and gather the right data and information.
In Phase 3, we will help you forecast your IT costs it terms of four stakeholder views so you can craft a more meaningful IT budget narrative.
In Phases 4 and 5, we will help you build a targeted presentation for your proposed IT budget.
Value you will receive:
“A budget isn’t like a horse and cart – you can’t get in front of it or behind it like that. It’s more like a river…
When developing an annual budget, you have a good idea of what the OpEx will be – last year’s with an annual bump. You know what that boat is like and if the river can handle it.
But sometimes you want to float bigger boats, like capital projects. But these boats don’t start at the same place at the same time. Some are full of holes. And does your river even have the capacity to handle a boat of that size?
Some organizations force project charters by a certain date and only these are included in the following year’s budget. The project doesn’t start until 8-12 months later and the charter goes stale. The river just can’t float all these boats! It’s a failed model. You have to have a great governance processes and clear prioritization so that you can dynamically approve and get boats on the river throughout the year.”
– Mark Roman, Managing Partner, Executive Services,
Info-Tech Research Group and Former Higher Education CIO
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
Phase 1: Lay Your Foundation |
Phase 2: Get Into Budget-Starting Position |
Phase 3: Develop Your Forecasts |
Phase 4: Build Your Proposed Budget |
Phase 5: Create and Deliver Your Budget Presentation |
|---|---|---|---|---|
Call #1: Discuss the IT budget, processes, and stakeholders in the context of your unique organization. |
Call #2: Review data requirements for transparent budgeting. Call #3: Set budget goals and process improvement metrics. |
Call #4: Review project CapEx forecasts. Call #5: Review non-project CapEx and OpEx forecasts. |
Call #6: Review proposed budget logic and rationales. |
Call #7: Identify presentation inclusions and exclusions. Call #8: Review final budget presentation. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 8 to 12 calls over the course of 4 to 6 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
Get into budget-starting position |
Forecast project CapEx |
Forecast non-project CapEx and OpEx |
Finalize budget and develop presentation |
Next Steps and |
|
Activities |
1.1 Review budget purpose. 1.2 Understand stakeholders and approvers. 1.3 Gather your data. 1.4 Map and review historical financial performance. 1.5 Rationalize last year’s variances. 1.5 Set next year’s budget targets. |
2.1 Review the ITFM Cost Model. 2.2 List projects. 2.3 Review project proposals and costs. 2.4 Map and tally total project CapEx. 2.5 Develop and/or confirm project-business alignment, ROI, and cost-benefit statements. |
3.1 Review non-project capital and costs. 3.2 Review non-project operations and costs. 3.3 Map and tally total non-project CapEx and OpEx. 3.4 Develop and/or confirm proposed expenditure rationales. |
4.1 Aggregate forecast totals and sanity check. 4.2 Generate graphical outputs and select content to include in presentation. 4.3 Fine-tune rationales. 4.4 Develop presentation and write commentary. |
5.1 Complete in-progress deliverables from previous four days. 5.2 Set up review time for workshop deliverables and to discuss next steps. |
Deliverables |
|
|
|
|
|
Lay Your |
Get Into Budget-Starting Position |
Develop Your |
Build Your |
Create and Deliver Your Presentation |
|---|---|---|---|---|
1.1 Understand what your budget is 1.2 Know your stakeholders 1.3 Continuously pre-sell your budget |
2.1 Assemble your resources 2.2 Understand the four views of the ITFM Cost Model 2.3 Review last year’s budget vs. 2.4 Set your high-level goals |
3.1 Develop assumptions and 3.2 Forecast your project CapEx 3.3 Forecast your non-project CapEx and OpEx |
4.1 Aggregate your numbers 4.2 Stress test your forecasts 4.3 Challenge and perfect your |
5.1 Plan your content 5.2 Build your presentation 5.3 Present to stakeholders 5.4 Make final adjustments and submit your IT budget |
This phase will walk you through the following activities:
This phase involves the following participants:
This phase is about understanding the what, why, and who of your IT budget.
“IT finance is more than budgeting. It’s about building trust and credibility in where we’re spending money, how we’re spending money. It’s about relationships. It’s about financial responsibility, financial accountability. I rely on my entire leadership team to all understand what their spend is. We are a steward of other people’s money.”
– Rick Hopfer, CIO, Hawaii Medical Service Association
Most people know what a budget is, but it’s important to understand its true purpose and how it’s used in your organization before you engage in any activity or dialogue about it.
In strictly objective terms:
Simply put, a budget’s fundamental purpose is to plan and communicate how an organization will avoid deficit and debt and remain financially viable while meeting its various accountabilities and responsibilities to its internal and external stakeholders.
“CFOs are not thinking that they want to shut down IT spend. Nobody wants to do that. I always looked at things in terms of revenue streams – where the cash inflow is coming from, where it’s going to, and if I can align my cash outflows to my revenue stream. Where I always got suspicious as a CFO is if somebody can’t articulate spending in terms of a revenue stream. I think that’s how most CFOs operate.”
– Carol Carr, Technical Counselor,
Info-Tech Research Group and Former CFO
It’s a competition: The various units in your organization are competing for the biggest piece they can get of the limited projected income pie. It’s a zero-sum game. The organization’s strategic and operational priorities will determine how this projected income is divvied up.
Direct-to-revenue units win: Business units that directly generate revenue often get bigger relative percentages of the organizational budget since they’re integral to bringing in the projected income part of the budget that allows the expenditure across all business units to happen in the first place.
Indirect-to-revenue units lose: Unlike sales units, for example, IT’s relationship to projected income tends to be indirect, which means that IT must connect a lot more dots to illustrate its positive impact on projected income generation.
In financial jargon, IT really is a cost center: This indirect relationship to revenue also explains why the focus of IT budget conversations is usually on the expenditure side of the equation, meaning it doesn’t have a clear positive impact on income.
Contextual metrics like IT spend as a percentage of revenue, IT OpEx as a percentage of organizational OpEx, and IT spend per organizational employee are important baseline metrics to track around your budget, internally benchmark over time, and share, in order to illustrate exactly where IT fits into the broader organizational picture.
Many organizations have an annual budgeting and planning event that takes place during the back half of the fiscal year. This is where all formal documentation around planned projects and proposed spend for the upcoming year is consolidated, culminating in final presentation, adjustment, and approval. It’s basically a consolidation and ranking of organization-wide priorities at the highest level.
If things are running well, this culmination point in the overall budget development and management process is just a formality, not the beginning, middle, and end of the real work. Ideally:
"A well developed and presented budget should be the numeric manifestation of your IT strategy that’s well communicated and understood by your peers. When done right, budgets should merely affirm what’s already been understood and should get approved with minimal pushback.“
– Patrick Gray, TechRepublic, 2020
While not a contract per se, your IT budget is an objective and transparent statement made in good faith that shows:
When it comes to your budget (and all things financial), your job is to be ethical, careful, and wise:
What’s the same everywhere… |
What’s unchangeable… |
What’s changeable… |
|---|---|---|
For right or wrong, most budgeting processes follow these general steps: |
There are usually only three things about an organization’s budgeting process that are untouchable and can’t be changed: |
Budgeting processes are rarely questioned. It never occurs to most people to challenge this system, even if it doesn’t work. Who wants to challenge the CFO? No one. Review your organization’s budgeting culture to discover the negotiable and non-negotiable constraints. Specifically, look at these potentially-negotiable factors if they’re obstacles to IT budgeting success: |
|
|
|
1 hour
| Input | Output | Materials | Participants |
|---|---|---|---|
|
|
|
|
Budgeting area of assessment |
Rating 1 = very ineffective 10 = very effective |
Challenges |
Opportunities for change |
|---|---|---|---|
Legal and regulatory mandates |
7 | Significant regulation but compliance steps not clear or supported within departments. |
Create, communicate, and train management on compliance procedures and align the financial management tools accordingly. |
Accounting rules |
6 | IT not very familiar with them. |
Learn more about them and their provisions to see if IT spend can be better represented. |
Timeframes and deadlines |
5 | Finalize capital project plans for next fiscal four months before end of current fiscal. |
Explore flexible funding models that allow changes to budget closer to project execution. |
Order of operations |
3 | Setting CapEx before OpEx leads to paring of necessary OpEx based on CapEx commitments. |
Establish OpEx first as a baseline and then top up to target budget with CapEx. |
Areas of focus |
6 | Lack of focus on OpEx means incremental budgeting – we don’t know what’s in there. |
Perform zero-based budgeting on OpEx every few years to re-rationalize this spend. |
Funding sources and ownership |
4 | IT absorbing unplanned mid-cycle spend due to impact of unknown business actions. |
Implement a show-back mechanism to change behavior or as precursor to limited charge-back. |
Review/approval mechanisms |
8 | CFO is fair and objective with information presented but could demand more evidence. |
Improve business sponsorship/fronting of new initiative business cases and IT partnership. |
Templates and tools |
2 | Finance budget template largely irrelevant and unreflective of IT: only two relevant categories. |
Adjust account buckets over a period of time, starting with SW/HW and cloud breakouts. |
The key to being heard and understood is first to hear and understand the perspective of the people with whom you’re trying to communicate – your stakeholders. This means asking some questions:
The next step of this blueprint shows the perspectives of IT’s key stakeholders and how they’re best able to absorb and accept the important information contained in your IT budget. You will:
There are certain principles, mandates, and priorities that drive your stakeholders; they’ll want to see these reflected in you, your work, and your budget.

What are the CFO’s role and responsibilities?
What’s important to the CFO?
“Often, the CFO sees IT requests as overhead rather than a need. And they hate increasing overhead.”
– Larry Clark, Executive Counselor, Info-Tech Research Group and Former CIO
The CFO carries big responsibilities focused on mitigating organizational risks. It’s not their job to be generous or flexible when so much is at stake. While the CEO appears higher on the organizational chart than the CFO, in many ways the CFO’s accountabilities and responsibilities are on par with, and in some cases greater than, those of the CEO.
Your CFO’s IT budget to-do list: |
Remember to: |
|---|---|
|
|
Potential challenges |
Low trust Poor financial literacy and historical sloppiness among business unit leaders means that a CFO may come into budget conversations with skepticism. This can put them on the offensive and put you on the defensive. You have to prove yourself. |
Competition You’re not the only department the CFO is dealing with. Everyone is competing for their piece of the pie, and some business unit leaders are persistent. A good CFO will stay out of the politics and not be swayed by sweet talk, but it can be an exhausting experience for them. |
Mismatched buckets IT’s spend classes and categories probably won’t match what’s in Finance’s budget template or general ledger. Annual budgeting isn’t the best time to bring this up. Respect Finance’s categories, but plan to tackle permanent changes at a less busy time. |
|---|---|---|---|
Potential opportunities |
Build confidence Engaging in the budgeting process is your best chance to demonstrate your knowledge about the business and your financial acumen. The more that the CFO sees that you get it and are taking it seriously, the more confidence and trust they’ll have in you. |
Educate The CFO will not know as much as you about the role technology could and should play in the organization. Introduce new language around technology focused on capabilities and benefits. This will start to shift the conversation away from costs and toward value. |
Initiate alignment An important governance objective is to change the way IT expenditure is categorized and tracked to better reveal and understand what’s really happening. This process should be done gradually over time, but definitely communicate what you want to do and why. |
What are the CXO’s role and responsibilities?
Like you, the CXO’s job is to help the organization realize its goals and objectives. How each CXO does this is specific to the domain they lead. Variations in roles and responsibilities typically revolve around:
What’s important to the CXO?
Disagreement is common between business-function leaders – they have different primary focus areas, and conflict and misalignment are natural by-products of that fact. It’s also hard to make someone care as much about your priorities as you do. Focus your efforts on sharing and partnering, not converting.
Your CXO’s IT budget to-do list: | Remember to: |
|---|---|
|
|
Potential challenges | Different priorities Other business unit leaders will have bigger concerns than your IT budget. They have their own budget to figure out plus other in-flight issues. The head of sales, for instance, is going to be more concerned with hitting sales goals for this fiscal year than planning for next. | Perceived irrelevance Some business unit leaders may be completely unaware of how they use IT, how much they use, and how they could use it more or differently to improve their performance. They may have a learning curve to tackle before they can start to see your relationship as collaborative. | Bad track record If a business unit has had friction with IT in the past or has historically been underserved, they may be hesitant to let you in, may be married to their own solutions, or perhaps do not know how to express what they need. |
|---|---|---|---|
Potential opportunities | Start collaborating You and other business unit leaders have a lot in common. You all share the objective of helping the organization succeed. Focus in on your shared concerns and how you can make progress on them together before digging into your unique challenges. | Practice perspective taking Be genuinely curious about the business unit, how it works, and how they overcome obstacles. See the organization from their point of view. For now, keep your technologies completely out of the discussion – that will come later on. | Build relationships You only need to solve one problem for a business unit to change how they think of you. Just one. Find that one thing that will make a real difference – ideally small but impactful – and work it into your budget. |
What are the CEO’s role and responsibilities?
What’s important to the CEO?
Unlike the CFO and CXOs, the CEO is responsible for seeing the big picture. That means they’re operating in the realm of big problems and big ideas – they need to stay out of the weeds. IT is just one piece of that big picture, and your problems and ideas are sometimes small in comparison. Use any time you get with them wisely.
Your CEO’s IT budget to-do list: | Remember to: |
|---|---|
|
|
Potential challenges | Lack of interest Your CEO may just not be enthusiastic about technology. For them, IT is strictly a cost center operating on the margins. If they don’t have a strategic vision that includes technology, IT’s budget will always be about efficiency and cost control and not investment. | Deep hierarchy The executive-level CIO role isn’t yet pervasive in every industry. There may be one or more non-IT senior management layers between IT and the office of the CEO, as well as other bureaucratic hurdles, which prohibit your direct access. | Uncertainty What’s happening on the outside will affect what needs to be done on the inside. The CEO has to assess and respond quickly, changing priorities and plans in an instant. An indecisive CEO that’s built an inflexible organization will make it difficult to pivot as needed. |
|---|---|---|---|
Potential opportunities | Grow competency Sometimes, IT just needs to wait it out. The biggest shifts in technology interest often come with an outright change in the organization’s leadership. In the meantime, fine-tune your operational excellence, brush up on business skills, and draft out your best ideas on paper. | Build partnerships Other business-function executives may need to be IT’s voice. Investment proposals may be more compelling coming from them anyway. Behind-the-scenes partnerships and high-profile champions are something you want regardless of your degree of CEO access. | Bake in resilience Regardless of who’s at the helm, systematic investment in agile and flexible solutions that can be readily scaled, decoupled, redeployed, or decommissioned is a good strategy. Use recent crises to help make the strategic case for a more resilient posture. |
The CFO expense view, CXO business view, and CEO innovation view represent IT’s stakeholders. The CIO service view, however, represents you, the IT budget creator. This means that the CIO service view plays a slightly different role in developing your IT budget communications.
An IT team effort… |
A logical starting point |
A supporting view |
|---|---|---|
Most budget drafts start with internal IT management discussion. These managers are differentially responsible for apps dev and maintenance, service desk and user support, networks and data center, security, data and analytics, and so forth. |
These common organizational units and their managers tend to represent discrete IT service verticals. This means the CIO service view is a natural structural starting point for your budget-building process. Stakeholder views of your budget will be derived from this first view. |
You probably don’t want to lead your budget presentation with IT’s perspective – it won’t make sense to your stakeholders. Instead, select certain impactful pieces of your view to drop in where they provide valued information and augment the IT budget story. |
Things to bring forward… |
Things to hold back… |
|---|---|
|
|
1 hour
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Stakeholder |
Relationship status |
Understanding of needs |
Budget changes/additions |
|---|---|---|---|
CFO |
Positive |
Wants at least 30% of budget to be CapEx. Needs more detail concerning benefits and tracking of realization. |
Do more detailed breakouts of CapEx vs. OpEx as 30% CapEx not realistic – pre-meet. Talk to Enterprise PMO about improving project benefits statement template. |
VP of Sales |
Negative |
Only concerned with hitting sales targets. Needs to respond/act quickly based on reliable data. |
Break out sales consumption of IT resources in detail focusing on CRM and SFA tool costs. Propose business intelligence enhancement project. |
Director of Marketing |
Neutral |
Multiple manual processes – would benefit from increased automation of campaign management and social media posting. |
Break out marketing consumption of IT resources and publicly share/compare to generate awareness/support for tech investment. Work together to build ROI statements |
[Name/Title] |
[Positive/Neutral/Negative] |
[Insert text] |
[Insert text] |
[Name/Title] |
[Positive/Neutral/Negative] |
[Insert text] |
[Insert text] |
[Name/Title] |
[Positive/Neutral/Negative] |
[Insert text] |
[Insert text] |
[Name/Title] |
[Positive/Neutral/Negative] |
[Insert text] |
[Insert text] |
[Name/Title] |
[Positive/Neutral/Negative] |
[Insert text] |
[Insert text] |
[Name/Title] |
[Positive/Neutral/Negative] |
[Insert text] |
[Insert text] |
[Name/Title] |
[Positive/Neutral/Negative] |
[Insert text] |
[Insert text] |
[Name/Title] |
[Positive/Neutral/Negative] |
[Insert text] |
[Insert text] |
When IT works well, nobody notices. When it doesn’t, the persistent criticism about IT not delivering value will pop up, translating directly into less funding. Cut this off at the pass with an ongoing communications strategy based on facts, transparency, and perspective taking.
Identify all the communication channels you can leverage including meetings, committees, reporting cycles, and bulletins. Set up new channels if they don’t exist.
Nothing’s better than having a team of supporters when pitch day comes. Quietly get them on board early and be direct about the role each of you will play.
Have information and materials about proposed initiatives at-the-ready. You never know when you’ll get your chance. But if your facts are still fuzzy, do more homework first.
Talking about IT all the time will turn people off. Plan chats that don’t mention IT at all. Ask questions about their world and really listen. Empathy’s a powerful tool.
Describe what you will be doing and how it will benefit the business in language that makes sense to the beneficiaries of the initiative.
Carry the same narrative forward through to the end and tell the whole story. Include comments from stakeholders and beneficiaries about the value they’re receiving.
A partner is an influencer, advocate, or beneficiary of the expenditure or investment you’re proposing. Partners can:
When partners agree to pitch or fund an initiative, IT can lose control of it. Make sure you set specific expectations about what IT will help with or do on an ongoing basis, such as:
A collaborative approach tends to result in a higher level of commitment than a selling approach.
Put yourself in their shoes using their language. Asking “How will this affect you?” focuses on what’s in it for them.
Example:
CIO: “We’re thinking of investing in technology that marketing can use to automate posting content to social media. Is that something you could use?”
CMO: “Yes, we currently pay two employees to post on Facebook and Twitter, so if it could make that more efficient, then there would be cost savings there.”
An approver is the CFO, CEO, board, council, or committee that formally commits funding support to a program or initiative. Approvers can:
When approvers cool to an idea, it’s hard to warm them up again. Gradually socializing an idea well in advance of the formal pitch gives you the chance to isolate and address those cooling factors while they’re still minor. Things you can address if you get an early start with future approvers include:
Blindsiding approvers with a major request at a budget presentation could trigger an emotional response, not the rational and objective one you want.
Make approvers part of the solution by soliciting their advice and setting their expectations well in advance.
Example:
CIO: “The underwriting team and I think there’s a way to cut new policyholder approval turnaround from 8 to 10 days down to 3 or 4 using an online intake form. Do you see any obstacles?”
CFO: “How do the agents feel about it? They submit to underwriting differently and might not want to change. They’d all need to agree on it. Exactly how does this impact sales?”
1 hour
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Stakeholder | Current interactions | Opportunities and actions | ||
|---|---|---|---|---|
Forum | Frequency | Content | ||
CFO | One-on-one meeting | Monthly | IT expenditure updates and tracking toward budgeted amount. | Increase one-on-one meeting to weekly. Alternate focus – retrospective update one week, future-looking case development the next. Invite one business unit head to future-looking sessions to discuss their IT needs. |
VP of Sales | Executive meeting | Quarterly | General business update - dominates. | Set up bi-weekly one-on-one meeting – initially focus on what sales does/needs, not tech. Later, when the relationship has stabilized, bring data that shows Sales’ consumption of IT resources. |
Director of Marketing | Executive meeting | Quarterly | General business update - quiet. | Set up monthly one-on-one meeting. Temporarily embed BA to better discover/understand staff processes and needs. |
[Name/Title] | [Insert text] | [Insert text] | [Insert text] | [Insert text] |
[Name/Title] | [Insert text] | [Insert text] | [Insert text] | [Insert text] |
[Name/Title] | [Insert text] | [Insert text] | [Insert text] | [Insert text] |
[Name/Title] | [Insert text] | [Insert text] | [Insert text] | [Insert text] |
[Name/Title] | [Insert text] | [Insert text] | [Insert text] | [Insert text] |
[Name/Title] | [Insert text] | [Insert text] | [Insert text] | [Insert text] |
[Name/Title] | [Insert text] | [Insert text] | [Insert text] | [Insert text] |
You should now have a deeper understanding of the what, why, and who of your IT budget. These elements are foundational to streamlining the budget process, getting aligned with peers and the executive, and increasing your chances of winning budgetary approval in the end.
In this phase, you have:
“Many departments have mostly labor for their costs. They’re not buying a million and a half or two million dollars’ worth of software every year or fixing things that break. They don’t share IT’s operations mindset and I think they get frustrated.”
– Matt Johnson, IT Director Governance and Business Solutions, Milwaukee County
Lay Your | Get Into Budget-Starting Position | Develop Your | Build Your | Create and Deliver Your Presentation |
|---|---|---|---|---|
1.1 Understand what your budget is 1.2 Know your stakeholders 1.3 Continuously pre-sell your budget | 2.1 Assemble your resources 2.2 Understand the four views of the ITFM Cost Model 2.3 Review last year’s budget vs. 2.4 Set your high-level goals | 3.1 Develop assumptions and 3.2 Forecast your project CapEx 3.3 Forecast your non-project CapEx and OpEx | 4.1 Aggregate your numbers 4.2 Stress test your forecasts 4.3 Challenge and perfect your | 5.1 Plan your content 5.2 Build your presentation 5.3 Present to stakeholders 5.4 Make final adjustments and submit your IT budget |
This phase will walk you through the following activities:
This phase involves the following participants:
This phase is about clarifying your context and defining your boundaries.
“A lot of the preparation is education for our IT managers so that they understand what’s in their budgets and all the moving parts. They can actually help you keep it within bounds.”
– Trisha Goya, Director, IT Governance & Administration, Hawaii Medical Service Association
In addition to your CFO, CXOs, and CEO, there are other people who will provide important information, insight, and skill in identifying IT budget priorities and costs.
Role |
Skill set |
Responsibilities |
|---|---|---|
IT Finance Lead |
|
IT finance personnel will guide the building of cost forecasting methodologies for operating and capital costs, help manage IT cash flows, help identify cost reduction options, and work directly with the finance department to ensure they get what they need. |
IT Domain Managers |
|
They will be active participants in budgeting for their specific domains, act as a second set of eyes, assist with and manage their domain budgets, and engage with stakeholders. |
Project Managers |
|
Project managers will assist in capital and operational forecasting and will review project budgets to ensure accuracy. They will also assist in forecasting the operational impacts of capital projects. |
As the head of IT, your role is as the budgeting team lead. You understand both the business and IT strategies, and have relationships with key business partners. Your primary responsibilities are to guide and approve all budget components and act as a liaison between finance, business units, and IT.
Your responsibilities and accountabilities.
|
Goals and requirements.
|
Budgeting fundamentals.
|
Their responsibilities and accountabilities.
|
Timeframes and deadlines.
|
Available resources.
|
2 hours
Download the IT Cost Forecasting and Budgeting Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Each of the four views breaks down IT costs into a different array of categories so you and your stakeholders can see expenditure in a way that’s meaningful for them.
You may decide not to use all four views based on your goals, audience, and available time. However, let’s start with how you can use the first two views, the CFO expense view and the CIO service view.
The CFO expense view is fairly traditional – workforce and vendor. However, Info-Tech’s approach breaks down the vendor software and hardware buckets into on-premises and cloud. Making this distinction is increasingly critical given key differences in CapEx vs. OpEx treatment. Forecasting this view is mandatory |
These two views provide information that will help you optimize IT costs. They’re designed to allow the CFO and CIO to find a common language that will allow them to collaboratively make decisions about managing IT expenditure effectively. |
The CIO service view is your view, i.e. it’s how IT tends to organize and manage itself and is often the logical starting point for expenditure planning and analysis. Sub-categories in this view, such as security and data & BI, can also resonate strongly with business stakeholders and their priorities. Forecasting this view is recommended |
Some views take a bit more work to map out, but they can be powerful tools for communicating the value of IT to the business. Let’s look at the last two views, the CXO business view and the CEO innovation view.
The CXO business view looks at IT expenditure business unit by business unit so that each can understand their true consumption of IT resources. This view relies on having a fair and reliable cost allocation formula, such as one based on relative headcount, so it runs the risk of inaccuracy. Forecasting this view is recommended
| These two views provide information that will help you optimize IT support to the business. These views also have a collaborative goal in mind, enabling IT to talk about IT spend in terms that will promote transparency and engage business stakeholders. | The CEO innovation view is one of the hardest to analyze and forecast since a single spend item may apply to innovation, growth, and keeping the lights on. However, if you have an audience with the CEO and they want IT to play a more strategic or innovative role, then this view is worth mapping. Forecasting this view is optional
|
30 minutes
The IT Cost Forecasting and Budgeting Workbook contains standalone sections for each view, as well as rows for each lowest-tier sub-category in a view, so each view can be analyzed and forecasted independently.
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Ensure you have the following data and information available to you and your budgeting team before diving in:
Past data
Current data
Future data
If you’re just getting started building a repeatable budgeting process, treat it like any other project, complete with a formal plan/ charter and a central repository for all related data, information, and in-progress and final documents.
Once you’ve identified a repeatable approach that works for you, transition the budgeting project to a regular operational process complete with policies, procedures, and tools.
But first, some quick definitions:
For last fiscal year, pinpoint the following metrics and information:
Budgeted and actual IT expenditure overall and by major cost category. Categories will include workforce (employees/contractors) and vendors (hardware, software, contracted services) at a minimum. |
Actual IT expenditure as a percentage of organizational revenue. This is a widely-used benchmark that your CFO will expect to see. |
The known and likely drivers behind budgeted vs. actual variances. Your rationales will affect your perceived credibility. Be straightforward, avoid defending or making excuses, and just show the facts. Ask your CFO what they consider acceptable variance thresholds for different cost categories to guide your variance analysis, such as 1% for overall IT expenditure. |
Actual IT CapEx and OpEx. CapEx is often more variable than OpEx over time. Separate them so you can see the real trends for each. Consider:
|
For the previous five fiscal years, focus on the following:
Actual IT expenditure as a percentage of organizational revenue.
Again, for historical years 2-5, you can break this down into granular cost categories like workforce, software, and infrastructure like you did for last fiscal year. Avoid getting bogged down and focusing on the past – you ultimately want to redirect stakeholders to the future.
Percentage expenditure increase/decrease year to year.
You may choose to show overall IT expenditure amounts, breakdowns by CapEx and OpEx, as well as high-level cost categories.
As you go back in time, some data may not be available to you, may be unreliable or incomplete, or employ the same cost categories you’re using today. Use your judgement on the level of granularity you want to and can apply when going back two to five years in the past.
So, what’s the trend? Consider these questions:
Your CFO will look for evidence that you’re gaining efficiencies by controlling costs, which is often a prerequisite for them approving any new funding requests.
Your objective here is threefold:
This step is about establishing credibility, demonstrating IT value, building trust, and showing the CFO you’re on their team.
Do the following:
“Eliminate the things you don’t need. People will give you what you need when you need it if you’re being responsible with what you already have.”
– Angela Hintz, VP of PMO & Integrated Services,
Blue Cross and Blue Shield of Louisiana
8 hours
| Input | Output | Materials | Participants |
|---|---|---|---|
|
|
|
|
Knowing what happened in the past can provide good insights and give you a chance to show stakeholders your money-management track record. However, what stakeholders really care about is “now” and “next”. For them, it’s all about current business context.
Ask these questions about your current context to assess the relevance of your historical trend data:
What’s the state of |
What are the |
What has the business |
What’s the business |
|---|---|---|---|
Some industries are very sensitive to economic cycles, causing wild budget fluctuations year to year. This uncertainty can reduce the volume of spend you automatically carry over one year to the next, making past spend patterns less relevant to your current budgeting effort. |
These can change year to year as well, and often manifest on the CapEx side in the form of strategic projects selected. Since this is so variable, using previous years’ CapEx to determine next fiscal’s CapEx isn’t always useful except in regard to multi-year, ongoing capital projects. |
Do your best to honor mandates. However, if cuts are suggested that could jeopardize core service delivery, tread cautiously, and pick your battles. You may be able to halt new capital spend to generate cuts, but these projects may get approved anyway, with IT expected to make cuts to OpEx. |
If the CFO and others rail against even the most necessary inflation-driven increases, you’ll need to take a conservative approach, focus on cost-saving initiatives, and plan to redirect last year’s expenditures instead of pursuing net-new spend. |
Step back and think about other budget and expenditure goals you have.
Do you want to:
Establish appropriate metrics and targets that will allow you to define success, track progress, and communicate achievement on these higher-level goals.
Check out some example metrics in the table below.
Budgeting metric |
Improvement driver |
Current value |
Future target |
|---|---|---|---|
Percentage of spend directly tied to an organizational goal. |
Better alignment via increased communication and partnership with the business. |
72% |
90% |
Number of changes to budget prior to final acceptance. |
Better accuracy and transparency via use of zero-based budgeting and enhanced stakeholder views. |
8 |
2 |
Percentage variance between budgeted vs. actuals. |
Improved forecasting through better understanding of business plans and in-cycle show-back. |
+4% |
+/-2% |
Percentage of budget approved after first presentation. |
Improved business rationales and direct mapping of expenditure to org priorities. |
76% |
95% |
Percentage of IT-driven project budget approved. |
More rigor around benefits, ROI calculation, and quantifying value delivered. |
80% |
100% |
First things first: Zero-based or incremental for OpEx? |
Set your OpEx targets |
|
|---|---|---|
Incremental budgeting is the addition of a few percentage onto next year’s budget, assuming the previous year’s OpEx is all re-occurring. The percentage often aligns with rates of inflation.
|
Zero-based budgeting involves rebuilding your budget from scratch, i.e. zero. It doesn’t assume that any of last year’s costs are recurring or consistent year to year.
|
Pick a range of percentage change based on your business context and past spend.
|
If cost-cutting or optimization is a priority, then a zero-based approach is the right decision. If doing this every year is too onerous, plan to do it for your OpEx at least every few years to examine what’s actually in there, clean house, and re-set.
A lot of IT CapEx is conceived in business projects, so your proposed expenditure here may not be up to you. Exercise as much influence as you can.
First things first: Is it project CapEx, or “business as usual” CapEx? |
||
|---|---|---|
Project CapEx is tied to one-time strategic projects requiring investment in new assets.
|
User-driven “business as usual” CapEx manifests via changes (often increases) in organizational headcount due to growth.
|
Network/data center-driven “business-as-usual” CapEx is about core infrastructure maintenance.
|
Unanticipated hiring and the need to buy end-user hardware is cited as a top cause of budget grief by IT leaders – get ahead of this. Project CapEx, however, is usually determined via business-based capital project approval mechanisms well in advance. And don’t forget to factor in pre-established capital asset depreciation amounts generated by all the above!
8 hours
Download the IT Cost Forecasting and Budgeting Workbook
| Input | Output | Materials | Participants |
|---|---|---|---|
|
|
|
|
Now you’re ready to do the deep dive into forecasting your IT budget for next year.
In this phase, you clarified your business context and defined your budgetary goals, including:
“We only have one dollar but five things. Help us understand how to spend that dollar.”
– Trisha Goya, Director, IT Governance & Administration, Hawaii Medical Service Association
Lay Your | Get Into Budget-Starting Position | Develop Your | Build Your | Create and Deliver Your Presentation |
|---|---|---|---|---|
1.1 Understand what your budget is 1.2 Know your stakeholders 1.3 Continuously pre-sell your budget | 2.1 Assemble your resources 2.2 Understand the four views of the ITFM Cost Model 2.3 Review last year’s budget vs. 2.4 Set your high-level goals | 3.1 Develop assumptions and 3.2 Forecast your project CapEx 3.3 Forecast your non-project CapEx and OpEx | 4.1 Aggregate your numbers 4.2 Stress test your forecasts 4.3 Challenge and perfect your | 5.1 Plan your content 5.2 Build your presentation 5.3 Present to stakeholders 5.4 Make final adjustments and submit your IT budget |
This phase will walk you through the following activities:
This phase involves the following participants:
This phase focuses on putting real numbers on paper based on the research and data you’ve collected. Here, you will:
“Our April forecast is what really sets the bar for what our increase is going to be next fiscal year. We realized that we couldn’t change it later, so we needed to do more upfront to get that forecast right.
If we know that IT projects have been delayed, if we know we pulled some things forward, if we know that a project isn’t starting until next year, let’s be really clear on those things so that we’re starting from a better forecast because that’s the basis of deciding two percent, three percent, whatever it’s going to be.”
– Kristen Thurber, IT Director, Office of the CIO, Donaldson Company
Assumptions are things you hold to be true. They may not actually be true, but they are your logical foundation and must be shared with stakeholders so they can follow your thinking.
Start with understanding your constraints. These are either negotiable (adjustable) or non-negotiable (non-adjustable). However, what is non-negotiable for IT may be negotiable for the organization as a whole, such as its strategic objectives. Consider each of the constraints below, determine how it relates to IT expenditure options, and decide if it’s ultimately negotiable or non-negotiable.
Organizational |
Legal and Regulatory |
IT/Other |
Example: |
|---|---|---|---|
|
|
|
You’re in year one of a three-year vendor contract. All contracts are negotiable, but this one isn’t for two years. This contact should be considered a non-negotiable for current budget-planning purposes. |
Identifying your negotiable and non-negotiable constraints is about knowing what levers you can pull. Government entities have more non-negotiable constraints than private companies, which means IT and the organization as a whole have fewer budgetary levers to pull and a lot less flexibility.
An un-pullable lever and a pullable lever (and how much you can pull it) have one important thing in common – they are all fundamental assumptions that influence your decisions.
My current employees will still be here 18 months from now. |
My current vendors aren’t going to discontinue the products we have. |
| My organization’s executive team will be the same 18 months from now. | My current key vendors will be around for years to come. |
My organization’s departments, divisions, and general structure will be the same 18 months from now. |
IT has to be an innovation leader. |
We won’t be involved in any merger/acquisition activity next fiscal year. |
IT has always played the same role here and that won’t change. |
There won’t be a major natural disaster that takes us offline for days or even weeks. |
We must move everything we can to the cloud. |
We won’t be launching any new products or services next fiscal year. |
Most of our IT expenditure has to be CapEx, as usual. |
You won’t put some of these assumptions into your final budget presentation. It’s simply worthwhile knowing what they are so you can challenge them when forecasting.
Now it’s time to outline your primary scenario.
A note on probability…
What could or will be your organization’s new current state at the end of next fiscal year?
Primary scenario approval can be helped by putting that scenario alongside alternatives that are less attractive due to their cost, priority, or feasibility. Alternative scenarios are created by manipulating or eliminating your negotiable constraints or treating specific unknowns as knowns. Here are some common alternative scenarios.
The high-cost scenario: Assumes very positive economic prospects. Characterized by more of everything – people and skills, new or more sophisticated technologies, projects, growth, and innovation. Remember to consider the long-term impact on OpEx that higher capital spend may bring in subsequent years.
Target 10-20% more expenditure than your primary scenario
The low-cost scenario: Assumes negative economic prospects or cost-control objectives. Characterized by less of everything, specifically capital project investment, other CapEx, and OpEx. Must assume that business service-level expectations will be down-graded and other sacrifices will be made.
Target 5-15% less expenditure than your primary scenario
The dark horse scenario: This is a more radical proposition that challenges the status quo. For example, what would the budget look like if all data specialists in the organization were centralized under IT? What if IT ran the corporate PMO? What if the entire IT function was 100% outsourced?
No specific target
INDUSTRY: Manufacturing
SOURCE: Anonymous
A manufacturing IT Director gets budgetary approval by showing what the business would have to sacrifice to get the cheap option.
Challenge |
Solution |
Results |
|---|---|---|
A manufacturing business had been cutting costs endlessly across the organization, but specifically in IT. IT was down to the bone. The IT Director had already been doing zero-based budgeting to rationalize all expenditure, stretching asset lifecycles as long as possible, and letting maintenance work slide. There were no obvious options left to reduce costs based on what the business wanted to do. |
The IT Director got creative. He put together three complete budgets:
In the budget presentation, he led with the “super cheap” budget where IT was 100% outsourced. |
He proceeded to review the things they wouldn’t have under the extreme outsourced scenario, including the losses in service levels that would be necessary to make it happen. The executive was shocked by what the IT Director showed them. The executive immediately approved the IT Director’s preferred budget. He was able to defend the best budget for the business by showing them what they stood to lose. |
2 hours
Download the IT Cost Forecasting and Budgeting Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Traditional, binary “CapEx vs. OpEx” distinctions don’t seem adequate for showing where expenditure is really going. We’ve added a new facet to help further differentiate one-time project costs from recurring “business as usual” expenses.
Project CapEx
Includes all workforce and vendor costs associated with planning and execution of projects largely focused on the acquisition or creation of new capital assets.
Non-project CapEx
Includes “business as usual” capital asset acquisition in the interest of managing, maintaining, or supporting ongoing performance of existing infrastructure or services, such as replacement network equipment, end-user hardware (e.g. laptops), or disaster recovery/business continuity redundancies. Also includes ongoing asset depreciation amounts.
Non-project OpEx
Includes all recurring, non-CapEx “business as usual” costs such as labor compensation and training, cloud-based software fees, outsourcing costs, managed services fees, subscriptions, and other discretionary spend.
Depreciation is technically CapEx. However, for practical purposes, most organizations list it under OpEx, which can cause it to get lost in the noise. Here, depreciation is under non-project CapEx to keep its true CapEx nature visible and in the company of other “business as usual” capital purchases that will ultimately join the depreciation ranks.
This process can be simple as far as overall budget forecasting is concerned. If it isn’t simple now, plan to make it simpler next time around.
What to expect…
Key forecasting principles…
Develop rigorous business cases
Secure funding approval well in advance
Tie back costs benefitting business units
Consider the longer-term OpEx impact
For more information about putting together sound business cases for different projects and circumstances, see the following Info-Tech blueprints:
Build a Comprehensive Business Case
Tip #1: Don’t surprise your approvers. Springing a capital project on approvers at your formal presentation isn’t a good idea and stands a good chance of rejection, so do whatever you can to lock these costs down well in advance.
Tip #2: Project costs should be entirely comprised of CapEx if possible. Keep in mind that some of these costs will convert to depreciated non-project CapEx and non-project OpEx as they transition from project costs to ongoing “business as usual” costs, usually in the fiscal year following the year of expenditure. Creating projections for the longer-term impacts of these project CapEx costs on future types of expenditure is a good idea. Remember that a one-time project is not the same thing as a one-time cost.
Tip #3: Capitalize any employee labor costs on capital projects. This ensures the true costs of projects are not underestimated and that operational staff aren’t being used for free at the expense of their regular duties.
Tip #4: Capitalizing cloud costs in year one of a formal implementation project is usually acceptable. It’s possible to continue treating cloud costs as CapEx with some vendors via something called reserved instances, but organizations report that this is a lot of work to set up. In the end, most capitalized cloud will convert into non-project OpEx in years two and beyond.
Tip #5: Build in some leeway. By the time a project is initiated, circumstances may have changed dramatically from when it was first pitched and approved, including business priorities and needs, vendor pricing, and skillset availability. Your costing may become completely out of date. It’s a good practice to work within more general cost ranges than with specific numbers, to give you the flexibility to respond and adapt during actual execution.
Time: Depends on size of project portfolio
Download the IT Cost Forecasting and Budgeting Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
What to expect…
Central to the definition of OpEx is the fact that it’s ongoing. It rarely stops, and tends to steadily increase over time due to factors like inflation, rising vendor prices, growing organizational growth, increases in the salary expectations of employees, and other factors.
The only certain ways to reduce OpEx are to convert it to capitalizable expenditure, decrease staffing costs, not pursue cloud technologies, or for the organization to simply not grow. For most organizations, none of these approaches are feasible. Smaller scale efficiencies and optimizations can keep OpEx from running amok, but they won’t change its overall upward trajectory over time. Expect it to increase.
Key forecasting principles…
Focus on optimization and efficiency.
Aim for full spend transparency.
Think about appropriate chargeback options.
Give it the time it deserves.
For more information about how to make the most out of your IT OpEx, see the following Info-Tech blueprints:
Develop Your Cost Optimization Roadmap
Achieve IT Spend & Staffing Transparency
Tip #1: Consider zero-based budgeting. You don’t have to do this every year, but re-rationalizing your OpEx every few years, or a just a segment of it on a rotational basis, will not only help you readily justify the expenditure but also find waste and inefficiencies you didn’t know existed.
Tip #2: Capitalize your employee capital project work. While some organizations aren’t allowed to do this, others who can simply don’t bother. Unfortunately, this act can bloat the OpEx side of the equation substantially. Many regular employees spend a significant amount of their time working on capital projects, but this fact is invisible to the business. This is why the business keeps asking why it takes so many people to run IT.
Tip #3: Break out your cloud vs. on-premises costs. Burying cloud apps costs in a generic software bucket works against any transparency ambitions you may have. If you have anything resembling a cloud strategy, you need to track, report, and plan for these costs separately in order to measure benefits realization. This goes for cloud infrastructure costs, too.
Tip #4: Spend time on your CIO service view forecast. Completing this view counts as a first step toward service-based costing and is a good starting point for setting up an accurate service catalog. If looking for cost reductions, you’ll want to examine your forecasts in this view as there will likely be service-level reductions you’ll need to propose to hit your cost-cutting goals.
Tip #5: Budget with consideration for chargeback. chargeback mechanisms for OpEx can be challenging to manage and have political repercussions, but they do shift accountability back to the business, guarantee that the IT bills get paid, and reduce IT’s OpEx burden. Selectively charging business units for applications that only they use may be a good entry point into chargeback. It may also be as far as you want to go with it. Doing the CXO business view forecast will provide insight into your opportunities here.
These costs are often the smallest percentage of overall expenditure but one of the biggest sources of financial grief for IT.
What to expect…
Key forecasting principles…
Discuss hiring plans with the business.
Pay close attention to your asset lifecycles.
Prepare to advise about depreciation schedules.
Build in contingency for the unexpected.
For more information about ensuring IT isn’t left in the lurch when it comes to non-project CapEx, see the following Info-Tech blueprints:
Tip #1: Top up new hire estimations: Talk to every business unit leader about their concrete hiring plans, not their aspirations. Get a number, increase that number by 25% or 20 FTEs (whichever is less), and use this new number to calculate your end-user non-project CapEx.
Tip #2: Make an arrangement for who’s paying for operational technology (OT) devices and equipment. OT involves specialized devices such as in-the-field sensors, scanners, meters, and other networkable equipment. Historically, operational units have handled this themselves, but this has created security problems and they still rely on IT for support. Sort the financials out now, including whose budget device and equipment purchases appear on, as well as what accommodations IT will need to make in its own budget to support them.
Tip #3: Evaluate cloud infrastructure and managed services. These can dramatically reduce your non-project CapEx, particularly on the network and data center fronts. However, these solutions aren’t necessarily less expensive and will drive up OpEx, so tread cautiously.
Tip #4: Definitely do an inventory. If you haven’t invested in IT asset management, put it on your project and budgetary agenda. You can’t manage what you don’t know you have, so asset discovery should be your first order of business. From there, start gathering asset lifecycle information and build in alerting to aid your spend planning.
Tip #5: Think about retirement: What assets are nearing end of life or the end of their depreciation schedule? What impact is this having on non-project OpEx in terms of maintenance and support? Deciding to retire, replace, or extend an IT operational asset will change your non-project CapEx outlook and will affect costs in other areas.
Tip #6: Create a contingency fund: You need one to deal with surprises and emergencies, so why wait?
A powerful metric to share with business stakeholders is expenditure per employee or FTE. It’s powerful because:
This metric is one of the simplest to calculate. The challenge is in getting your hands on the data in the first place.
Short-term forecasting: |
Long-term forecasting: |
|---|---|
“It’s a great step in the right direction. We look at – Kristen Thurber, IT Director, Office of the CIO, |
“This approach was much better. We now – Trisha Goya, Director, IT Governance & Administration, |
Time: Depends on size of vendor portfolio and workforce
Download the IT Cost Forecasting and Budgeting Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
INDUSTRY: Insurance
SOURCE: Anonymous
Challenge | Solution | Results |
|---|---|---|
In his first run at the annual budgeting process, a new CIO received delivery dates from Finance and spent the next three months building the budget for the next fiscal year. He discovered that the organization had been underinvesting in IT for a long time. There were platforms without support, no accounting for currency exchange rates on purchases, components that had not be upgraded in 16 years, big cybersecurity risks, and 20 critical incidences a month. | In his budget, the CIO requested a 22-24% increase in IT expenditure to deal with the critical gaps, and provided a detailed defense of his proposal But the new CIO’s team and Finance were frustrated with him. He asked his IT finance leader why. She said she didn’t understand what his direction was and why the budgeting process was taking so long – his predecessor did the budget in only two days. He would add up the contracts, add 10% for inflation, and that’s it. | Simply put, the organization hadn’t taken budgeting seriously. By doing it right, the new CIO had inadvertently challenged the status quo. The CIO ended up under-executing his first budget by 12% but is tracking closer to plan this year. Significantly, he’s been able cut critical incidences from 20 down to only 2-3 per month. Some friction persists with the CFO, who sees him as a “big spender,” but he believes that this friction has forced him to be even better. |
The hard math is done. Now it’s time to step back and craft your final proposed budget and its key messages.
This phase focused on developing your forecasts and proposed budget for next fiscal year. It included:
“Ninety percent of your projects will get started but a good 10% will never get off the ground because of capacity or the business changes their mind or other priorities are thrown in. There are always these sorts of challenges that come up.”
– Theresa Hughes, Executive Counselor,
Info-Tech Research Group
and Former IT Executive
Lay Your | Get Into Budget-Starting Position | Develop Your | Build Your | Create and Deliver Your Presentation |
|---|---|---|---|---|
1.1 Understand what your budget is 1.2 Know your stakeholders 1.3 Continuously pre-sell your budget | 2.1 Assemble your resources 2.2 Understand the four views of the ITFM Cost Model 2.3 Review last year’s budget vs. 2.4 Set your high-level goals | 3.1 Develop assumptions and 3.2 Forecast your project CapEx 3.3 Forecast your non-project CapEx and OpEx | 4.1 Aggregate your numbers 4.2 Stress test your forecasts 4.3 Challenge and perfect your | 5.1 Plan your content 5.2 Build your presentation 5.3 Present to stakeholders 5.4 Make final adjustments and submit your IT budget |
This phase will walk you through the following activities:
This phase involves the following participants:
Triple check your numbers and put the finishing touches on your approval-winning rationales.
This phase is where your analysis and decision making finally come together into a coherent budget proposal. Key steps include:
“We don’t buy servers and licenses because we want to. We buy them because we have to. IT doesn’t need those servers out at our data center provider, network connections, et cetera. Only a fraction of these costs are to support us in the IT department. IT doesn’t have control over these costs because we’re not the consumers.”
– Matt Johnson, IT Director Governance and Business Solutions, Milwaukee County
Rationales build credibility and trust in your business capabilities. They can also help stop the same conversations happening year after year.
Any item in your proposed budget can send you down a rabbit hole if not thoroughly defensible.
You probably won’t need to defend every item, but it’s best to be prepared to do so. Ask yourself:
“Budgets get out of control when one department fails to care for the implications of change within another department's budget. This wastes time, reduces accuracy and causes conflict.”
– Tara Kinney, Atomic Revenue, LLC.
Not all spending serves the same purpose. Some types require deeper or different justifications than others.
For the business, there are two main purposes for spend:
“Approval came down to ROI and the ability to show benefits realization for years one, two, and three through five.”
– Duane Cooney, Executive Counselor, Info-Tech Research Group, and Former Healthcare CIO
Regardless of its ultimate purpose, all expenditure needs statements of assumptions, obstacles, and likelihood of goals being realized behind it.
Rationales aren’t only for capital projects – they can and should be applied to all proposed OpEx and CapEx. Business project rationales tend to drive revenue and the customer experience, demanding ROI calculations. Internal IT-projects and non-project expenditure are often focused on mitigating and managing risk, requiring cost-benefit analysis.
Overall |
Non-Project OpEx |
Non-Project CapEx |
Project CapEx |
|---|---|---|---|
|
|
|
|
2 hours
Download the IT Cost Forecasting and Budgeting Workbook
| Input | Output | Materials | Participants |
|---|---|---|---|
|
|
|
|
INDUSTRY: Healthcare
SOURCE: Anonymous
Challenge | Solution | Results |
|---|---|---|
A senior nursing systems director needed the CIO’s help. She wanted to get a project off the ground, but it wasn’t getting priority or funding. Nurses were burning out. Many were staying one to two hours late per shift to catch up on patient notes. Their EHR platform had two problematic workflows, each taking up to about 15 minutes per nurse per patient to complete. These workflows were complex, of no value, and just not getting done. She needed a few million dollars to make the fix. | The CIO worked with the director to do the math. In only a few hours, they realized that the savings from rewriting the workflows would allow them to hire over 500 full-time nurses. The benefits realized would not only help reduce nurse workload and generate savings, but also increase the amount of time spent with patients and number of patients seen overall. They redid the math several times to ensure they were right. | The senior nursing systems director presented to her peers and leadership, and eventually to the Board of Directors. The Board immediately saw the benefits and promoted the project to first on the list ahead of all other projects. This collaborative approach to generating project benefits statements helped the CIO gain trust and pave the way for future budgets. |
First, recall what budgets are really about.
The completeness, accuracy, and granularity of your numbers and thorough ROI calculations for projects are essential. They will serve you well in getting the CFO’s attention. However, the numbers will only get you halfway there. Despite what some people think, the work in setting a budget is more about the what, how, and why – that is, the rationale – than about the how much.
Next, revisit Phase 1 of this blueprint and review:
Then, look at each component of your proposed budget through each of these three rationale-building lenses.
Business goals
What are the organization’s strategic priorities?
Governance culture
How constrained is the decision-making process?
Feasibility
Can we make it happen?
Business goals What are the organization’s strategic priorities? |
Context This is all about external factors, namely the broader economic, political, and industry contexts in which the organization operates. |
Lifecycle position The stage the organization is at in terms of growth, stability, or decline will drive decisions, priorities, and the ability to spend or invest. |
Opportunities Context and lifecycle position determine opportunities, which are often defined in terms of potential cost savings |
Tie every element in your proposed budget to an organizational goal. |
Non-project OpEx
|
Non-project CapEx
|
Project CapEx
|
Governance Culture How rigorous/ constrained |
Risk tolerance This is the organization’s willingness to be flexible, take chances, make change, and innovate. It is often driven by legal and regulatory mandates. |
Control Control manifests in the number and nature of rules and how authority and accountability are centralized or distributed in the organization. |
Speed to action How quickly decisions are made and executed upon is determined by the amount of consultation and number of approval steps. |
Ensure all parts of your proposed budget align with what’s tolerated and allowed. |
Non-project OpEx
| Non-project CapEx
| Project CapEx
|
Feasibility Can we do it, and what sacrifices will we have to make? |
Funding The ultimate determinant of feasibility is the availability, quantity, and reliability of funding next fiscal year and over the long term to support investment. |
Capabilities Success hinges on both the availability and accessibility of required skills and knowledge to execute on a spend plan in the required timeframe. |
Risk Risk is not just about obstacles to success and what could happen if you do something – it’s also about what could happen if you do nothing at all. |
Vet every part of your proposed budget to ensure what you’re asking for is both realistic and possible. |
Non-project OpEx
| Non-project CapEx
| Project CapEx
|
Detailed data and information checklist:
|
High-level rationale checklist:
|
For more on creating detailed business cases for projects and investments, see Info-Tech’s comprehensive blueprint, Build a Comprehensive Business Case.
2 hours
Download the IT Cost Forecasting and Budgeting Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
This phase is where everything came together into a coherent budget proposal. You were able to:
“Current OpEx is about supporting and aligning with past business strategies. That’s alignment. If the business wants to give up on those past business strategies, that’s up to them.”
– Darin Stahl, Distinguished Analyst and Research Fellow, Info-Tech Research Group
Lay Your | Get Into Budget-Starting Position | Develop Your | Build Your | Create and Deliver Your Presentation |
|---|---|---|---|---|
1.1 Understand what your budget is 1.2 Know your stakeholders 1.3 Continuously pre-sell your budget | 2.1 Assemble your resources 2.2 Understand the four views of the ITFM Cost Model 2.3 Review last year’s budget vs. 2.4 Set your high-level goals | 3.1 Develop assumptions and 3.2 Forecast your project CapEx 3.3 Forecast your non-project CapEx and OpEx | 4.1 Aggregate your numbers 4.2 Stress test your forecasts 4.3 Challenge and perfect your | 5.1 Plan your content 5.2 Build your presentation 5.3 Present to stakeholders 5.4 Make final adjustments and submit your IT budget |
This phase will walk you through the following activities:
This phase involves the following participants:
This phase focuses on developing your final proposed budget presentation for delivery to your various stakeholders. Here you will:
“I could have put the numbers together in a week. The process of talking through what the divisions need and spending time with them is more time consuming than the budget itself.”
– Jay Gnuse, IT Director, Chief Industries
Mandatory: Just about every CFO or approving body will expect to see this information. Often high level in nature, it includes:
|
Recommended: This information builds on the mandatory elements, providing more depth and detail. Inclusion of recommended content depends on:
|
Optional: This is very detailed information that provides alternative views and serves as reinforcement of your key messages. Consider including it if:
|
Deciding what to include or exclude depends 100% on your target audience. What will fulfill their basic information needs as well as increase their engagement in IT financial issues?
These represent the contextual framework for your proposal and explain why you made the decisions you did.
Stating your assumptions and presenting at least two alternative scenarios helps in the following ways:
Your assumptions and alternative scenarios may not appear back-to-back in your presentation, yet they’re intimately connected in that every unique scenario is based on adjustments to your core assumptions. These tweaks – and the resulting scenarios – reflect the different degrees of probability that a variable is likely to land on a certain value (i.e. an alternative assumption).
Your primary scenario is the one you believe is most likely to happen and is represented by the complete budget you’re recommending and presenting.
Target timeframe for presentation: 2 minutes
Key objectives: Setting context, demonstrating breadth of thought.
Potential content for section:
“Things get cut when the business
doesn’t know what something is,
doesn’t recognize it, doesn’t understand it. There needs to be an education.”
– Angie Reynolds, Principal Research Director, ITFM Practice,
Info-Tech Research Group,
See Tabs “Planning Variables” and 9, “Alternative Scenarios” in your IT Cost Forecasting and Budgeting Workbook for these outputs.
Core assumptions |
Primary target scenario |
Alternative scenarios |
Full alternative scenario budgets |
|---|---|---|---|
List |
Slide |
Slide |
Budget |
Mandatory: This is a listing of both internal and external factors that are most likely to affect the challenges and opportunities your organization will have and how it can and will operate. This includes negotiable and non-negotiable internal and external constraints, stated priorities, and the expression of known risk factors. |
Mandatory: Emanating from your core assumptions, this scenario is a high-level statement of goals, initial budget targets, and proposed budget based on your core assumptions. |
Recommended: Two alternatives are typical, with one higher spend and one lower spend than your target. The state of the economy and funding availability are the assumptions usually tweaked. More radical scenarios, like the cost and implications of completely outsourcing IT, can also be explored. |
Optional: This is a lot of work, but some IT leaders do it if an alternative scenario is a strong contender or is necessary to show that a proposed direction from the business is costly or not feasible. |

This retrospective on IT expenditure is important for three reasons:
You probably won’t have a lot of time for this section, so everything you select to share should pack a punch and perform double duty by introducing concepts you’ll need your stakeholders to have internalized when you present next year’s budget details.
Target timeframe for presentation: 7 minutes
Key objectives: Definitions, alignment, expectations-setting.
Potential content for section:
“If they don’t know the consequences of their actions, how are they ever going to change their actions?”
– Angela Hintz, VP of PMO & Integrated Services,
Blue Cross and Blue Shield of Louisiana
See Tabs 1 “Historical Events & Projects,” 3 “Historical Analysis,” and 6 “Vendor Worksheet” in your IT Cost Forecasting and Budgeting Workbook for these outputs.
Total budgeted vs. total actuals | Graph | Mandatory: Demonstrates the variance between what you budgeted for last year and what was actually spent. Explaining causes of variance is key. |
|---|---|---|
l actuals by expenditure type | Graph | Mandatory: Provides a comparative breakdown of last year’s expenditure by non-project OpEx, non-project CapEx, and project CapEx. This offers an opportunity to explain different types of IT expenditure and why they’re the relative size they are. |
Major capital projects completed | List | Mandatory: Illustrates progress made toward strategically important objectives. |
Top vendors | List | Recommended: A list of vendors that incurred the highest costs, including their relative portion of overall expenditure. These are usually business software vendors, i.e. tools your stakeholders use every day. The number of vendors shown is up to you. |

See Tab 1, “Historical Events & Projects” in your IT Cost Forecasting and Budgeting Workbook for these outputs.
| Cost drivers | List | Mandatory: A list of major events, circumstances, business decisions, or non-negotiable factors that necessitated expenditure. Be sure to focus on the unplanned or unexpected situations that caused upward variance. |
|---|---|---|
Savings drivers | List | Mandatory: A list of key initiatives pursued, or circumstances that resulted in efficiencies or savings. Include any deferred or canceled projects. |

Also calculate and list the magnitude of costs incurred or savings realized in hard financial terms so that the full impact of these events is truly understood by your stakeholders.
“What is that ongoing cost?
If we brought in a new platform, what
does that do to our operating costs?”
– Kristen Thurber, IT Director, Office of the CIO, Donaldson Company
See Tab 3 “Historical Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.
IT actual expenditure |
Graph |
Mandatory: This is crucial for showing overall IT expenditure patterns, particularly percentage changes up or down year to year, and what the drivers of those changes were. |
|---|---|---|
IT actuals as a % of organizational revenue |
Graph |
Mandatory: You need to set the stage for the proposed percentage of organizational revenue to come. The CFO will be looking for consistency and an overall decreasing pattern over time. |
IT expenditure per FTE year over year |
Graph |
Optional: This can be a powerful metric as it’s simple and easily to understand. |

The historical analysis you can do is endless. You can generate many more cuts of the data or go back even further – it’s up to you.
Keep in mind that you won’t have a lot of time during your presentation, so stick to the high-level, high-impact graphs that demonstrate overarching trends or themes.
See Tab 3 “Historical Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.
Budgeted vs. actuals CFO expense view | Graph | Mandatory: Showing different types of workforce expenditure compared to different types of vendor expenditure will be important to the CFO. |
|---|---|---|
Budgeted vs. actuals CIO services view | Graph | Optional: Showing the expenditure of some IT services will clarify the true total costs of delivering and supporting these services if misunderstandings exist. |
Budgeted vs. actuals CXO business view | Graph | Optional: A good way to show true consumption levels and the relative IT haves and have-nots. Potentially political, so consider sharing one-on-one with relevant business unit leaders instead of doing a big public reveal. |
Budgeted vs. actual CEO innovation view | Graph | Optional: Clarifies how much the organization is investing in innovation or growth versus keeping the lights on. Of most interest to the CEO and possibly the CFO, and good for starting conversations about how well funding is aligned with strategic directions. |

30 minutes
Download the IT Cost Forecasting and Budgeting Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Build a logical bridge between what happened in the past to what’s coming up next year using a comparative approach and feature major highlights.
This transitional phase between the past and the future is important for the following reasons:
Consider this the essential core of your presentation – this is the key message and what your audience came to hear.
Target timeframe for presentation: 10 minutes
Key objectives: Transition, reveal proposed budget.
Potential content for section:
“The companies...that invest the most in IT aren’t necessarily the best performers.
On average, the most successful small and medium companies are more frugal when it comes to
company spend on IT (as long as they do it judiciously).”
– Source: Techvera, 2023
See Tab 8, “Proposed Budget Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.
Last year’s total actuals vs. next year’s total forecast | Proposed budget in context: Year-over-year expenditure | Last year’s actuals vs. next year’s proposed by expenditure type | Last year’s expenditure per FTE vs. next year’s proposed |
|---|---|---|---|
Graph | Graph | Graph | Graph |
Mandatory: This is the most important graph for connecting the past with the future and is also the first meaningful view your audience will have of your proposed budget for next year. | Mandatory: Here, you will continue the long-term view introduced in your historical data by adding on next year’s projections to your existing five-year historical trend. The percentage change from last year to next year will be the focus. | Recommended: A double-comparative breakdown of last year vs. next year by non-project OpEx, non-project CapEx, and project CapEx illustrates where major events, decisions, and changes are having their impact. | Optional: This graph is particularly useful in demonstrating the success of cost-control if the actual proposed budget is higher that the previous year but the IT cost per employee has gone down. |
![]() | |||
See Tab 5, “Project CapEx Forecast” in your IT Cost Forecasting and Budgeting Workbook for the data and information to create these outputs.
Major project profile | Slide | Mandatory: Focus on projects for which funding is already committed and lean toward those that are strategic or clearly support business goal attainment. How many you profile is up to you, but three to five is suggested. |
|---|---|---|
Minor project overview | List | Optional: List other projects on IT’s agenda to communicate the scope of IT’s project-related responsibilities and required expenditure to be successful. Include in-progress projects that will be completed next year and net-new projects on the roster. |

You can’t profile every project on the list, but it’s important that your stakeholders see their priorities clearly reflected in your budget; projects are the best way to do this.
If you’ve successfully pre-sold your budget and partnered with business-unit leaders to define IT initiatives, your stakeholders should already be very familiar with the project summaries you put in front of them in your presentation.
30 minutes
Download the IT Cost Forecasting and Budgeting Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
The graphs you select here will be specific to your audience and any particular message you need to send.
This detailed phase of your presentation is important because it allows you to:
Target timeframe for presentation: 7 minutes, but this phase of the presentation may naturally segue into the final Q&A.
Key objectives: Transparency, dialogue, buy-in.
Potential content for section:
“A budget is a quantified version of
your service-level agreements.”
– Darin Stahl, Distinguished Analysis & Research Fellow,
Info-Tech Research Group,
See Tab 8, “Proposed Budget Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.
Proposed budget: Workforce and vendors by expenditure type | Graph | Mandatory: This is the traditional CFO’s view, so definitely show it. The compelling twist here is showing it by expenditure type, i.e. non-project OpEx, non-project CapEx, and project CapEx. |
|---|---|---|
Proposed budget: Cloud vs. on-premises vendor expenditure | Graph | Optional: If this is a point of contention or if an active transition to cloud solutions is underway, then show it. |
Top vendors | Graph | Recommended: As with last year’s actuals, showing who the top vendors are slated to be next year speaks volumes to stakeholders about exactly where much of their money is going. |
If you have a diverse audience with diverse interests, be very selective – you don’t want to bore them with things they don’t care about.
See Tab 8, “Proposed Budget Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.
Proposed budget: IT services by expenditure type | Graph | Optional: Business unit leaders will be most interested in the application services. Proposed expenditure on security and data and BI services may be of particular interest given business priorities. Don’t linger on infrastructure spend unless chargeback is in play. |
|---|---|---|
Proposed budget: Business units by expenditure type | Graph | Optional: The purpose of this data is to show varying business units where they stand in terms of consumption. It may be more appropriate to show this graph in a one-on-one meeting or other context. |
Proposed budget: Business focus by expenditure type | Graph | Optional: The CEO will care most about this data. If they’re not in the room, then consider bypassing it and discuss it separately with the CFO. |
Inclusion of these graphs really depends on the makeup of your audience. It’s a good decision to show all of them to your CFO at some point before the formal presentation. Consider getting their advice on what to include and exclude.
30 minutes
Download the IT Cost Forecasting and Budgeting Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download Info-Tech’s IT Budget Executive Presentation Template

If you prefer, use your own internal presentation standard template instead and Info-Tech’s template as a structural guide.
Regardless of the template you use, Info-Tech recommends the following structure:
Leave the details for the speaker’s notes.
Remember that this is an executive presentation. Use tags, pointers, and very brief sentences in the body of the presentation itself. Avoid walls of text. You want your audience to be listening to your words, not reading a slide.
Speak to everything that represents an increase or decrease of more than 5% or that simply looks odd.
Being transparent is essential. Don’t hide anything. Acknowledge the elephant in the room before your audience does to quickly stop suspicious or doubtful thoughts
Identify causes and rationales.
This is why your numbers are as they are. However, if you’re not 100% sure what all driving factors are, don’t make them up. Also, if the line between cause and effect isn’t straight, craft in advance a very simple way of explaining it that you can offer whenever needed.
Be neutral and objective in your language.
You need to park strong feelings at the door. You’re presenting rational facts and thoroughly vetted recommendations. The best defense is not to be defensive, or even offensive for that matter. You don’t need to argue, plead, or apologize – let your information speak for itself and allow the audience to arrive at their own logical conclusions.
Re-emphasize your core themes to create connections.
If a single strategic project is driving cost increases across multiple cost categories, point it out multiple times if needed to reinforce its importance. If an increase in one area is made possible by a significant offset in another, say so to demonstrate your ongoing commitment to efficiencies. If a single event from last year will continue having cost impacts on several IT services next year, spell this out.
Duration: 2 hours
Note: Refer to your organization’s standards and norms for executive-level presentations and either adapt the Info-Tech template accordingly or use your own.
Download the IT Budget Executive Presentation template
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Some final advice on presenting your proposed budget…
Partner up If something big in your budget is an initiative that’s for a specific business unit, let that business unit’s leader be the face of it and have IT play the role of supporting partner. |
Use your champions Let your advocates know in advance that you’d appreciate hearing their voice during the presentation if you encounter any pushback, or just to reinforce your main messages. |
Focus on the CFO The CFO is the most important stakeholder in the room at the end of the day, even more than the CEO in some cases. Their interests should take priority if you’re pressed for time. |
Avoid judgment Let the numbers speak for themselves. Do point out highlights and areas of interest but hold off on offering emotion-driven opinions. Let your audience draw their own conclusions. |
Solicit questions You do want dialogue. However, keep your answers short and to the point. What does come up in discussion is a good indication of where you’ll need to spend more time in the future. |
The only other thing that can boost your chances is if you’re lucky enough to be scheduled to present between 10:00 and 11:00 on a Thursday morning when people are most agreeable. Beyond that, apply the standard rules of good presentations to optimize your success.
You’ve reached the end of the budget creation and approval process. Now you can refocus on using your budget as a living governance tool.
This phase focused on developing your final proposed budget presentation for delivery to your various stakeholders. Here, you:
“Everyone understands that there’s never enough money. The challenge is prioritizing the right work and funding it.”
– Trisha Goya, Director, IT Governance & Administration, Hawaii Medical Service Association
“Keep that conversation going throughout the year so that at budgeting time no one is surprised…Make sure that you’re telling your story all year long and keep track of that story.”
– Angela Hintz, VP of PMO & Integrated Services,
Blue Cross and Blue Shield of Louisiana
This final section will provide you with:
By following the phases and steps in this blueprint, you have:
What’s next?
Use your approved budget as an ongoing IT financial management governance tool and track your budget process improvement metrics.
If you would like additional support, have our analysts guide you through an Info-Tech full-service engagement or Guided Implementation.
Contact your account representative for more information.
1-888-670-8889
Monica Braun Research Director, ITFM Practice Info-Tech Research Group |
Carol Carr Technical Counselor (Finance) Info-Tech Research Group |
Larry Clark Executive Counselor Info-Tech Research Group |
Duane Cooney Executive Counselor Info-Tech Research Group |
Lynn Fyhrlund Former Chief Information Officer Milwaukee County |
Jay Gnuse Information Technology Director Chief Industries |
Trisha Goya Director, IS Client Services Hawaii Medical Service Association |
Angela Hintz VP of PMO & Integrated Services Blue Cross and Blue Shield of Louisiana |
Rick Hopfer Chief Information Officer Hawaii Medical Service Association |
Theresa Hughes Executive Counselor Info-Tech Research Group |
Dave Kish Practice Lead, IT Financial Management Practice Info-Tech Research Group | Matt Johnson IT Director Governance and Business Solutions Milwaukee County |
Titus Moore Executive Counselor Info-Tech Research Group | Angie Reynolds Principal Research Director, IT Financial Management Practice Info-Tech Research Group |
Mark Roman Managing Partner, Executive Services Info-Tech Research Group | Darin Stahl Distinguished Analyst & Research Fellow Info-Tech Research Group |
Miguel Suarez Head of Technology Seguros Monterrey New York Life | Kristen Thurber IT Director, Office of the CIO Donaldson Company |
Achieve IT Spend & Staffing Transparency
IT Spend & Staffing Benchmarking Service
Build Your IT Cost Optimization Roadmap
“How Much Should a Company Spend on IT?” Techvera, no date. Accessed 3 Mar. 2023.
“State of the CIO Study 2023.” Foundry, 25 Jan. 2023. Accessed 3 Mar. 2023.
Aberdeen Strategy & Research. “The State of IT 2023.” Spiceworks. Ziff Davis, 2022. Accessed 28 Feb. 2023.
Ainsworth, Paul. “Responsibilities of the Modern CFO - A Function in Transition.” TopTal, LLC., no date. Accessed 15 Feb. 2023.
Balasaygun, Kaitlin. “For the first time in a long time, CFOs can say no to tech spending.” CNBC CFO Council, 19 Jan. 2023. Accessed 17 Feb. 2023.
Bashir, Ahmad. “Objectives of Capital Budgeting and factors affecting Capital Budget Decisions.” LinkedIn, 27 May 2017. Accessed 14 Apr. 2023.
Blackmon, Kris. “Building a Data-Driven Budget Pitch the C-Suite Can't Refuse.” NetSuite Brainyard, 21 Sep. 2021. Accessed 17 Feb. 2023
Butcher, Daniel. “CFO to CFO: Budgeting to Fund Strategic Plans.” Strategic Finance Magazine/Institute of Management Accountants, 1 Dec. 2021. Accessed 17 Feb. 2023
Gray, Patrick. “IT Budgeting: A Cheat Sheet.” TechRepublic, 29 Jul. 2020. Accessed 28 Feb. 2023.
Greenbaum, David. “Budget vs. Actuals: Budget Variance Analysis & Guide.” OnPlan, 15 Mar. 2022. Accessed 22 Mar. 2023.
Huber, Michael and Joan Rundle. “How to Budget for IT Like a CFO.” Huber & Associates, no date. Accessed 15 Feb. 2023.
Kinney, Tara. “Executing Your Department Budget Like a CFO.” Atomic Revenue, LLC., no date. Accessed 15 Feb. 2023.
Lafley, A.G. “What Only the CFO Can Do.” Harvard Business Review, May 2009. Accessed 15 Mar. 2009.
Moore, Peter D. “IN THE DIGITAL WORLD, IT should be run as a profit center, not a cost center.” Wild Oak Enterprise, 26 Feb. 2020. Accessed 3 Mar. 2023.
Nordmeyer, Bille. “What Factors Are Going to Influence Your Budgeting Decisions?” bizfluent, 8 May 2019. Accessed 14 Apr. 2023
Ryan, Vincent. “IT Spending and 2023 Budgets Under Close Scrutiny.” CFO, 5 Dec. 2022. Accessed 3 Mar. 2023.
Stackpole, Beth. “State of the CIO, 2022: Focus turns to IT fundamentals.” CIO Magazine, 21 Mar. 2022. Accessed 3 Mar. 2023.
Do you experience challenges with the following:
Use the reference architecture to plan for the solution you need and want to deploy. Infrastructure planning and strategy optimizes the container image supply chain, uses your current infrastructure, and reduces costs for compute and image scan time.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
A document that walks you through the components of a container management solution and helps align your business objectives with your current infrastructure services and plan for your future assets.
Complete the reference architecture tool to strategize your container management.
Containers have become popular as enterprises use DevOps to develop and deploy applications faster. Containers require managed services because the sheer number of containers can become too complex for IT teams to handle. Orchestration platforms like Kubernetes can be complex, requiring management to automatically deploy container-based applications to operating systems and public clouds. IT operations staff need container management skills and training.
Installing and setting up container orchestration tools can be laborious and error-prone. IT organizations must first implement the right infrastructure setup for containers by having a solid understanding of the scope and scale of containerization projects and developer requirements. IT administrators also need to know how parts of the existing infrastructure connect and communicate to maintain these relationships in a containerized environment. Containers can run on bare metal servers, virtual machines in the cloud, or hybrid configurations, depending on your IT needs

Nitin Mukesh
Senior Research Analyst, Infrastructure and Operations
Info-Tech Research Group
| Your Challenge | Common Obstacles | Info-Tech’s Approach |
|
The container software market is constantly evolving. Organizations must consider many factors to choose the right container management software for their specific needs and fit their future plans. It's important to consider your organization's current and future infrastructure strategy and how it fits with your container management strategy. The container management platform you choose should be compatible with the existing network infrastructure and storage capabilities available to your organization. |
IT operations staff have not been thinking the same way as developers who have now been using an agile approach for some time. Container image builds are highly automated and have several dependencies including scheduling, testing, and deployment that the IT staff is not trained for or lack the ability to create anything more than a simple image. |
Use the reference architecture to plan for the solution you need and want to deploy. Infrastructure planning and strategy optimizes the container image supply chain and reduces costs for compute and image scan time. Plan ahead to ensure your container strategy aligns with your infrastructure roadmap. Before deciding between bare metal and cloud, understand the different components of a container management solution and plan for current and future infrastructure services. |
Choosing the right container technology: IT is a rapidly changing and evolving market, with startups and seasoned technology vendors maintaining momentum in everything from container platforms to repositories to orchestration tools. The rapid evolution of container platform components such as orchestration, storage, networking, and system services such as load balancing has made the entire stack a moving target.
However, waiting for the industry to be standardized can be a recipe for paralysis, and waiting too long to decide on solutions and approaches can put a company's IT operations in catch-up mode.
Keeping containers secure: Security breaches in containers are almost identical to operating system level breaches in virtual machines in terms of potential application and system vulnerabilities. It is important for any DevOps team working on container and orchestration architecture and management to fully understand the potential vulnerabilities of the platforms they are using.
Optimize your infrastructure strategy for containers: One of the challenges enterprise IT operations management teams face when it comes to containers is the need to rethink the underlying infrastructure to accommodate the technology. While you may not want to embrace the public cloud for your critical applications just yet, IT operations managers will need an on-premises infrastructure so that applications can scale up and down the same way as they are containerized.
A Separation of responsibilities
Containerization provides a clear separation of responsibilities as developers can focus on application logic and dependencies, while IT operations teams can focus on deployment and management instead of application details such as specific software versions and configurations.
B Workload portability
Containers can run almost anywhere: physical servers or on-premise data centers on virtual machines or developer machines, as well as public clouds on Linux, Windows, or Mac operating systems, greatly easing development and deployment.
“Lift and shift” existing applications into a modern cloud architecture. Some organizations even use containers to migrate existing applications to more modern environments. While this approach provides some of the basic benefits of operating system virtualization, it does not provide all the benefits of a modular, container-based application architecture.
C Application isolation
Containers virtualize CPU, memory, storage, and network resources at the operating system level, providing developers with a logically isolated view of the operating system from other applications.
Source: TechTarget, 2021
A container is a partially isolated environment in which an application or parts of an application can run. You can use a single container to run anything from small microservices or software processes to larger applications. Inside the container are all the necessary executable, library, and configuration files. Containers do not contain operating system images. This makes them lighter and more portable with much less overhead. Large application deployments can deploy multiple containers into one or more container clusters (CapitalOne, 2020).
Containers have the following advantages:
Source: CapitalOne, 2020
| On-premises containers | Public cloud-based containers |
|---|---|
|
Advantages:
Disadvantages:
|
Advantages:
Disadvantages:
|
Info-Tech Insight
Start-ups and small businesses that don't typically need to be closely connected to hardware can easily move (or start) to the cloud. Large (e.g. enterprise-class) companies and companies that need to manage and control local hardware resources are more likely to prefer an on-premises infrastructure. For enterprises, on-premises container deployments can serve as a bridge to full public cloud deployments or hybrid private/public deployments. The answer to the question of public cloud versus on premises depends on the specific needs of your business.
From container labeling that identifies workloads and ownership to effective reporting that meets the needs of different stakeholders across the organization, it is important that organizations establish an effective framework for container management.
Four key considerations for your container management strategy:
01 Container Image Supply Chain
How containers are built
02 Container Infrastructure and Orchestration
Where and how containers run together
03 Container Runtime Security and Policy Enforcement
How to make sure your containers only do what you want them to do
04 Container Observability
Runtime metrics and debugging
To effectively understand container management solutions, it is useful to define the various components that make up a container management strategy.
To run a workload as a container, it must first be packaged into a container image. The image supply chain includes all libraries or components that make up a containerized application. This includes CI/CD tools to test and package code into container images, application security testing tools to check for vulnerabilities and logic errors, registries and mirroring tools for hosting container images, and attribution mechanisms such as image signatures for validating images in registries.
Important functions of the supply chain include the ability to:
Source: Rancher, 2022
Info-Tech Insight
It is important to consider disaster recovery for your image registry. As mentioned above, it is wise to isolate yourself from registry disruptions. However, external registry mirroring is only one part of the equation. You also want to make sure you have a high availability plan for your internal registry as well as proper backup and recovery processes. A highly available, fault-tolerant container management platform is not just a runtime environment.
Orchestration tools
Once you have a container image to run, you need a location to run it. That means both the computer the container runs on and the software that schedules it to run. If you're working with a few containers, you can make manual decisions about where to run container images, what to run with container images, and how best to manage storage and network connectivity. However, at scale, these kinds of decisions should be left to orchestration tools like Kubernetes, Swarm, or Mesos. These platforms can receive workload execution requests, determine where to run based on resource requirements and constraints, and then actually launch that workload on its target. And if a workload fails or resources are low, it can be restarted or moved as needed.
Source: DevOpsCube, 2022
Storage
Storage is another important consideration. This includes both the storage used by the operating system and the storage used by the container itself. First, you need to consider the type of storage you actually need. Can I outsource my storage concerns to a cloud provider using something like Amazon Relational Database Service instead? If not, do you really need block storage (e.g. disk) or can an external object store like AWS S3 meet your needs? If your external object storage service can meet your performance and durability requirements as well as your governance and compliance needs, you're in luck. You may not have to worry about managing the container's persistent storage. Many external storage services can be provisioned on demand, support discrete snapshots, and some even allow dynamic scaling on demand.
Networking
Network connectivity inside and outside the containerized environment is also very important. For example, Kubernetes supports a variety of container networking interfaces (CNIs), each providing different functionality. Questions to consider here are whether you can set traffic control policies (and the OSI layer), how to handle encryption between workloads and between workloads and external entities, and how to manage traffic import for containerized workloads. The impact of these decisions also plays a role on performance.
Backups
Backups are still an important task in containerized environments, but the backup target is changing slightly. An immutable, read-only container file system can be recreated very easily from the original container image and does not need to be backed up. Backups or snapshots on permanent storage should still be considered. If you are using a cloud provider, you should also consider fault domain and geo-recovery scenarios depending on the provider's capabilities. For example, if you're using AWS, you can use S3 replication to ensure that EBS snapshots can be restored in another region in case of a full region outage.
Ensuring that containers run in a place that meets the resource requirements and constraints set for them is necessary, but not sufficient. It is equally important that your container management solution performs continuous validation and ensures that your workloads comply with all security and other policy requirements of your organization. Runtime security and policy enforcement tools include a function for detecting vulnerabilities in running containers, handling detected vulnerabilities, ensuring that workloads are not running with unnecessary or unintended privileges, and ensuring that only other workloads that need to be allowed can connect.
One of the great benefits of (well implemented) containerized software is reducing the attackable surface of the application. But it doesn't completely remove it. This means you need to think about how to observe running applications to minimize security risks. Scanning as part of the build pipeline is not enough. This is because an image without vulnerabilities at build time can become a vulnerable container because new flaws are discovered in its code or support libraries. Instead, some modern tools focus on detecting unusual behavior at the system call level. As these types of tools mature, they can make a real difference to your workload’s security because they rely on actual observed behavior rather than up-to-date signature files.
Finally, if your container images are being run somewhere by orchestration tools and well managed by security and policy enforcement tools, you need to know what your containers are doing and how well they are doing it. Orchestration tools will likely have their own logs and metrics, as will networking layers, and security and compliance checking tools; there is a lot to understand in a containerized environment. Container observability covers logging and metrics collection for both your workloads and the tools that run them.
One very important element of observability is the importance of externalizing logs and metrics in a containerized environment. Containers come and go, and in many cases the nodes running on them also come and go, so relying on local storage is not recommended.
A container management platform typically consists of a variety of tools from multiple sources. Some container management software vendors or container management services attempt to address all four key components of effective container management. However, many organizations already have tools that provide at least some of the features they need and don't want to waste existing licenses or make significant changes to their entire infrastructure just to run containers.
When choosing tools from multiple sources, it's important to understand what needs each tool meets and what it doesn't. This holistic approach is necessary to avoid gaps and duplication of effort.
For example, scanning an image as part of the build pipeline and then rescanning the image while the container is running is a waste of CPU cycles in the runtime environment. Similarly, using orchestration tools and separate host-based agents to aggregate logs or metrics can waste CPU cycles as well as storage and network resources.
| 1 | DIY, Managed Services, or Packaged Products Developer satisfaction is important, but it's also wise to consider the team running the container management software. Migrating from bare metal or virtual machine-based deployment methodologies to containers can involve a significant learning curve, so it's a good idea to choose a tool that will help smooth this curve. |
| 2 | Kubernetes In the world of container management, Kubernetes is fast becoming the de facto standard for container orchestration and scheduling. Most of the products that address the other aspects of container management discussed in this post (image supply chain, runtime security and policy enforcement, observability) integrate easily with Kubernetes. Kubernetes is open-source software and using it is possible if your team has the technical skills and the desire to implement it themselves. However, that doesn't mean you should automatically opt to build yourself. |
| 3 | Managed Kubernetes Kubernetes is difficult to implement well. As a result, many solution providers offer packaged products or managed services to facilitate Kubernetes adoption. All major cloud providers now offer Kubernetes services that reduce the operational burden on your teams. Organizations that have invested heavily in the ecosystem of a particular cloud provider may find this route suitable. Other organizations may be able to find a fully managed service that provides container images and lets the service provider worry about running the images which, depending on the cost and capacity of the organization, may be the best option. |
| 4 | Third-Party Orchestration Products A third approach is packaged products from providers that can be installed on the infrastructure (cloud or otherwise). These products can offer several potential advantages over DIY or cloud provider offerings, such as access to additional configuration options or cluster components, enhanced functionality, implementation assistance and training, post-installation product support, and reduced risk of cloud provider lock-in. |
Source: Kubernetes, 2022; Rancher, 2022
It's important to describe your organization’s current and future infrastructure strategy and how it fits into your container management strategy. It’s all basic for now, but if you plan to move to a virtual machine or cloud provider next year, your container management solution should be able to adapt to your environment now and in the future. Similarly, if you’ve already chosen a public cloud, you may want to make sure that the tool you choose supports some of the cloud options, but full compatibility may not be an important feature.
Infrastructure considerations extend beyond computing. Choosing a container management platform should be compatible with the existing network infrastructure and storage capacity available to your organization. If you have existing policy enforcement, monitoring, and alerting tools, the ideal solution should be able to take advantage of them. Moving to containers can be a game changer for developers and operations teams, so continuing to use existing tools to reduce complexity where possible can save time and money.

Using the examples as a guide, complete the tool to strategize your container management
Download the Reference Architecture
Mell, Emily. “What is container management and why is it important?” TechTarget, April 2021.
https://www.techtarget.com/searchitoperations/definition/container-management-software#:~:text=A%20container%20management%20ecosystem%20automates,operator%20to%20keep%20up%20with
Conrad, John. “What is Container Orchestration?” CapitalOne, 24 August 2020.
https://www.capitalone.com/tech/cloud/what-is-container-orchestration/?v=1673357442624
Kubernetes. “Cluster Networking.” Kubernetes, 2022.
https://kubernetes.io/docs/concepts/cluster-administration/networking/
Rancher. “Comparing Kubernetes CNI Providers: Flannel, Calico, Canal, and Weave.” Rancher, 2022.
https://www.suse.com/c/rancher_blog/comparing-kubernetes-cni-providers-flannel-calico-canal-and-weave/
Wilson, Bob. “16 Best Container Orchestration Tools and Services.” DevopsCube, 5 January 2022.
https://devopscube.com/docker-container-clustering-tools/
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Assess your current level of Cloud adoption and integration, focusing on solutions that are emerging in the market and the applicability to your IT environment.
Security presentations are not a one-way street. The key to a successful executive security presentation is having a goal for the presentation and ensuring that you have met your goal.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this as a guideline to assist you in presenting security to executive stakeholders.
The security presentation templates are a set of customizable templates for various types of security presentation including:
![]() |
As a security leader, you’re tasked with various responsibilities to ensure your organization can achieve its goals while its most important assets are being protected. However, when communicating security to executive stakeholders, challenges can arise in determining what topics are pertinent to present. Changes in the security threat landscape coupled with different business goals make identifying how to present security more challenging. Having a communication framework for presenting security to executive stakeholders will enable you to effectively identify, develop, and deliver your communication goals while obtaining the support you need to achieve your objectives. Ahmad Jowhar Info-Tech Research Group |
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|---|---|---|
|
|
|
Info-Tech Insight
Security presentations are not a one-way street. The key to a successful executive security presentation is having a goal for the presentation and verifying that you have met your goal.
76% of security leaders struggle in conveying the effectiveness of a cybersecurity program.
62% find it difficult to balance the risk of too much detail and need-to-know information.
41% find it challenging to communicate effectively with a mixed technical and non-technical audience.
9% of boards are extremely confident in their organization’s cybersecurity risk mitigation measures.
77% of organizations have seen an increase in the number of attacks in 2021.
56% of security leaders claimed their team is not involved when leadership makes urgent security decisions.
1. Identify communication goals |
2. Collect information to support goals |
3. Develop communication |
4. Deliver communication |
|
|---|---|---|---|---|
Phase steps |
|
|
|
|
Phase outcomes |
A defined list of drivers and goals to help you develop your security presentations |
A list of data sources to include in your communication |
A completed communication template |
A solidified understanding of how to effectively communicate security to your stakeholders |
Security presentations are not a one-way street
The key to a successful executive security presentation is having a goal for the presentation and verifying that you have met your goal.
Identifying your goals is the foundation of an effective presentation
Defining your drivers and goals for communicating security will enable you to better prepare and deliver your presentation, which will help you obtain your desired outcome.
Harness the power of data
Leveraging data and analytics will help you provide quantitative-based communication, which will result in a more meaningful and effective presentation.
Take your audience on a journey
Developing a storytelling approach will help engage with your audience.
Win your audience by building a rapport
Establishing credibility and trust with executive stakeholders will enable you to obtain their support for security objectives.
Tactical insight
Conduct background research on audience members (i.e. professional background) to help understand how best to communicate with them and overcome potential objections.
Tactical insight
Verifying your objectives at the end of the communication is important, as it ensures you have successfully communicated to executive stakeholders.
Report on Security Initiatives |
![]() |
Security Metrics |
![]() |
Security Incident Response & Recovery |
![]() |
Security Funding Request |
![]() |

Template showing how to inform executive stakeholders of proactive security and risk initiatives.
IT/InfoSec benefits |
Business benefits |
|---|---|
|
|
Phase |
Measured Value (Yearly) |
|---|---|
Phase 1: Identify communication goals |
Cost to define drivers and goals for communicating security to executives: 16 FTE hours @ $233K* =$1,940 |
Phase 2: Collect information to support goals |
Cost to collect and synthesize necessary data to support communication goals: 16 FTE hours @ $233K = $1,940 |
Phase 3: Develop communication |
Cost to develop communication material that will contextualize information being shown: 16 FTE hours @ $233K = $1,940 |
Phase 4: Deliver communication |
|
Potential Savings: |
Total estimated effort = $5,820 Our blueprint will help you save $5,820 and over 40 FTE hours |
* The financial figure depicts the annual salary of a CISO in 2022
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Identify drivers for communicating to executives 1.2 Define your goals for communicating to executives |
2.1 Identify data to collect 2.2 Plan how to retrieve data |
3.1 Plan communication 3.2 Build a compelling communication document |
4.1 Deliver a captivating presentation 4.2 Obtain/verify support for security goals |
This phase will walk you through the following activities:
This phase involves the following participants:
As a security leader, you meet with executives and stakeholders with diverse backgrounds, and you aim to showcase your organization’s security posture along with its alignment with the business’ goals.
However, with the constant changes in the security threat landscape, demands and drivers for security could change. Thus, understanding potential drivers that will influence your communication will assist you in developing and delivering an effective security presentation.
39% of organizations had cybersecurity on the agenda of their board’s quarterly meeting.
Info-Tech Insight
Not all security presentations are the same. Keep your communication strategy and processes agile.
By understanding the influences for your security presentations, you will be able to better plan what to present to executive stakeholders.
Understanding drivers will also help you understand how to present security to executive stakeholders.
Identify your communication drivers, which can stem from various initiatives and programs, including:
When it comes to identifying your communication drivers, you can collaborate with subject matter experts, like your corporate secretary or steering committees, to ensure the material being communicated will align with some of the organizational goals.
Audit
Upcoming internal or external audits might require updates on the organization’s compliance
Organizational restructuring
Restructuring within an organization could require security updates
Merger & Acquisition
An M&A would trigger presentations on organization’s current and future security posture
Cyber incident
A cyberattack would require an immediate presentation on its impact and the incident response plan
Ad hoc
Provide security information requested by stakeholders
After identifying drivers for your communication, it’s important to determine what your goals are for the presentation.
Identifying your communication goals could require the participation of the security team, IT leadership, and other business stakeholders.
Info-Tech Insight
There can be different reasons to communicate security to executive stakeholders. You need to understand what you want to get out of your presentation.
Educate
Educate the board on security trends and/or latest risks in the industry
Update
Provide updates on security initiatives, relevant security metrics, and compliance posture
Inform
Provide an incident response plan due to a security incident or deliver updates on current threats and risks
Investment
Request funding for security investments or financial updates on past security initiatives
Ad hoc
Provide security information requested by stakeholders
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Identify drivers for communicating to executives 1.2 Define your goals for communicating to executives | 2.1 Identify data to collect 2.2 Plan how to retrieve data | 3.1 Plan communication 3.2 Build a compelling communication document | 4.1 Deliver a captivating presentation 4.2 Obtain/verify support for security goals |
This phase will walk you through the following activities:
This phase involves the following participants:
After identifying drivers and goals for your communication, it’s important to include the necessary data to justify the information being communicated.
Identifying data to collect doesn’t need to be a rigorous task; you can follow these steps to help you get started:
Info-Tech Insight
Understand how to present your information in a way that will be meaningful to your audience, for instance by quantifying security risks in financial terms.
Educate
Number of organizations in industry impacted by data breaches during past year; top threats and risks affecting the industries
Update
Degree of compliance with standards (e.g. ISO-27001); metrics on improvement of security posture due to security initiatives
Inform
Percentage of impacted clients and disrupted business functions; downtime; security risk likelihood and financial impact
Investment
Capital and operating expenditure for investment; ROI on past and future security initiatives
Ad hoc
Number of security initiatives that went over budget; phishing test campaign results
Once the data that is going to be used for the presentation has been identified, it is important to plan how the data can be retrieved, processed, and shared.
Once the data source and owner has been identified, you need to plan how the data would be processed and leveraged for your presentation
Info-Tech Insight
Using a data-driven approach to help support your objectives is key to engaging with your audience.
Identifying the relevant data sources to retrieve your data and the appropriate data owner enables efficient collaboration between departments collecting, processing, and communicating the data and graphics to the audience.
Examples of where to retrieve your data
Data Source |
Data |
Data Owner |
Communication Goal |
|---|---|---|---|
Audit & Compliance Reports |
Percentage of controls completed to be certified with ISO 27001; Number of security threats & risks identified. |
Audit Manager; Compliance Manager; Security Leader |
Ad hoc, Educate, Inform |
Identity & Access Management (IAM) Applications |
Number of privileged accounts/department; Percentage of user accounts with MFA applied |
Network/Security Analyst |
Ad hoc, Inform, Update |
Security Information & Event Management (SIEM) |
Number of attacks detected and blocked before & after implementing endpoint security; Percentage of firewall rules that triggered a false positive |
Network/Security Analyst |
Ad hoc, Inform, Update |
Vulnerability Management Applications |
Percentage of critical vulnerabilities patched; Number of endpoints encrypted |
Network/Security Analyst |
Ad hoc, Inform, Update |
Financial & Accounting Software |
Capital & operating expenditure for future security investments; Return on investment (ROI) on past and current security investments |
Financial and/or Accounting Manager |
Ad hoc, Educate, Investments |
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Identify drivers for communicating to executives 1.2 Define your goals for communicating to executives | 2.1 Identify data to collect 2.2 Plan how to retrieve data | 3.1 Plan communication 3.2 Build a compelling communication document | 4.1 Deliver a captivating presentation 4.2 Obtain/verify support for security goals |
This phase will walk you through the following activities:
This phase involves the following participants:
Examples of two profiles in a boardroom
Formal board of directors |
The executive team |
|---|---|
|
|
A board’s purpose can include the following:
Examples of potential values and risks
Info-Tech Insight
Conduct background research on audience members (e.g. professional background on LinkedIn) to help understand how best to communicate to them and overcome potential objections.
Examples of potential concerns for each profile of executive stakeholders
Formal board of directors | The executive team |
|---|---|
|
|
Your presentation should be well-rounded and compelling when it addresses the board’s main concerns about security.
Checklist:
Info-Tech Insight
The executive stakeholder’s main concerns will always boil down to one important outcome: providing a level of confidence to do business through IT products, services, and systems – including security.
Info-Tech Insight
Developing a storytelling approach will help keep your audience engaged and allow the information to resonate with them, which will add further value to the communication.
You should be clear about your bottom line and the intent behind your presentation. However, regardless of your bottom line, your presentation must focus on what business problems you are solving and why security can assist in solving the problem.
Examples of communication goals
To inform or educate |
To reach a decision |
|---|---|
|
|
Info-Tech Insight
Nobody likes surprises. Communicate early and often. The board should be pre-briefed, especially if it is a difficult subject. This also ensures you have support when you deliver a difficult message.
Once you understand your target audience, it’s important to tailor your presentation material to what they will care about.
Typical IT boardroom presentations include:
Info-Tech Insight
You must always have a clear goal or objective for delivering a presentation in front of your board of directors. What is the purpose of your board presentation? Identify your objective and outcome up front and tailor your presentation’s story and contents to fit this purpose.
Info-Tech Insight
Telling a good story is not about the message you want to deliver but the one the executive stakeholders want to hear. Articulate what you want them to think and what you want them to take away, and be explicit about it in your presentation. Make your story logically flow by identifying the business problem, complication, the solution, and how to close the gap. Most importantly, communicate the business impacts the board will care about.
To build a strong story for your presentation, ensure you answer these three questions:
WHY |
Why is this a business issue, or why should the executive stakeholders care? |
|---|---|
WHAT |
What is the impact of solving the problem and driving value for the company? |
HOW |
How will we leverage our resources (technology, finances) to solve the problem? |
Scenario 1: The company has experienced a security incident.
Intent: To inform/educate the board about the security incident.
WHY | The data breach has resulted in a loss of customer confidence, negative brand impact, and a reduction in revenue of 30%. |
|---|---|
WHAT | Financial, legal, and reputational risks identified, and mitigation strategies implemented. IT is working with the PR team on communications. Incident management playbook executed. |
HOW | An analysis of vulnerabilities was conducted and steps to address are in effect. Recovery steps are 90% completed. Incident management program reviewed for future incidents. |
Scenario 2: Security is recommending investments based on strategic priorities.
Intent: To reach a decision with the board – approve investment proposal.
WHY | The new security strategy outlines two key initiatives to improve an organization’s security culture and overall risk posture. |
|---|---|
WHAT | Security proposed an investment to implement a security training & phishing test campaign, which will assist in reducing data breach risks. |
HOW | Use 5% of security’s budget to implement security training and phishing test campaigns. |
What you include in your story will often depend on how much time you have available to deliver the message.
Consider the following:
Use the Q&A portion to build credibility with the board.
Info-Tech Insight
The average board presentation is 15 minutes long. Build no more than three or four slides of content to identify the business problem, the business impacts, and the solution. Leave five minutes for questions at the end, and be prepared with back-up slides to support your answers.
Checklist:
Once you’ve identified your communication goals, data, and plan to present to your stakeholders, it’s important to build the compelling communication document that will attract all audiences.
A good slide design increases the likelihood that the audience will read the content carefully.
Leverage these slide design best practices to assist you in developing eye-catching presentations.
Horizontal logic |
Vertical logic |
|---|---|
|
|
![]() |
![]() |
The audience is unsure where to look and in what order. |
The audience knows to read the heading first. Then look within the pie chart. Then look within the white boxes to the right. |
Horizontal logic | Vertical logic |
|---|---|
|
|
![]() |
![]() |
|
Increase skim-ability:
Make it easier on the eyes:
|
Passive voice |
Active voice |
|---|---|
“There are three things to look out for” (8 words) “Network security was compromised by hackers” (6 words) |
“Look for these three things” (5 words) “Hackers compromised network security” (4 words) |
![]() |
![]() |
Easy to read, but hard to remember the stats. |
The visuals make it easier to see the size of the problem and make it much more memorable. Remember to:
|
![]() |
![]() |
This draft slide is just content from the outline document on a slide with no design applied yet. |
|
Cognitively
Emotionally
Visual clues
Persuasion
Often stakeholders prefer to receive content in a specific format. Make sure you know what you require so that you are not scrambling at the last minute.
Leverage this checklist to ensure you are creating the perfect visuals and graphs for your presentation.
Checklist:
Once you have identified your communication goals and plans for building your communication document, you can start building your presentation deck. These presentation templates highlight different security topics depending on your communication drivers, goals, and available data. Info-Tech has created five security templates to assist you in building a compelling presentation. These templates provide support for presentations on the following five topics:
Each template provides instructions on how to use it and tips on ensuring the right information is being presented. All the templates are customizable, which enables you to leverage the sections you need while also editing any sections to your liking. |
![]() |
Download the Security Presentation Templates
It’s important to know that not all security presentations for an organization are alike. However, these templates would provide a guideline on what the best practices are when communicating security to executive stakeholders.
Below is an example of instructions to complete the “Security Risk & Update” template. Please note that the security template will have instructions to complete each of its sections.
![]() |
![]() |
The first slide following the title slide includes a brief executive summary on what would be discussed in the presentation. This includes the main security threats that would be addressed and the associated risk mitigation strategies. |
This slide depicts a holistic overview of the organization’s security posture in different areas along with the main business goals that security is aligning with. Ensure visualizations you include align with the goals highlighted. |
![]() |
![]() |
This slide displays any top threats and risks an organization is facing. Each threat consists of 2-3 risks and is prioritized based on the negative impact it could have on the organization (i.e. red bar = high priority; green bar = low priority). Include risks that have been addressed in the past quarter, and showcase any prioritization changes to those risks. |
This slide follows the “Top Threats & Risks” slide and focuses on the risks that had medium or high priority. You will need to work with subject matter experts to identify risk figures (likelihood, financial impact) that will enable you to quantify the risks (Likelihood x Financial Impact). Develop a threshold for each of the three columns to identify which risks require further prioritization, and apply color coding to group the risks. |
![]() |
![]() |
This slide showcases further details on the top risks along with their business impact. Be sure to include recommendations for the risks and indicate whether further action is required from the executive stakeholders. |
The last slide of the “Security Risk & Update” template presents a timeline of when the different initiatives to mitigate security risks would begin. It depicts what initiatives will be completed within each fiscal year and the total number of months required. As there could be many factors to a project’s timeline, ensure you communicate to your executive stakeholders any changes to the project. |
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
1.1 Identify drivers for communicating to executives 1.2 Define your goals for communicating to executives | 2.1 Identify data to collect 2.2 Plan how to retrieve data | 3.1 Plan communication 3.2 Build a compelling communication document | 4.1 Deliver a captivating presentation 4.2 Obtain/verify support for security goals |
This phase will walk you through the following activities:
This phase involves the following participants:
You’ve gathered all your data, you understand what your audience is expecting, and you are clear on the outcomes you require. Now, it’s time to deliver a presentation that both engages and builds confidence.
Follow these tips to assist you in developing an engaging presentation:
Info-Tech Insight
Establishing credibility and trust with executive stakeholders is important to obtaining their support for security objectives.
Know your environment |
Be professional but not boring |
Connect with your audience |
|---|---|---|
|
|
|
Optimize the timing of your presentation:
Script your presentation:
Other considerations:
Leverage this checklist to ensure you are prepared to develop and deliver an engaging presentation.
Checklist:
Once you’ve delivered your captivating presentation, it’s imperative to communicate with your executive stakeholders.
Info-Tech Insight
Verifying your objectives at the end of the presentation is important, as it ensures you have successfully communicated to executive stakeholders.
Follow this checklist to assist you in obtaining and verifying your communication goals.
Checklist:
Problem Solved
A better understanding of security communication drivers and goals
A developed a plan for how and where to retrieve data for communication
A solidified communication plan with security templates to assist in better presenting to your audience
A defined guideline on how to deliver a captivating presentation to achieve your desired objectives
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.
Contact your account representative for more information.
1-888-670-8889
Build an Information Security Strategy
This blueprint will walk you through the steps of tailoring best practices to effectively manage information security.
Build a Security Metrics Program to Drive Maturity
This blueprint will assist you in identifying security metrics that can tie to your organizational goals and build those metrics to achieve your desired maturity level.
Bhadauriya, Amit S. “Communicating Cybersecurity Effectively to the Board.” Metricstream. Web.
Booth, Steven, et al. “The Biggest Mistakes Made When Presenting Cyber Security to Senior Leadership or the Board, and How to Fix Them.” Mandiant, May 2019. Web.
Bradford, Nate. “6 Slides Every CISO Should Use in Their Board Presentation.” Security Boulevard, 9 July 2020. Web.
Buckalew, Lauren, et al. “Get the Board on Board: Leading Cybersecurity from the Top Down.” Newsroom, 2 Dec. 2019. Web.
Burg, Dave, et al. “Cybersecurity: How Do You Rise above the Waves of a Perfect Storm?” EY US - Home, EY, 22 July 2021. Web.
Carnegie Endowment for International Peace. Web.
“Chief Information Security Officer Salary.” Salary.com, 2022. Web.
“CISO's Guide to Reporting to the Board - Apex Assembly.” CISO's Guide To Reporting to the Board. Web.
“Cyber Security Oversight in the Boardroom” KPMG, Jan. 2016. Web.
“Cybersecurity CEO: My 3 Tips for Presenting in the Boardroom.” Cybercrime Magazine, 31 Mar. 2020. Web.
Dacri , Bryana. Do's & Don'ts for Security Professionals Presenting to Executives. Feb. 2018. Web.
Froehlich, Andrew. “7 Cybersecurity Metrics for the Board and How to Present Them: TechTarget.” Security, TechTarget, 19 Aug. 2022. Web.
“Global Board Risk Survey.” EY. Web.
“Guidance for CISOs Presenting to the C-Suite.” IANS, June 2021. Web.
“How to Communicate Cybersecurity to the Board of Directors.” Cybersecurity Conferences & News, Seguro Group, 12 Mar. 2020. Web.
Ide, R. William, and Amanda Leech. “A Cybersecurity Guide for Directors” Dentons. Web.
Lindberg, Randy. “3 Tips for Communicating Cybersecurity to the Board.” Cybersecurity Software, Rivial Data Security, 8 Mar. 2022. Web.
McLeod, Scott, et al. “How to Present Cybersecurity to Your Board of Directors.” Cybersecurity & Compliance Simplified, Apptega Inc, 9 Aug. 2021. Web.
Mickle, Jirah. “A Recipe for Success: CISOs Share Top Tips for Successful Board Presentations.” Tenable®, 28 Nov. 2022. Web.
Middlesworth, Jeff. “Top-down: Mitigating Cybersecurity Risks Starts with the Board.” Spiceworks, 13 Sept. 2022. Web.
Mishra, Ruchika. “4 Things Every CISO Must Include in Their Board Presentation.” Security Boulevard, 17 Nov. 2020. Web.
O’Donnell-Welch, Lindsey. “CISOs, Board Members and the Search for Cybersecurity Common Ground.” Decipher, 20 Oct. 2022. Web.
“Overseeing Cyber Risk: The Board's Role.” PwC, Jan. 2022. Web.
Pearlson, Keri, and Nelson Novaes Neto. “7 Pressing Cybersecurity Questions Boards Need to Ask.” Harvard Business Review, 7 Mar. 2022. Web.
“Reporting Cybersecurity Risk to the Board of Directors.” Web.
“Reporting Cybersecurity to Your Board - Steps to Prepare.” Pondurance ,12 July 2022. Web.
Staynings, Richard. “Presenting Cybersecurity to the Board.” Resource Library. Web.
“The Future of Cyber Survey.” Deloitte, 29 Aug. 2022. Web.
“Top Cybersecurity Metrics to Share with Your Board.” Packetlabs, 10 May 2022. Web.
Unni, Ajay. “Reporting Cyber Security to the Board? How to Get It Right.” Cybersecurity Services Company in Australia & NZ, 10 Nov. 2022. Web.
Vogel, Douglas, et al. “Persuasion and the Role of Visual Presentation Support.” Management Information Systems Research Center, 1986.
“Welcome to the Cyber Security Toolkit for Boards.” NCSC. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This tool will help you identify where your Agile teams are experiencing the most pain so you can create your Agile challenges hit list.
While each organization/team will struggle with its own individual challenges, many members find they face similar organizational/systemic challenges when adopting Agile. Review these typical challenges and learn from what other members have discovered.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine whether an Agile playbook is right for you.
Broadly survey your teams to identify Agile challenges and success factors in your organization.
Better understanding of common Agile challenges and success factors
Identification of common Agile challenges and success factors are prevalent in your organization
1.1 Distribute survey and gather results.
1.2 Consolidate survey results.
Completed survey responses from across teams/organization
Consolidated heat map of your Agile challenges and success factors
Examine consolidated survey results.
Identify your most pressing challenges.
Create a hit list of challenges to be resolved.
Identification of the most serious challenges to your Agile transformation
Attention focused on those challenge areas that are most impacting your Agile teams
2.1 Analyze and discuss your consolidated heat map.
2.2 Prioritize identified challenges.
2.3 Select your hit list of challenges to address.
Your Agile challenges hit list
Address each challenge in your hit list to eliminate or improve it.
Better Agile team performance and effectiveness
3.1 Work with Agile mentor to problem solve each challenge in your hit list.
3.2 Apply these to your project in real time.
Capture the findings and lessons learned while problem solving your hit list.
Strategies and tactics for being successful with Agile in your organization which can be applied to future projects
4.1 For each hit list item, capture the findings and lessons learned in Module 3.
4.2 Document these in your Agile Playbook.
Your Agile Playbook deliverable
"The cyber threat landscape today is highly complex and rapidly changing. Cyber security incidents can have several impacts on organizations and society, both on a physical and non-physical level. Through the use of a computer, criminals can indeed cause IT outages, supply chain disruptions and other physical security incidents"
-- excerpt from the foreword of the BCI Cyber resilience report 2018 by David Thorp, Executive Director, BCI
There are a number of things you can do to protect yourself. And they range, as usual, from the fairly simple to the more elaborate and esoteric. Most companies can, with some common sense, if not close the door on most of these issues, at least prepare themselves to limit the consequences.
The challenges posed by the virus are compounded by the fact that consumer expectations for strong service delivery remain high:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create a consolidated, updated view of your current customer experience management strategy and identify which elements can be capitalized on to dampen the impact of COVID-19 and which elements are vulnerabilities that the pandemic may threaten to exacerbate.
Create a roadmap of business and technology initiatives through the lens of customer experience management that can be used to help your organization protect its revenue, maintain customer engagement, and enhance its brand integrity.
Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Build your IT steering committee charter using results from the stakeholder survey.
Define your high level steering committee processes using SIPOC, and select your steering committee metrics.
Customize Info-Tech’s stakeholder presentation template to gain buy-in from your key IT steering committee stakeholders.
Build the new project intake and prioritization process for your new IT steering committee.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Lay the foundation for your IT steering committee (ITSC) by surveying your stakeholders and identifying the opportunities and threats to implementing your ITSC.
An understanding of the business environment affecting your future ITSC and identification of strategies for engaging with stakeholders
1.1 Launch stakeholder survey for business leaders.
1.2 Analyze results with an Info-Tech advisor.
1.3 Identify opportunities and threats to successful IT steering committee implementation.
1.4 Develop the fit-for-purpose approach.
Report on business leader governance priorities and awareness
Refined workshop agenda
Define the goals and roles of your IT steering committee.
Plan the responsibilities of your future committee members.
Groundwork for completing the steering committee charter
2.1 Review the role of the IT steering committee.
2.2 Identify IT steering committee goals and objectives.
2.3 Conduct a SWOT analysis on the five governance areas
2.4 Define the key responsibilities of the ITSC.
2.5 Define ITSC participation.
IT steering committee key responsibilities and participants identified
IT steering committee priorities identified
Document the information required to create an effective ITSC Charter.
Create the procedures required for your IT steering committee.
Clearly defined roles and responsibilities for your steering committee
Completed IT Steering Committee Charter document
3.1 Build IT steering committee participant RACI.
3.2 Define your responsibility cadence and agendas.
3.3 Develop IT steering committee procedures.
3.4 Define your IT steering committee purpose statement and goals.
IT steering committee charter: procedures, agenda, and RACI
Defined purpose statement and goals
Define and test your IT steering committee processes.
Get buy-in from your key stakeholders through your stakeholder presentation.
Stakeholder understanding of the purpose and procedures of IT steering committee membership
4.1 Define your high-level IT steering committee processes.
4.2 Conduct scenario testing on key processes, establish ITSC metrics.
4.3 Build your ITSC stakeholder presentation.
4.4 Manage potential objections.
IT steering committee SIPOC maps
Refined stakeholder presentation
5.1 Create prioritization criteria
5.2 Customize the project prioritization tool
5.3 Pilot test the tool
5.4 Define action plan and next steps
IT Steering Committee Project Prioritization Tool
Action plan
Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee. These include:
Effective IT governance critical in driving business satisfaction with IT. Yet 88% of CIOs believe that their governance structure and processes are not effective. The IT steering committee (ITSC) is the heart of the governance body and brings together critical organizational stakeholders to enable effective decision making (Info-Tech Research Group Webinar Survey).
"Everyone needs good IT, but no one wants to talk about it. Most CFOs would rather spend time with their in-laws than in an IT steering-committee meeting. But companies with good governance consistently outperform companies with bad. Which group do you want to be in?"
– Martha Heller, President, Heller Search Associates
67% of CIOs/CEOs are misaligned on the target role for IT.
47% of CEOs believe that business goals are going unsupported by IT.
64% of CEOs believe that improvement is required around IT’s understanding of business goals.
28% of business leaders are supporters of their IT departments.
A well devised IT steering committee ensures that core business partners are involved in critical decision making and that decisions are based on business goals – not who shouts the loudest. Leading to faster decision-making time, and better-quality decisions and outcomes.
Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.
The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.
Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.
These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.
IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.
| Strategic | IT Steering Committee | |
| Tactical | Project Governance Service Governance Risk Governance Information Governance |
IT Management |
| Operational | Risk Task Force |
This blueprint focuses exclusively on building the IT steering committee. For more information on IT governance see Info-Tech’s blueprint Tailor an IT Governance Plan to Fit Organizational Needs.
| As CIO I find that there is a lack of alignment between business and IT strategies. |
| I’ve noticed that projects are thrown over the fence by stakeholders and IT is expected to comply. |
| I’ve noticed that IT projects are not meeting target project metrics. |
| I’ve struggled with a lack of accountability for decision making, especially by the business. |
| I’ve noticed that the business does not understand the full cost of initiatives and projects. |
| I don’t have the authority to say “no” when business requests come our way. |
| We lack a standardized approach for prioritizing projects. |
| IT has a bad reputation within the organization, and I need a way to improve relationships. |
| Business partners are unaware of how decisions are made around IT risks. |
| Business partners don’t understand the full scope of IT responsibilities. |
| There are no SLAs in place and no way to measure stakeholder satisfaction with IT. |
Info-Tech’s IT steering committee development blueprint will provide you with the required tools, templates, and deliverables to implement a right-sized committee that’s effective the first time.
| 1 | 2 | 3 | 4 |
| Build the Steering Committee Charter | Define ITSC Processes | Build the Stakeholder Presentation | Define the Prioritization Criteria |
|
|
|
|
| COBIT METRICS | Alignment
|
Accountability
|
Value Generation
|
| INFO-TECH METRICS | Survey Metrics:
|
Industry: Consumer Goods
Source: Interview
A newly hired CIO at a large consumer goods company inherited an IT department with low maturity from her predecessor. Satisfaction with IT was very low across all business units, and IT faced a lot of capacity constraints. The business saw IT as a bottleneck or red tape in terms of getting their projects approved and completed.
The previous CIO had established a steering committee for a short time, but it had a poorly established charter that did not involve all of the business units. Also the role and responsibilities of the steering committee were not clearly defined. This led the committee to be bogged down in politics.
Due to the previous issues, the business was wary of being involved in a new steering committee. In order to establish a new steering committee, the new CIO needed to navigate the bad reputation of the previous CIO.
The CIO established a new steering committee engaging senior members of each business unit. The roles of the committee members were clearly established in the new steering committee charter and business stakeholders were informed of the changes through presentations.
The importance of the committee was demonstrated through the new intake and prioritization process for projects. Business stakeholders were impressed with the new process and its transparency and IT was no longer seen as a bottleneck.
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| Build the Steering Committee Charter | Define ITSC Processes | Build the Stakeholder Presentation | Define the Prioritization Criteria | |
|---|---|---|---|---|
| Best-Practice Toolkit | 1.1 Survey Your Steering Committee Stakeholders 1.2 Build Your ITSC Charter |
2.1 Build a SIPOC 2.2 Define Your ITSC Process |
3.1 Customize the Stakeholder Presentation | 4.1 Establish your Prioritization Criteria 4.2 Customize the Project Prioritization Tool 4.3 Pilot Test Your New Prioritization Criteria |
| Guided Implementations |
|
|
|
|
| Onsite Workshop | Module 1: Build a New ITSC Charter |
Module 2: Design Steering Committee Processes |
Module 3: Present the New Steering Committee to Stakeholders |
Module 4: Establish Project Prioritization Criteria |
Phase 1 Results:
|
Phase 2 Results:
|
Phase 3 Results:
|
Phase 4 Results:
|
Contact your account representative or email Workshops@InfoTech.com for more information.
| Workshop Day 1 | Workshop Day 2 | Workshop Day 3 | Workshop Day 4 | Workshop Day 5 | |
|---|---|---|---|---|---|
| Activities | Build the IT Steering Committee 1.1 Launch stakeholder survey for business leaders 1.2 Analyze results with an Info-Tech Advisor 1.3 Identify opportunities and threats to successful IT steering committee implementation. 1.4 Develop the fit-for-purpose approach |
Define the ITSC Goals 2.1 Review the role of the IT steering committee 2.2 Identify IT steering committee goals and objectives 2.3 Conduct a SWOT analysis on the five governance areas 2.4 Define the key responsibilities of the ITSC 2.5 Define ITSC participation |
Define the ITSC Charter 3.1 Build IT steering committee participant RACI 3.2 Define your responsibility cadence and agendas 3.3 Develop IT steering committee procedures 3.4 Define your IT steering committee purpose statement and goals |
Define the ITSC Process 4.1 Define your high-level IT steering committee processes 4.2 Conduct scenario testing on key processes, establish ITSC metrics 4.3 Build your ITSC stakeholder presentation 4.4 Manage potential objections |
Define Project Prioritization Criteria 5.1 Create prioritization criteria 5.2 Customize the Project Prioritization Tool 5.3 Pilot test the tool 5.4 Define action plan and next steps |
| Deliverables |
|
|
|
|
|
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
|
Guided Implementation 1: Formalize the Security Policy Program Proposed Time to Completion: 1-2 weeks |
|---|
Select Your ITSC Members Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates:
|
Review Stakeholder Survey Results Review findings with analyst:
Then complete these activities…
With these tools & templates:
|
Finalize the ITSC Charter Finalize phase deliverable:
Then complete these activities…
With these tools & templates:
|
Be exclusive with your IT steering committee membership. Determine committee participation based on committee responsibilities. Select only those who are key decision makers for the activities the committee is responsible for and, wherever possible, keep membership to 5-8 people.
A charter is the organizational mandate that outlines the purpose, scope, and authority of the ITSC. Without a charter, the steering committee’s value, scope, and success criteria are unclear to participants, resulting in unrealistic stakeholder expectations and poor organizational acceptance.
Start by reviewing Info-Tech’s template. Throughout this section we will help you to tailor its contents.
Committee Purpose: The rationale, benefits of, and overall function of the committee.
Responsibilities: What tasks/decisions the accountable committee is making.
Participation: Who is on the committee
RACI: Who is accountable, responsible, consulted, and informed regarding each responsibility.
Committee Procedures and Agendas: Includes how the committee will be organized and how the committee will interact and communicate with business units.
IT Steering Committee Charter Template.">
Leverage Info-Tech’s IT Steering Committee Stakeholder Surveyand reports to quickly identify business priorities and level of understanding of how decisions are made around the five governance areas.
Use these insights to drive the IT steering committee responsibilities, participation, and communication strategy.
The Stakeholder Survey consists of 17 questions on:
To simplify your data collection and reporting, Info-Tech can launch a web-based survey, compile the report data and assist in the data interpretation through one of our guided implementations.
Also included is a Word document with recommended questions, if you prefer to manage the survey logistics internally.
IT Steering Committee Stakeholder Survey ">
understand how decisions around IT services are made (quality, availability, etc.). Two graphs are included in the screenshot. One of the bar graphs shows the satisfaction with the quality of decisions and transparency around IT services. The other bar graph displays IT decisions around service delivery and quality that involve the right people.">
You get:
So you can:
not understand how decisions around IT investments or project and service resourcing are made. Two bar graphs are displayed. One of the bar graphs shows the satisfaction with the quality of decisions made around IT investments. The other graph display IT decisions around spending priorities involving the right people.">
You get:
So you can:
INPUT
OUTPUT
Materials
Participants
Governance of risk establishes the risk framework, establishes policies and standards, and monitors risks.
Governance of risk ensures that IT is mitigating all relevant risks associated with IT investments, projects, and services.
Governance of the IT portfolio achieves optimum ROI through prioritization, funding, and resourcing.
PPM practices create value if they maximize the throughput of high-value IT projects at the lowest possible cost. They destroy value when they foster needlessly sophisticated and costly processes.
Governance of projects improves the quality and speed of decision making for project issues.
Don’t confuse project governance and management. Governance makes the decisions regarding allocation of funding and resources and reviews the overall project portfolio metrics and process methodology.
Management ensures the project deliverables are completed within the constraints of time, budget, scope, and quality.
Governance of services ensures delivery of a highly reliable set of IT services.
Effective governance of services enables the business to achieve the organization’s goals and strategies through the provision of reliable and cost-effective services.
Governance of information ensures the proper handling of data and information.
Effective governance of information ensures the appropriate classification, retention, confidentiality, integrity, and availability of data in line with the needs of the business.
Note: The bolded responsibilities are the ones that are most common to IT steering committees, and greyed out responsibilities are typical of a larger governance structure. Depending on their level of importance to your organization, you may choose to include the responsibility.
INPUT
OUTPUT
Materials
Participants
The bolded responsibilities are those that are most common to IT steering committees, and responsibilities listed in grey are typical of a larger governance structure.
MUNICIPALITY
EDUCATION
HEALTHCARE
PRIVATE ORGANIZATIONS
INPUT
OUTPUT
Materials
Participants
It is not enough to participate in committee meetings; there needs to be a clear understanding of who is accountable, responsible, consulted, and informed about matters brought to the attention of the committee.
Each committee responsibility should have one person who is accountable, and at least one person who is responsible. This is the best way to ensure that committee work gets done.
An authority matrix is often used within organizations to indicate roles and responsibilities in relation to processes and activities. Using the RACI model as an example, there is only one person accountable for an activity, although several people may be responsible for executing parts of the activity. In this model, accountable means end-to-end accountability for the process.
RESPONSIBLE: The one responsible for getting the job done.
ACCOUNTABLE: Only one person can be accountable for each task.
CONSULTED: Involvement through input of knowledge and information.
INFORMED: Receiving information about process execution and quality.
INPUT
OUTPUT
Materials
Participants
49% of people consider unfocused meetings as the biggest workplace time waster.*
63% of the time meetings do not have prepared agendas.*
80% Reduction of time spent in meetings by following a detailed agenda and starting on time.*
*(Source: http://visual.ly/fail-plan-plan-fail).
A consent agenda is a tool to free up time at meetings by combining previously discussed or simple items into a single item. Items that can be added to the consent agenda are those that are routine, noncontroversial, or provided for information’s sake only. It is expected that participants read this information and, if it is not pulled out, that they are in agreement with the details.
Members have the option to pull items out of the consent agenda for discussion if they have questions. Otherwise these are given no time on the agenda.
Agendas
Procedures:
INPUT
OUTPUT
Materials
Participants
INPUT
OUTPUT
Materials
Participants
Industry: Consumer Goods
Source: Interview
The new CIO at a large consumer goods company had difficulty generating interest in creating a new IT steering committee. The previous CIO had created a steering committee that was poorly organized and did not involve all of the pertinent members. This led to a committee focused on politics that would often devolve into gossip. Also, many members were dissatisfied with the irregular meetings that would often go over their allotted time.
In order to create a new committee, the new CIO needed to dispel the misgivings of the business leadership.
The new CIO decided to build the new steering committee from the ground up in a systematic way.
She collected information from relevant stakeholders about what they know/how they feel about IT and used this information to build a detailed charter.
Using this info she outlined the new steering committee charter and included in it the:
The new steering committee included all the key members of business units, and each member was clear on their roles in the meetings. Meetings were streamlined and effective. The adjustments in the charter and the improvement in meeting quality played a role in improving the satisfaction scores of business leaders with IT by 21%.
1.1
Survey your ITSC stakeholders
Prior to the workshop, Info-Tech’s advisors will work with you to launch the IT Steering Committee Stakeholder Survey to understand business priorities and level of understanding of how decisions are made. Using this data, we will create the IT steering committee responsibilities, participation, and communication strategy.
1.7
Define a participant RACI for each of the responsibilities
The analyst will facilitate several exercises to help you and your stakeholders create an authority matrix. The output will be defined responsibilities and authorities for members.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Guided Implementation 2: Define your ITSC Processes Proposed Time to Completion: 2 weeks |
|---|
Review SIPOCs and Process Creation Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates: Phase 2 of the Establish an Effective IT Steering Committee blueprint | Finalize the SIPOC Review Draft SIPOC:
Then complete these activities…
With these tools & templates: Phase 2 of the Establish an Effective IT Steering Committee blueprint | Finalize Metrics Finalize phase deliverable:
Then complete these activities…
With these tools & templates: Phase 2 of the Establish an Effective IT Steering Committee blueprint |
Building high-level IT steering committee processes brings your committee to life. Having a clear process will ensure that you have the right information from the right sources so that committees can operate and deliver the appropriate output to the customers who need it.
The IT steering committee is only valuable if members are able to successfully execute on responsibilities.
One of the most common mistakes organizations make is that they build their committee charters and launch into their first meeting. Without defined inputs and outputs, a committee does not have the needed information to be able to effectively execute on responsibilities and is unable to meet its stated goals.
The arrows in this picture represent the flow of information between the IT steering committee, other committees, and IT management.
Building high-level processes will define how that information flows within and between committees and will enable more rapid decision making. Participants will have the information they need to be confident in their decisions.
| Strategic | IT Steering Committee | |
| Tactical | Project Governance Service Governance Risk Governance Information Governance |
IT Management |
| Operational | Risk Task Force |
Info-Tech recommends using SIPOC as a way of defining how the IT steering committee will operate.
Derived from the core methodologies of Six Sigma process management, SIPOC – a model of Suppliers, Inputs, Processes, Outputs, Customers – is one of several tools that organizations can use to build high level processes. SIPOC is especially effective when determining process scope and boundaries and to gain consensus on a process.
By doing so you’ll ensure that:
Remember: Your IT steering committee is not a working committee. Enable effective decision making by ensuring participants have the necessary information and appropriate recommendations from key stakeholders to make decisions.
| Supplier | Input |
| Who provides the inputs to the governance responsibility. | The documented information, data, or policy required to effectively respond to the responsibility. |
| Process | |
| In this case this represents the IT steering committee responsibility defined in terms of the activity the ITSC is performing. | |
| Output | Customer |
| The outcome of the meeting: can be approval, rejection, recommendation, request for additional information, endorsement, etc. | Receiver of the outputs from the committee responsibility. |
For atypical responsibilities:
INPUT
OUTPUT
Materials
Participants
| SIPOC: Establish the target investment mix | |
| Supplier | Input |
| CIO |
|
| Process | |
| Responsibility: The IT steering committee shall review and approve the target investment mix. | |
| Output | Customer |
|
|
| SIPOC: Endorse the IT budget | |
| Supplier | Input |
| CIO |
See Info-Tech’s blueprint IT Budget Presentation |
| Process | |
Responsibility: Review the proposed IT budget as defined by the CIO and CFO. |
|
| Output | Customer |
|
|
| SIPOC: Monitor IT value metrics | |
| Supplier | Input |
| CIO |
|
| Process | |
Responsibility: Review recommendations and either accept or reject recommendations. Refine go-forward metrics. |
|
| Output | Customer |
|
|
| SIPOC: Evaluate and select programs/projects to fund | |
| Supplier | Input |
| PMO |
See Info-Tech’s blueprint Grow Your Own PPM Solution |
| Process | |
Responsibility: The ITSC will approve the list of projects to fund based on defined prioritization criteria – in line with capacity and IT budget. It is also responsible for identifying the prioritization criteria in line with organizational priorities. |
|
| Output | Customer |
|
|
| SIPOC: Endorse the IT strategy | |
| Supplier | Input |
| CIO |
See Info-Tech’s blueprint IT Strategy and Roadmap |
| Process | |
Responsibility: Review, understand, and endorse the IT strategy. | |
| Output | Customer |
|
|
| SIPOC: Monitor project management metrics | |
| Supplier | Input |
| PMO |
|
| Process | |
Responsibility: Review recommendations around PM metrics and define target metrics. Endorse current effectiveness levels or determine corrective action. |
|
| Output | Customer |
|
|
| SIPOC: Approve launch of planned and unplanned project | |
| Supplier | Input |
| CIO |
See Info-Tech’s Blueprint: Grow Your Own PPM Solution |
| Process | |
Responsibility: Review the list of projects and approve the launch or reprioritization of projects. | |
| Output | Customer |
|
|
| SIPOC: Monitor stakeholder satisfaction with services and other service metrics | |
| Supplier | Input |
| Service Manager |
|
| Process | |
Responsibility: Review recommendations around service metrics and define target metrics. Endorse current effectiveness levels or determine corrective action. |
|
| Output | Customer |
|
|
| SIPOC: Approve plans for new or changed service requirements | |
| Supplier | Input |
| Service Manager |
|
| Process | |
Responsibility: Review IT recommendations, approve changes, and communicate those to staff. |
|
| Output | Customer |
|
|
| SIPOC: Monitor risk management metrics | |
| Supplier | Input |
| CIO |
|
| Process | |
Responsibility: Review recommendations around risk metrics and define target metrics. Endorse current effectiveness levels or determine corrective action. |
|
| Output | Customer |
|
|
| SIPOC: Review the prioritized list of risks | |
| Supplier | Input |
| Risk Manager |
|
| Process | |
Responsibility: Accept the risk registrar and define any additional action required. | |
| Output | Customer |
|
|
| SIPOC: Define information lifecycle process ownership | |
| Supplier | Input |
| CIO |
|
| Process | |
Responsibility: Define responsibility and accountability for information lifecycle ownership. |
|
| Output | Customer |
|
|
| SIPOC: Monitor information lifecycle metrics | |
| Supplier | Input |
| Information lifecycle owner |
|
| Process | |
Responsibility: Review recommendations around information management metrics and define target metrics. Endorse current effectiveness levels or determine corrective action. |
|
| Output | Customer |
|
|
New Metrics:
INPUT
OUTPUT
Materials
Participants
Industry: Consumer Goods
Source: Interview
"IT steering committee’s reputation greatly improved by clearly defining its process."
One of the major failings of the previous steering committee was its poorly drafted procedures. Members of the committee were unclear on the overall process and the meeting schedule was not well established.
This led to low attendance at the meetings and ineffective meetings overall. Since the meeting procedures weren’t well understood, some members of the leadership team took advantage of this to get their projects pushed through.
The first step the new CIO took was to clearly outline the meeting procedures in her new steering committee charter. The meeting agenda, meeting goals, length of time, and outcomes were outlined, and the stakeholders signed off on their participation.
She also gave the participants a SIPOC, which helped members who were unfamiliar with the process a high-level overview. It also reacquainted previous members with the process and outlined changes to the previous, out-of-date processes.
The participation rate in the committee meetings improved from the previous rate of approximately 40% to 90%. The committee members were much more satisfied with the new process and felt like their contributions were appreciated more than before.
2.1
Define a SIPOC for each of the ITSC responsibilities
Create SIPOCs for each of the governance responsibilities with the help of an Info-Tech advisor.
2.2
Establish the reporting metrics for the ITSC
The analyst will facilitate several exercises to help you and your stakeholders define the reporting metrics for the ITSC.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Guided Implementation 3: Build the Stakeholder Presentation Proposed Time to Completion: 1 week |
|---|
Customize the Presentation Start with an analyst kick-off call:
Then complete these activities…
With these tools & templates: IT Steering Committee Stakeholder Presentation
| Review and Practice the Presentation Review findings with analyst:
Then complete these activities…
With these tools & templates:
| Review the First ITSC Meeting Finalize phase deliverable:
Then complete these activities…
With these tools & templates: Establish an Effective IT Steering Committee blueprint |
Stakeholder engagement will be critical to your ITSC success, don't just focus on what is changing. Ensure stakeholders know why you are engaging them and how it will help them in their role.
Don’t take on too much in your first IT steering committee meeting. Many participants may not have participated in an IT steering committee before, or some may have had poor experiences in the past.
Use this meeting to explain the role of the IT steering committee and why you are implementing one, and help participants to understand their role in the process.
Quickly customize Info-Tech’s IT Steering Committee Stakeholder Presentation template to explain the goals and benefits of the IT steering committee, and use your own data to make the case for governance.
At the end of the meeting, ask committee members to sign the committee charter to signify their agreement to participate in the IT steering committee.
Review the IT Steering Committee Stakeholder Presentation template. This document should be presented at the first IT steering committee meeting by the assigned Committee Chair.
Customization Options
Overall: Decide if you would like to change the presentation template. You can change the color scheme easily by copying the slides in the presentation deck and pasting them into your company’s standard template. Once you’ve pasted them in, scan through the slides and make any additional changes needed to formatting.
Slide 2-3: Review the text on each of the slides and see if any wording should be changed to better suite your organization.
Slide 4: Review your list of the top 10 challenges and opportunities as defined in section 2 of this blueprint. Document those in the appropriate sections. (Note: be careful that the language is business-facing; challenges and opportunities should be professionally worded.)
Slide 5: Review the language on slide 5 to make any necessary changes to suite your organization. Changes here should be minimal.
INPUT
OUTPUT
Materials
Participants
Customization Options
Slide 6: The goal of this slide is to document and share the names of the participants on the IT steering committee. Document the names in the right-hand side based on your IT Steering Committee Charter.
Slides 7-9:
Slide 10: Review and understand the rollout timeline. Make any changes needed to the timeline.
INPUT
OUTPUT
Materials
Participants
INPUT
Participants
By this point, you should have customized the meeting presentation deck and be ready to meet with your IT steering committee participants.
The meeting should be one hour in duration and completed in person.
Before holding the meeting, identify who you think is going to be most supportive and who will be least. Consider meeting with those individuals independently prior to the group meeting to elicit support or minimize negative impacts on the meeting.
Customize this calendar invite script to invite business partners to participate in the meeting.
Hello [Name],
As you may have heard, we recently went through an exercise to develop an IT steering committee. I’d like to take some time to discuss the results of this work with you, and discuss ways in which we can work together in the future to better enable corporate goals.
The goals of the meeting are:
I look forward to starting this discussion with you and working with you more closely in the future.
Warm regards,
Industry:Consumer Goods
Source: Interview
"CIO gains buy-in from the company by presenting the new committee to its stakeholders."
Communication was one of the biggest steering committee challenges that the new CIO inherited.
Members were resistant to joining/rejoining the committee because of its previous failures. When the new CIO was building the steering committee, she surveyed the members on their knowledge of IT as well as what they felt their role in the committee entailed.
She found that member understanding was lacking and that their knowledge surrounding their roles was very inconsistent.
The CIO dedicated their first steering committee meeting to presenting the results of that survey to align member knowledge.
She outlined the new charter and discussed the roles of each member, the goals of the committee, and the overarching process.
Members of the new committee were now aligned in terms of the steering committee’s goals. Taking time to thoroughly outline the procedures during the first meeting led to much higher member engagement. It also built accountability within the committee since all members were present and all members had the same level of knowledge surrounding the roles of the ITSC.
3.1
Create a presentation for ITSC stakeholders to be presented at the first ITSC meeting
Work with an Info-Tech advisor to customize our IT Steering Committee Stakeholder Presentation template. Use this presentation to gain stakeholder buy-in by making the case for an ITSC.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
| Guided Implementation : Define the Prioritization Criteria Proposed Time to Completion: 4 weeks |
|---|
| Discuss Prioritization Criteria Start with an analyst kick-off call:
Then complete these activities...
With these tools & templates: IT Steering Committee Project Prioritization Tool | Customize the IT Steering Committee Project Prioritization Tool Review findings with analyst:
Then complete these activities…
With these tools & templates: IT Steering Committee Project Prioritization Tool | Review Results of the Pilot Test Finalize phase deliverable:
Then complete these activities…
With these tools & templates: IT Steering Committee Project Prioritization Tool |
The steering committee sets and agrees to principles that guide prioritization decisions. The agreed upon principles will affect business unit expectations and justify the deferral of requests that are low priority. In some cases, we have seen the number of requests drop substantially because business units are reluctant to propose initiatives that do not fit high prioritization criteria.
One of the key roles of the IT steering committee is to review and prioritize the portfolio of IT projects.
What is the prioritization based on? Info-Tech recommends selecting four broad criteria with two dimensions under each to evaluate the value of the projects. The criteria are aligned with how the project generates value for the organization and the execution of the project.
What is the role of the steering committee in prioritizing projects? The steering committee is responsible for reviewing project criteria scores and making decisions about where projects rank on the priority list. Planning, resourcing, and project management are the responsibility of the PMO or the project owner.
| Info-Tech’s Sample Criteria |
|---|
| Value Strategic Alignment: How much a project supports the strategic goals of the organization. Customer Satisfaction: The impact of the project on customers and how visible a project will be with customers. Operational Alignment: Whether the project will address operational issues or compliance. |
| Execution Financial: Predicted ROI and cost containment strategies. Risk: Involved with not completing projects and strategies to mitigate it. Feasibility: How easy the project is to complete and whether staffing resources exist. |
INPUT
OUTPUT
Materials
Participants
INPUT
OUTPUT
Materials
Participants
Document the prioritization criteria weightings in Info-Tech’s IT Steering Committee Project Prioritization Tool.
Download Info-Tech’s Project Intake and Prioritization Tool.
Rank: Project ranking will dynamically update relative to your portfolio capacity (established in Settings tab) and the Size, Scoring Progress, Remove from Ranking, and Overall Score columns. The projects in green represent top priorities based on these inputs, while yellow projects warrant additional consideration should capacity permit.
Scoring Progress: You will be able to determine some items on the scorecard earlier in the scoring progress (such as strategic and operational alignment). As you fill in scoring columns on the Project Data tab, the Scoring Progress column will dynamically update to track progress.
The Overall Score will update automatically as you complete the scoring columns (refer to Activity 4.2).
Days in Backlog: This column will help with backlog management, automatically tracking the number of days since an item was added to the list based on day added and current date.
INPUT
OUTPUT
Materials
Participants
Projects that are scored but not prioritized will populate the portfolio backlog. Items in the backlog will need to be rescored periodically, as circumstances can change, impacting scores. Factors necessitating rescoring can include:
Score projects using the Project Data tab in Info-Tech’s IT Steering Committee Project Prioritization Tool
IT Steering Committee Project Prioritization Tool is depicted. The Data Tab is shown.">
Consult these Info-Tech blueprints on project portfolio management to create effective portfolio project management resourcing processes.
Create Project Management Success
Develop a Project Portfolio Management Strategy
Industry: Consumer Goods
Source: Interview
"Clear project intake and prioritization criteria allow for the new committee to make objective priority decisions."
One of the biggest problems that the previous steering committee at the company had was that their project intake and prioritization process was not consistent. Projects were being prioritized based on politics and managers taking advantage of the system.
The procedure was not formalized so there were no objective criteria on which to weigh the value of proposed projects. In addition to poor meeting attendance, this led to the overall process being very inconsistent.
The new CIO, with consultation from the newly formed committee, drafted a set of criteria that focused on the value and execution of their project portfolio. These criteria were included on their intake forms to streamline the rating process.
All of the project scores are now reviewed by the steering committee, and they are able to facilitate the prioritization process more easily.
The objective criteria process also helped to prevent managers from taking advantage of the prioritization process to push self-serving projects through.
This was seen as a contributor to the increase in satisfaction scores for IT, which improved by 12% overall.
The new streamlined process helped to reduce capacity constraints on IT, and it alerted the company to the need for more IT employees to help reduce these constraints further. The IT department was given permission to hire two new additional staff members.
4.1
IT Steering Committee Project Prioritization Tool.">
Define your prioritization criteria and customize our IT Steering Committee Project Prioritization Tool
With the help of Info-Tech advisors, create criteria for determining a project’s priority. Customize the tool to reflect the criteria and their weighting. Run pilot tests of the tool to verify the criteria and enter your current project portfolio.
Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.
The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.
Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.
These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.
IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.
| Strategic | IT Steering Committee | |
| Tactical | Project Governance Service Governance Risk Governance Information Governance | IT Management |
| Operational | Risk Task Force |
This blueprint focuses exclusively on building the IT Steering committee. For more information on IT governance see Info-Tech’s related blueprint: Tailor an IT Governance Plan to Fit Organizational Needs.
By bucketing responsibilities into these areas, you’ll be able to account for most key IT decisions and help the business to understand their role in governance, fostering ownership and joint accountability.
The five governance areas are:
Governance of the IT Portfolio and Investments: Ensures that funding and resources are systematically allocated to the priority projects that deliver value.
Governance of Projects: Ensures that IT projects deliver the expected value, and that the PM methodology is measured and effective.
Governance of Risks: Ensures the organization’s ability to assess and deliver IT projects and services with acceptable risk.
Governance of Services: Ensures that IT delivers the required services at the acceptable performance levels.
Governance of Information and Data: Ensures the appropriate classification and retention of data based on business need.
Overall, survey respondents indicated a lack of understanding about how decisions are made around risk, services, projects, and investments, and that business involvement in decision making was too minimal.
72% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).
62% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).
70% of stakeholders do not understand how decisions around projects selection, success, and changes are made.
78% of stakeholders do not understand how decisions around risk are made
67% of stakeholders believe they do understand how decisions around information (data) retention and classification are made.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Valence Howden Principal Research Director, CIO Practice |
Petar Hristov Research Director, Security, Privacy, Risk & Compliance |
Ian Mulholland Research Director, Security, Risk & Compliance |
Brittany Lutes Senior Research Analyst, CIO Practice |
Ibrahim Abdel-Kader Research Analyst, CIO Practice |
Every organization has a threshold for risk that should not be exceeded, whether that threshold is defined or not.
In the age of digital, information and technology will undoubtedly continue to expand beyond the confines of the IT department. As such, different areas of the organization cannot address these risks in silos. A siloed approach will produce different ways of identifying, assessing, responding to, and reporting on risk events. Integrated risk management is about embedding IT uncertainty to inform good decision making across the organization.
When risk is integrated into the organization's enterprise risk management program, it enables a single view of all risks and the potential impact of each risk event. More importantly, it provides a consistent view of the risk event in relation to uncertainty that might have once been seemingly unrelated to IT.
And all this can be achieved while remaining within the enterprise’s clearly defined risk appetite.
Most organizations fail to integrate IT risks into enterprise risks:
IT leaders have to overcome these obstacles when it comes to integrating risk:
By leveraging the Info-Tech Integrated Risk approach, your business can better address and embed risk by:
Stop avoiding risk – integrate it. This provides a holistic view of uncertainty for the organization to drive innovative new approaches to optimize its ability to respond to risk.
Enterprise risk management is the practice of identifying and addressing risks to your organization and using risk information to drive better decisions and better opportunities.
|
IT risks have a direct and often aggregated impact on enterprise risks and opportunities in the same way other business risks can. This relationship must be understood and addressed through integrated risk management to ensure a consistent approach to risk. |
Risk-mature organizations have a unique benefit in that they often have established an overarching governance framework and embedded risk awareness into the culture.
35% — Only 35% of organizations had embraced ERM in 2020. (Source: AICPA and NC State Poole College of Management)
12% — Only 12% of organizations are leveraging risk as a tool to their strategic advantage. (Source: AICPA and NC State Poole College of Management)
62% — Accessing and disseminating information is the main challenge for 62% of organizations maturing their organizational risk management. (Source: OECD)
20-28% — Organizations with access to machine learning and analytics to address future risk events have 20 to 28% more satisfaction. (Source: Accenture)
Accelerate and optimize your organization by leveraging meaningful risk data to make intelligent enterprise risk decisions.
Risk Drivers
|
Only 7% of organizations are in a “leading” or “aspirational” level of risk maturity. (OECD, 2021) | 63% of organizations struggle when it comes to defining their appetite toward strategy related risks. (“Global Risk Management Survey,” Deloitte, 2021) | Late adopters of risk management were 70% more likely to use instinct over data or facts to inform an efficient process. (Clear Risk, 2020) | 55% of organizations have little to no training on ERM to properly implement such practices. (AICPA, NC State Poole College of Management, 2021) | |
| 1. Assess Enterprise Risk Maturity | 3. Build a Risk Management Program Plan | 4. Establish Risk Management Processes | 5. Implement a Risk Management Program | ||
| 2. Determine Authority with Governance
Unfortunately, less than 50% of those in risk focused roles are also in a governance role where they have the authority to provide risk oversight. (Governance Institute of Australia, 2020) |
|||||
| IT can improve the maturity of the organization’s risk governance and help identify risk owners who have authority and accountability.
Governance and related decision making is optimized with integrated and aligned risk data. |
|
ERM incorporates the different types of risk, including IT, security, digital, vendor, and other risk types. The program plan is meant to consider all the major risk types in a unified approach. |
|
Implementation of an integrated risk management program requires ongoing access to risk data by those with decision making authority who can take action. | |
Stop fearing risk – integrate it. Integration leads to opportunities for organizations to embrace innovation and new digital technologies as well as reducing operational costs and simplifying reporting.
Governance of risk management for information- and technology-related events is often misplaced. Just because it's classified as an IT risk does not mean it shouldn’t be owned by the board or business executive.
Integrating risk requires a baseline of risk maturity at the enterprise level. IT can push integrating risks, but only if the enterprise is willing to adopt the attitudes and behaviors that will drive the integrated risk approach.
It is not a strategic decision to have different areas of the organization manage the risks perceived to be in their department. It’s the easy choice, but not the strategic one.
Different areas of an enterprise apply risk management processes differently. Determining a single method for identification, assessment, response, and monitoring can ensure successful implementation of enterprise risk management.
Good risk management will consider both the positives and negatives associated with a risk management program by recognizing both the upside and downside of risk event impact and likelihood.
IT Benefits
|
Business Benefits
|
“31% of CIO’s expected their role to expand and include risk management responsibilities.” (IDG “2021 State of the CIO,” 2021)
58%Focus not just on the preventive risk management but also the value-creating opportunities. With 58% of organizations concerned about disruptive technology, it’s an opportunity to take the concern and transform it into innovation. (Accenture) |
70%Invest in tools that have data and analytics features. Currently, “gut feelings” or “experience” inform the risk management decisions for 70% of late adopters. (Clear Risk) |
54%Align to the strategic vision of the board and CEO, given that these two roles account for 54% of the accountability associated with extended enterprise risk management. (Extended Enterprise Risk Management Survey, 2020,” Deloitte) |
63%Include IT leaders in the risk committee to help informed decision making. Currently 63% of chief technology officers are included in the C‑suite risk committee. (AICPA & NC State Poole College of Management) |
| Successful adoption of integrated risk management is often associated with these key elements. | |||
Mature or not, integrated risk management should be a consideration for all organizationsThe first step to integrating risk management within the enterprise is to understand the organization’s readiness to adopt practices that will enable it to successfully integrate information. In 2021, we saw enterprise risk management assessments become one of the most common trends, particularly as a method by which the organization can consolidate the potential impacts of uncertainties or threats (Lawton, 2021). A major driver for this initiative was the recognition that information and technology not only have enterprise-wide impacts on the organization’s risk management but that IT has a critical role in supporting processes that enable effective access to data/information. A maturity assessment has several benefits for an organization: It ensures there is alignment throughout the organization on why integrated risk is the right approach to take, it recognizes the organization’s current risk maturity, and it supports the organization in defining where it would like to go. |
|
Integrated Risk Maturity Categories |
|
1 |
Context & Strategic Direction | Understand the organization’s main objectives and how risk can support or enhance those objectives. |
2 |
Risk Culture and Authority | Examine if risk-based decisions are being made by those with the right level of authority and if the organization’s risk appetite is embedded in the culture. | ||
3 |
Risk Management Process | Determine if the current process to identify, assess, respond to, monitor, and report on risks is benefitting the organization. | ||
4 |
Risk Program Optimization | Consider opportunities where risk-related data is being gathered, reported, and used to make informed decisions across the enterprise. |
For organizations with a low maturity, remaining superficial with risk will offer more benefits and align to the enterprise’s risk tolerance and appetite. This might mean no integrated risk is taking place.
However, organizations that have higher risk maturity should begin to integrate risk information. These organizations can identify the nuances that would affect the severity and impact of risk events.
The purpose of the Integrated Risk Maturity Assessment is to assess the organization's current maturity and readiness for integrated risk management (IRM).
Frequently and continually assessing your organization’s maturity toward integrated risk ensures the right risk management program can be adopted by your organization.
| Integrated Risk Maturity Assessment
A simple tool to understand if your organization is ready to embrace integrated risk management by measuring maturity across four key categories: Context & Strategic Direction, Risk Culture & Authority, Risk Management Process, and Risk Program Optimization |
|
Use the results from this integrated risk maturity assessment to determine the type of risk management program that can and should be adopted by your organization.
Some organizations will need to remain siloed and focused on IT risk management only, while others will be able to integrate risk-related information to start enabling automatic controls that respond to this data.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Confirm the list of Agile skills that you wish to measure.
Define what it means to attain specific agile skills through a defined ascension path of proficiency levels, and standardized skill expectations.
Determine the roll-out and communication plan that suits your organization.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Learn about and define the Agile skills that are important to your organization.
Define the different levels of attainment when it comes to your Agile skills.
Define the standards on a per-role basis.
Get a clear view of the Agile skills important into meet your Agile transformation goals in alignment with organizational objectives.
Set a clear standard for what it means to meet your organizational standards for Agile skills.
1.1 Review and update the Agile skills relevant to your organization.
1.2 Define your Agile proficiency levels to evaluate attainment of each skill.
1.3 Define your Agile team roles.
1.4 Define common experience levels for your Agile roles.
1.5 Define the skill expectations for each Agile role.
A list of Agile skills that are consistent with your Agile transformation
A list of proficiency levels to be used during your Agile skills assessment
A confirmed list of roles that you wish to measure on your Agile teams
A list of experience levels common to Agile team roles (example: Junior, Intermediate, Senior)
Define the skill expectations for each Agile role
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this report to understand the current situation in the cybersecurity space and inform your plan for 2022. This report includes sections on protecting against and responding to ransomware, acquiring and retaining talent, securing a remote workforce, securing digital transformation, and adopting zero trust.
The pandemic has introduced a lot of changes to our lives over the past two years, and this is also true for various aspects of how we work. In particular, a large workforce moved online overnight, which shifted the work environment rapidly.
People changed how they communicate, how they access company information, and how they connect to the company network. These changes make cybersecurity a more important focus than ever.
Although changes like the shift to remote work occurred in response to the pandemic, they are largely expected to remain, regardless of the progression of the pandemic itself. This report will look into important security trends and the priorities that stemmed from these trends.
30% more professionals expect transformative permanent change compared to one year ago.
47% of professionals expect a lot of permanent change; this remains the same as last year. (Source: Info-Tech Tech Trends 2022 Survey; N=475)
$4.24 millionAverage cost of a data breach in 2021 |
The cost of a data breach rose by nearly 10% in the past year, the highest rate in over seven years. |
$1.07 millionMore costly when remote work involved in the breach |
The average cost of breaches where remote work is involved is $1.07 million higher than breaches where remote work is not involved. The ubiquitous remote work that we saw in 2021 and continue to see in 2022 can lead to more costly security events. (Source: IBM, 2021) |
Remote work is here to stay, and the cost of a breach is higher when remote work is involved.
The cost comes not only directly from payments but also indirectly from reputational loss. (Source: IBM, 2021)
$1.76 millionSaved when zero trust is deployed facing a breach |
Zero trust controls are realistic and effective controls. Organizations that implement zero trust dramatically reduce the cost of an adverse security event. |
35%More costly if it takes more than 200 days to identify and contain a breach |
With increased BYOD and remote work, detection and response is more challenging than ever before – but it is also highly effective. Organizations that detect and respond to incidents quickly will significantly reduce the impact. (Source: IBM, 2021) |
Breaches are 34% less costly when mature zero trust is implemented.
A fully staffed and well-prepared security team could save the cost through quick responses. (Source: IBM, 2021)
As part of its research process for the 2022 Security Priorities Report, Info-Tech Research Group surveyed security and IT leaders (N=97) to ask their top security priorities as well as their main obstacles to security success in 2022:
Top Priorities
Survey respondents were asked to force-rank their security priorities. Among the priorities chosen most frequently as #1 were talent management, addressing ransomware threats, and securing hybrid/remote work. |
Top Obstacles
Talent management is both the #1 priority and the top obstacle facing security leaders in 2022. Unsurprisingly, the ever-changing environment in a world emerging from a pandemic and budget constraints are also top obstacles. |
This report details what we see the world demanding of security leaders in the coming year.
Setting aside the demands – what are security leaders actually working on?
![]() |
Many organizations are still mastering the foundations of a mature cybersecurity program. This is a good idea! Most breaches are still due to gaps in foundational security, not lack of advanced controls. |
![]() |
One industry plainly stands out from the rest. Government organizations are proportionally much more active in security than other industries, and for good reason: they are common targets. Manufacturing and professional services are proportionally less interested in security. This is concerning, given the recent targeting of supply chain and personal data holders by ransomware gangs. |

Main Influencing Factors |
||
| COVID-19 Pandemic
The pandemic has changed the way we interact with technology. Organizations are universally adapting their business and technology processes to fit the post-pandemic paradigm. |
Rampant Cybercrime Activity
By nearly every conceivable metric, cybercrime is way up in the past two years. Cybercriminals smell blood and pose a more salient threat than before. Higher standards of cybersecurity capability are required to respond to this higher level of threat. |
Remote Work and Workforce Reallocation
Talented IT staff across the globe enabled an extraordinarily fast shift to remote and distance work. We must now reckon with the security and human resourcing implications of this huge shift. |
Cybersecurity talent has been in short supply for years, but this shortage has inflected upward since the pandemic.
The Great Resignation contributed to the existing talent gap. The pandemic has changed how people work as well as how and where they choose work. More and more senior workers are retiring early or opting for remote working opportunities.
The cost to acquire cybersecurity talent is huge, and the challenge doesn’t end there. Retaining top talent can be equally difficult.
2.72 million unfilled cybersecurity openings (Source: (ISC)2, 2021)
| Burnout | 30% |
| Other remote opportunities | 20% |
| Lack of growth opportunities | 20% |
| Poor culture | 20% |
| Acquisition concerns | 10% |
| Staffing obstacles in 2022:
“Attracting and retaining talent is always challenging. We don’t pay as well and my org wants staff in the office at least half of the time. Most young, smart, talented new hires want to work remotely 100 percent of the time.“ “Trying to grow internal resources into security roles.” “Remote work expectations by employees and refusal by business to accommodate.” “Biggest obstacle: payscales that are out of touch with cybersecurity market.” “Request additional staff. Obtaining funding for additional position is most significant obstacle.” (Info-Tech Tech Security Priorities Survey 2022) |
Top obstacles in 2022:
As you can see, respondents to our security priorities survey have strong feelings on the challenges of staffing a cybersecurity team. The growth of remote work means local talent can now be hired by anybody, vastly increasing your competition as an employer. Hiring local will get tougher – but so will hiring abroad. People who don’t want to relocate for a new job now have plenty of alternatives. Without a compelling remote work option, you will find non-local prospects unwilling to move for a new job. Lastly, many organizations are still reeling at the cost of experienced cybersecurity talent. Focused internal training and development will be the answer for many organizations. |
| Provide career development opportunities
Many security professionals are dissatisfied with their unclear career development paths. To improve retention, organizations should provide their staff with opportunities and clear paths for career and skills advancement. |
Be open-minded when hiring
To broaden the candidate pool, organizations should be open-minded when considering who to hire.
|
| Facilitate work-life balance
Many security professionals say they experience burnout. Promoting work-life balance in your organization can help retain critical skills. |
Create inclusive environment
Hire a diverse team and create an inclusive environment where they can thrive. |
Use this template to explain the priorities you need your stakeholders to know about.
Provide a brief value statement for the initiative.
Initiative Description:
|
Description must include what IT will undertake to complete the initiative. | |||
Primary Business Benefits:
Reduction in costs due to turnover and talent loss |
Other Expected Business Benefits:
|
Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts. | ||
Risks:
|
Related Info-Tech Research: |
|||
Remote work poses unique challenges to cybersecurity teams. The personal home environment may introduce unauthorized people and unknown network vulnerabilities, and the organization loses nearly all power and influence over the daily cyber hygiene of its users.
In addition, the software used for enabling remote work itself can be a target of cybersecurity criminals.
70% of tech workers work from home (Source: Statcan, 2021)
The security perimeter is finally goneThe data is outside the datacenter.
Organizations that did not implement digital transformation changes following COVID-19 experience higher costs following a breach, likely because it is taking nearly two months longer, on average, to detect and contain a breach when more than 50% of staff are working remotely (IBM, 2021). In 2022 the cumulative risk of so many remote connections means we need to rethink how we secure the remote/hybrid workforce. |
Security
|
![]() |
Network
|
| Mature your identity management
Compromised identity is the main vector to breaches in recent years. Stale accounts, contractor accounts, misalignment between HR and IT – the lack of foundational practices leads to headline-making breaches every week.
|
Get a handle on your endpoints
Work-from-home (WFH) often means unknown endpoints on unknown networks full of other unknown devices…and others in the home potentially using the workstation for non-work purposes. Gaining visibility into your endpoints can help to keep detection and resolution times short. |
| Educate users
Educate everyone on security best practices when working remotely:
|
Ease of use
Many workers complain that the corporate technology solution makes it difficult to get their work done. Employees will take productivity over security if we force them to choose, so IT needs to listen to end users’ needs and provide a solution that is nimble and secure. |
Use this template to explain the priorities you need your stakeholders to know about.
Provide a brief value statement for the initiative.
Initiative Description:
| Description must include what IT will undertake to complete the initiative. | |||
Primary Business Benefits: | Other Expected Business Benefits:
| Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts. | ||
Risks:
| Related Info-Tech Research: | |||
Digital transformation is occurring at an ever-increasing rate these days. As Microsoft CEO Satya Nadella said early in the pandemic, “We’ve seen two years’ worth of digital transformation in two months.”
We have heard similar stories from Info-Tech members who deployed rollouts that were scheduled to take months over a weekend instead.
Microsoft’s own shift to rapidly expand its Teams product is a prime example of how quickly the digital landscape has changed. The global adaption to a digital world has largely been a success story, but rapid change comes with risk, and there is a parallel story of rampant cyberattacks like we have never seen before.
There is an adage that “slow is smooth, and smooth is fast” – the implication being that fast is sloppy. In 2022 we’ll see a pattern of organizations working to catch up their cybersecurity with the transformations we all made in 2020.
$1.78 trillion expected in digital transformation investments (Source: World Economic Forum, 2021)
| Digital transformations often rely heavily on third-party cloud service providers, which increases exposure of corporate data.
Further, adoption of new technology creates a new threat surface that must be assessed, mitigations implemented, and visibility established to measure performance. However, digital transformations are often run on slim budgets and without expert guidance. Survey respondents report as much: rushed deployments, increased cloud migration, and shadow IT are the top vulnerabilities reported by security leaders and executives. |
In a 2020 Ponemon survey, 82% of IT security and C-level executives reported experiencing at least one data breach directly resulting from a digital transformation they had undergone. Scope creep is inevitable on any large project like a digital transformation. A small security shortcut early in the project can have dire consequences when it grows to affect personal data and critical systems down the road. |
| Engage the business early and often
Despite the risks, organizations engage in digital transformations because they also have huge business value. Security leaders should not be seeking to slow or stop digital transformations; rather, we should be engaging with the business early to get ahead of risks and enable successful transformation. |
Establish a vendor security program
Data is moving out of datacenters and onto third-party environments. Without security requirements built into agreements, and clear visibility into vendor security capabilities, that data is a major source of risk. A robust vendor security program will create assurance early in the process and help to reinforce the responsibility of securing data with other parts of the organization. |
| Build/revisit your security strategy
The threat surface has changed since before your transformation. This is the right time to revisit or rebuild your security strategy to ensure that your control set is present throughout the new environment – and also a great opportunity to show how your current security investments are helping secure your new digital lines of business! |
Educate your key players
Only 16% of security leaders and executives report alignment between security and business processes during digital transformation. If security is too low a priority, then key players in your transformation efforts are likely unaware of how security risks impact their own success. It will be incumbent upon the CISO to start that conversation. |
Use this template to explain the priorities you need your stakeholders to know about.
Provide a brief value statement for the initiative.
Initiative Description:
| Description must include what IT will undertake to complete the initiative. | |||
Primary Business Benefits: | Other Expected Business Benefits:
| Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts. | ||
Risks:
| Related Info-Tech Research: | |||
John Kindervag modernized the concept of zero trust back in 2010, and in the intervening years there has been enormous interest in cybersecurity circles, yet in 2022 only 30% of organizations report even beginning to roll out zero trust capabilities (Statista, 2022).
Why such little action on a revolutionary and compelling model?
Zero trust is not a technology; it is a principle. Zero trust adoption takes concerted planning, effort, and expense, for which the business value has been unclear throughout most of the last 10 years. However, several recent developments are changing that:
The time has come for zero trust adoption to begin in earnest.
97% will maintain or increase zero trust budget (Source: Statista, 2022)
A hybrid workforce using traditional VPN creates an environment where we are exposed to all the risks in the wild (unknown devices at any location on any network), but at a stripped-down security level that still provides the trust afforded to on-premises workers using known devices.
What’s more, threats such as ransomware are known to exploit identity and remote access vulnerabilities before moving laterally within a network – vectors that are addressed directly by zero trust identity and networking. Ninety-three percent of surveyed zero trust adopters state that the benefits have matched or exceeded their expectations (iSMG, 2022).
44%Enforce least privilege access to critical resources |
44%Reduce attacker ability to move laterally |
41%Reduce enterprise attack surface |
A major obstacle to zero trust adoption has been the sheer cost, along with the lack of business case for that investment. Two factors are changing that paradigm in 2022:
The May 2021 US White House Executive Order for federal agencies to adopt zero trust architecture finally placed zero trust on the radar of many CEOs and board members, creating the business interest and willingness to consider investing in zero trust.
In addition, the cost of adopting zero trust is quickly being surpassed by the cost of not adopting zero trust, as cyberattacks become rampant and successful zero trust deployments create a case study to support investment.
![]() |
The cost to remediate a ransomware attack more than doubled from 2020 to 2021. Widespread adoption of zero trust capabilities could keep that number from doubling again in 2022. (Source: Sophos, 2021) |
The cost of a data breach is on average $1.76 million less for organizations with mature zero trust deployments.
That is, the cost of a data breach is 35% reduced compared to organizations without zero trust controls. (Source: IBM, 2021)
| Start small
Don’t put all your eggs in one basket by deploying zero trust in a wide swath. Rather, start as small as possible to allow for growing pains without creating business friction (or sinking your project altogether). |
Build a sensible roadmap
Zero trust principles can be applied in a myriad of ways, so where should you start? Between identities, devices, networking, and data, decide on a use case to do pilot testing and then refine your approach. |
| Beware too-good-to-be-true products
Zero trust is a powerful buzzword, and vendors know it. Be skeptical and do your due diligence to ensure your new security partners in zero trust are delivering what you need. |
Use this template to explain the priorities you need your stakeholders to know about.
Provide a brief value statement for the initiative.
Initiative Description:
| Description must include what IT will undertake to complete the initiative. | ||||
Primary Business Benefits: | Other Expected Business Benefits:
| Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts. | |||
Risks:
| Related Info-Tech Research: | ||||
150% increase ransomware attacks in 2020 (Source: ENISA)
| What is the same in 2022
Unbridled ransomware attacks make it seem like attackers must be using complex new techniques, but prevalent ransomware attack vectors are actually well understood. Nearly all modern variants are breaching victim systems in one of three ways:
|
What is new in 2022
The sophistication of victim targetingVictims often find themselves asking, “How did the attackers know to phish the most security-oblivious person in my staff?” Bad actors have refined their social engineering and phishing to exploit high-risk individuals, meaning your chain is only as strong as the weakest link. Ability of malware to evade detectionModern ransomware is getting better at bypassing anti-malware technology, for example, through creative techniques such as those seen in the MedusaLocker variant and in Ghost Control attacks. Effective anti-malware is still a must-have control, but a single layer of defense is no longer enough. Any organization that hopes to avoid paying a ransom must prepare to detect, respond, and recover from an attack. |
| Do you know what it would take to recover from a ransomware incident?
…and does your executive leadership know what it would take to recover? The organizations that are most likely to pay a ransom are unprepared for the reality of recovering their systems. If you have not done a tabletop or live exercise to simulate a true recovery effort, you may be exposed to more risk than you realize. |
Are your defenses sufficiently hardened against ransomware?
Organizations with effective security prevention are often breached by ransomware – but they are prepared to contain, detect, and eradicate the infection. Ask yourself whether you have identified potential points of entry for ransomware. Assume that your security controls will fail. How well are your security controls layered, and how difficult would it be for an attacker to move east/west within your systems? |
| Be prepared for a breach
There is no guarantee that an organization will not fall victim to ransomware, so instead of putting all their effort into prevention, organizations should also put effort into planning to respond to a breach. |
Security awareness training/phishing detection
Phishing continues to be the main point of entry for ransomware. Investing in phishing awareness and detection among your end users may be the most impactful countermeasure you can implement. |
| Zero trust adoption
Always verify at every step of interaction, even when access is requested by internal users. Manage access of sensitive information based on the principle of least privilege access. |
Encrypt and back up your data
Encrypt your data so that even if there is a breach, the attackers don’t have a copy of your data. Also, keep regular backups of data at a separate location so that you still have data to work with after a breach occurs. You never want to pay a ransom. Being prepared to deal with an incident is your best chance to avoid paying! |
Use this template to explain the priorities you need your stakeholders to know about.
Provide a brief value statement for the initiative.
Initiative Description:
| Description must include what IT will undertake to complete the initiative. | |||
Primary Business Benefits: | Other Expected Business Benefits:
| Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts. | ||
Risks:
| Related Info-Tech Research: | |||
How long has it been since you’ve gone a full workday without having a videoconference with someone?
We have become inherently trustful that the face we see on the screen is real, but the technology required to falsify that video is widely available and runs on commercially available hardware, ushering in a genuinely post-truth online era.
Criminals can use deepfakes to enhance social engineering, to spread misinformation, and to commit fraud and blackmail.
Many financial institutions have recently deployed voiceprint authentication. TD describes its VoicePrint as “voice recognition technology that allows us to use your voiceprint – as unique to you as your fingerprint – to validate your identity” over the phone.
However, hackers have been defeating voice recognition for years already. There is ripe potential for voice fakes to fool both modern voice recognition technology and the accounts payable staff.
“2021 Ransomware Statistics, Data, & Trends.” PurpleSec, 2021. Web.
Bayern, Macy. “Why 60% of IT security pros want to quit their jobs right now.” TechRepublic, 10 Oct. 2018. Web.
Bresnahan, Ethan. “How Digital Transformation Impacts IT And Cyber Risk Programs.” CyberSaint Security, 25 Feb. 2021. Web.
Clancy, Molly. “The True Cost of Ransomware.” Backblaze, 9 Sept. 2021.Web.
“Cost of a Data Breach Report 2021.” IBM, 2021. Web.
Cybersecurity Ventures. “Global Ransomware Damage Costs To Exceed $265 Billion By 2031.” Newswires, 4 June 2021. Web.
“Digital Transformation & Cyber Risk: What You Need to Know to Stay Safe.” Ponemon Institute, June 2020. Web.
“Global Incident Response Threat Report: Manipulating Reality.” VMware, 2021.
Granger, Diana. “Karmen Ransomware Variant Introduced by Russian Hacker.” Recorded Future, 18 April 2017. Web.
“Is adopting a zero trust model a priority for your organization?” Statista, 2022. Web.
“(ISC)2 Cybersecurity Workforce Study, 2021: A Resilient Cybersecurity Profession Charts the Path Forward.” (ISC)2, 2021. Web.
Kobialka, Dan. “What Are the Top Zero Trust Strategies for 2022?” MSSP Alert, 10 Feb. 2022. Web.
Kost, Edward. “What is Ransomware as a Service (RaaS)? The Dangerous Threat to World Security.” UpGuard, 1 Nov. 2021. Web.
Lella, Ifigeneia, et al., editors. “ENISA Threat Landscape 2021.” ENISA, Oct. 2021. Web.
Mello, John P., Jr. “700K more cybersecurity workers, but still a talent shortage.” TechBeacon, 7 Dec. 2021. Web.
Naraine, Ryan. “Is the ‘Great Resignation’ Impacting Cybersecurity?” SecurityWeek, 11 Jan. 2022. Web.
Oltsik, Jon. “ESG Research Report: The Life and Times of Cybersecurity Professionals 2021 Volume V.” Enterprise Security Group, 28 July 2021. Web.
Osborne, Charlie. “Ransomware as a service: Negotiators are now in high demand.” ZDNet, 8 July 2021. Web.
Osborne, Charlie. “Ransomware in 2022: We’re all screwed.” ZDNet, 22 Dec. 2021. Web.
“Retaining Tech Employees in the Era of The Great Resignation.” TalentLMS, 19 Oct. 2021. Web.
Rubin, Andrew. “Ransomware Is the Greatest Business Threat in 2022.” Nasdaq, 7 Dec. 2021. Web.
Samartsev, Dmitry, and Daniel Dobrygowski. “5 ways Digital Transformation Officers can make cybersecurity a top priority.“ World Economic Forum, 15 Sept. 2021. Web.
Seymour, John, and Azeem Aqil. “Your Voice is My Passport.” Presented at black hat USA 2018.
Solomon, Howard. “Ransomware attacks will be more targeted in 2022: Trend Micro.” IT World Canada, 6 Jan. 2022. Web.
“The State of Ransomware 2021.” Sophos, April 2021. Web.
Tarun, Renee. “How The Great Resignation Could Benefit Cybersecurity.” Forbes Technology Council, Forbes, 21 Dec. 2021. Web.
“TD VoicePrint.” TD Bank, n.d. Web.
“Working from home during the COVID-19 pandemic, April 202 to June 2021.” Statistics Canada, 4 Aug. 2021. Web.
“Zero Trust Strategies for 2022.” iSMG, Palo Alto Networks, and Optiv, 28 Jan. 2022. Web.
Product, service, and process design should always start with an intimate understanding of what the business is trying to accomplish and why it is important.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify goals and objectives for experience design, establish targeted stakeholders, and conduct discovery interviews.
Create the journey map, design a research study to validate your hypotheses, and iterate and ideate around a refined, data-driven understanding of stakeholder problems.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the method and purpose of journey mapping.
Initial understanding of the journey mapping process and the concept of end-user empathy.
1.1 Introduce team and discuss workshop motivations and goals.
1.2 Discuss overview of journey mapping process.
1.3 Perform journey mapping case study activity.
Case Study Deliverables – Journey Map and Empathy Maps
Begin to understand the goals and motivations of your stakeholders using customer segmentation and an empathy mapping exercise.
Understand the demographic and psychographic factors driving stakeholder behavior.
2.1 Discuss psychographic stakeholder segmentation.
2.2 Create empathy maps for four segments.
2.3 Generate problem statements.
2.4 Identify target market.
Stakeholder personas
Target market of IT
Get first-hand knowledge of stakeholder needs and start to capture their perspective with a first-iteration journey map.
Capture the process stakeholders use to solve problems and empathize with their perspectives, pains, and gains.
3.1 Review discovery interviewing techniques.
3.2 Review and modify the discovery questionnaire
3.3 Demonstrate stakeholder interview.
3.4 Synthesize learnings and begin creating a journey map.
Customized discovery interview template
Results of discovery interviewing
Hypothesize the stakeholder journey, identify assumptions, plan a research study to validate your understanding, and ideate around critical junctures in the journey.
Understand the stakeholder journey and ideate solutions with the intention of improving their experience with IT.
4.1 Finish the journey map.
4.2 Identify assumptions and create hypotheses.
4.3 Discuss field research and hypothesis testing.
4.4 Design the research study.
4.5 Discuss concluding remarks and next steps.
Completed journey map for one IT process, product, or service
Research study design and action plan
Build an event management practice that is situated in the larger service management environment. Purposefully choose valuable events to track and predefine their associated actions to cut down on data clutter.
Event management is useless in isolation. The goals come from the pain points of other ITSM practices. Build handoffs to other service management practices to drive the proper action when an event is detected.
Create a repeatable framework to define monitored events, their root cause, and their associated action. Record your monitored events in a catalog to stay organized.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Engineer your event management practice with tracked events informed by the business impact of the related systems, applications, and services. This storyboard will help you properly define and catalog events so you can properly respond when alerted.
Use this tool to define your workflow for adding new events to track. This cookbook includes the considerations you need to include for every tracked event as well as the roles and responsibilities of those involved with event management.
Use this tool to record your tracked events and alerts in one place. This catalog allows you to record the rationale, root-cause, action, and data governance for all your monitored events.
Use this template to help define your event management handoffs to other service management practices including change management, incident management, and problem management.
Use this tool to implement and continually improve upon your event management process. Record, prioritize, and assign your action items from the event management blueprint.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine goals and challenges for event management and set the scope to business-critical systems.
Defined system scope of Event Management
Roles and responsibilities defined
1.1 List your goals and challenges
1.2 Monitoring and event management RACI
1.3 Abbreviated business impact analysis
Event Management RACI (as part of the Event Management Cookbook)
Abbreviated BIA (as part of the Event Management Cookbook)
Define your in-scope configuration items and their operational conditions
Operational conditions, related CIs and dependencies, and CI thresholds defined
2.1 Define operational conditions for systems
2.2 Define related CIs and dependencies
2.3 Define conditions for CIs
2.4 Perform root-cause analysis for complex condition relationships
2.5 Set thresholds for CIs
Event Management Catalog
Pre-define actions for every monitored event
Thresholds and actions tied to each monitored event
3.1 Set thresholds to monitor
3.2 Add actions and handoffs to event management
Event Catalog
Event Management Workflows
Effectively implement event management
Establish an event management roadmap for implementation and continual improvement
4.1 Define your data policy for event management
4.2 Identify areas for improvement and establish an implementation plan
Event Catalog
Event Management Roadmap
Event management is useless in isolation.
Event management creates no value when implemented in isolation. However, that does not mean event management is not valuable overall. It must simply be integrated properly in the service management environment to inform and drive the appropriate actions.
Every step of engineering event management, from choosing which events to monitor to actioning the events when they are detected, is a purposeful and explicit activity. Ensuring that event management has open lines of communication and actions tied to related practices (e.g. problem, incident, and change) allows efficient action when needed.
Catalog your monitored events using a standardized framework to allow you to know:
Properly engineering event management allows you to effectively monitor and understand your IT environment and bolster the proactivity of the related service management practices.
Benedict Chang
Research Analyst, Infrastructure & Operations
Info-Tech Research Group
Strive for proactivity. Implement event management to reduce response times of technical teams to solve (potential) incidents when system performance degrades.
Build an integrated event management practice where developers, service desk, and operations can all rely on event logs and metrics.
Define the scope of event management including the systems to track, their operational conditions, related configuration items (CIs), and associated actions of the tracked events.
Managed services, subscription services, and cloud services have reduced the traditional visibility of on- premises tools.
System(s) complexity and integration with the above services has increased, making true cause and effect difficult to ascertain.
Clearly define a limited number of operational objectives that may benefit from event management.
Focus only on the key systems whose value is worth the effort and expense of implementing event management.
Understand what event information is available from the CIs of those systems and map those against your operational objectives.
Write a data retention policy that balances operational, audit, and debugging needs against cost and data security needs.
More is NOT better. Even in an AI-enabled world, every event must be collected with a specific objective in mind. Defining the purpose of each tracked event will cut down on data clutter and response time when events are detected.
In 2020, 33% of organizations listed network monitoring as their number one priority for network spending. 27% of organizations listed network monitoring infrastructure as their number two priority.
Source: EMA, 2020; n=350
33% of all IT organizations reported that end users detected and reported incidents before the network operations team was aware of them.
Source: EMA, 2020; n=350
64% of enterprises use 4-10 monitoring tools to troubleshoot their network.
Source: EMA, 2020; n=350
Define how event management informs other management practices.
Monitoring and event management can be used to establish and analyze your baseline. The more you know about your system baselines, the easier it will be to detect exceptions.
Events can inform needed changes to stay compliant or to resolve incidents and problems. However, it doesn’t mean that changes can be implemented without the proper authorization.
The best use case for event management is to detect and resolve incidents and problems before end users or IT are even aware.
Events sitting in isolation are useless if there isn’t an effective way to pass potential tickets off to incident management to mitigate and resolve.
Events can identify problems before they become incidents. However, you must establish proper data logging to inform problem prioritization and actioning.
| 1. Situate Event Management in Your Service Management Environment | 2. Define Your Monitoring Thresholds and Accompanying Actions | 3. Start Monitoring and Implement Event Management | |
|
Phase Steps |
1.1 Set Operational and Informational Goals 1.2 Scope Monitoring and States of Interest |
2.1 Define Conditions and Related CIs 2.2 Set Monitoring Thresholds and Alerts 2.3 Action Your Events |
3.1 Define Your Data Policy 3.2 Define Future State |
|
Event Cookbook Event Catalog |
|||
|
Phase Outcomes |
Monitoring and Event Management RACI Abbreviated BIA |
Event Workflow |
Event Management Roadmap |
The goals come from the pain points of other ITSM practices. Build handoffs to other service management practices to drive the proper action when an event is detected.
Trying to organize a catalog of events is difficult when working from the bottom up. Start with the business drivers of event management to keep the scope manageable.
Defining tracked events with their known conditions, root cause, and associated actions allows you to be proactive when events occur.
Start small if need be. It is better and easier to track a few items with proper actions than to try to analyze events as they occur.
Even in an AI-enabled world, every event must be collected with a specific objective in mind. Defining the purpose of each tracked event will cut down on data clutter and response time when events are detected.
Supplement the predictive value of a single event by aggregating it with other events.
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Event Management Cookbook
Use the framework in the Event Management Cookbook to populate your event catalog with properly tracked and actioned events.
Event Management RACI
Define the roles and responsibilities needed in event management.
Event Management Workflow
Define the lifecycle and handoffs for event management.
Event Catalog
Consolidate and organize your tracked events.
Event Roadmap
Roadmap your initiatives for future improvement.
INDUSTRY - Research and Advisory
SOURCE - Anonymous Interview
One staff member’s workstation had been infected with a virus that was probing the network with a wide variety of usernames and passwords, trying to find an entry point. Along with the obvious security threat, there existed the more mundane concern that workers occasionally found themselves locked out of their machine and needed to contact the service desk to regain access.
The system administrator wrote a script that runs hourly to see if there is a problem with an individual’s workstation. The script records the computer's name, the user involved, the reason for the password lockout, and the number of bad login attempts. If the IT technician on duty notices a greater than normal volume of bad password attempts coming from a single account, they will reach out to the account holder and inquire about potential issues.
The IT department has successfully proactively managed two distinct but related problems: first, they have prevented several instances of unplanned work by reaching out to potential lockouts before they receive an incident report. They have also successfully leveraged event management to probe for indicators of a security threat before there is a breach.
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| Phase 1 | Phase 2 | Phase 3 |
|---|
|
Call #1: Scope requirements, objectives, and your specific challenges. |
Call #2: Introduce the Cookbook and explore the business impact analysis. |
Call #4: Define operational conditions. |
Call #6: Define actions and related practices. |
Call #8: Identify and prioritize improvements. |
|
Call #3: Define system scope and related CIs/ dependencies. |
Call #5: Define thresholds and alerts. |
Call #7: Define data policy. |
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is between 6 to 12 calls over the course of 4 to 6 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
|---|---|---|---|---|---|
| Situate Event Management in Your Service Management Environment | Define Your Event Management Scope | Define Thresholds and Actions | Start Monitoring and Implement Event Management | Next Steps and Wrap-Up (offsite) | |
|
Activities |
1.1 3.1 Set Thresholds to Monitor 3.2 Add Actions and Handoffs to Event Management Introductions 1.2 Operational and Informational Goals and Challenges 1.3 Event Management Scope 1.4 Roles and Responsibilities |
2.1 Define Operational Conditions for Systems 2.2 Define Related CIs and Dependencies 2.3 Define Conditions for CIs 2.4 Perform Root-Cause Analysis for Complex Condition Relationships 2.4 Set Thresholds for CIs |
3.1 Set Thresholds to Monitor 3.2 Add Actions and Handoffs to Event Management |
4.1 Define Your Data Policy for Event Management 4.2 Identify Areas for Improvement and Future Steps 4.3 Summarize Workshop |
5.1 Complete In-Progress Deliverables From Previous Four Days 5.2 Set Up Review Time for Workshop Deliverables and to Discuss Next Steps |
| Deliverables |
|
|
|
|
|
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
|
1.1 Set Operational and Informational Goals |
2.1 Define Conditions and Related CIs |
3.1 Define Your Data Policy |
Engineer Your Event Management Process
1.1.1 List your goals and challenges
1.1.2 Build a RACI chart for event management
1.2.1 Set your scope using business impact
Infrastructure management team
IT managers
1.1.1 List your goals and challenges
1.1.2 Build a RACI chart for event management
Set the overall scope of event management by defining the governing goals. You will also define who is involved in event management as well as their responsibilities.
Infrastructure management team
IT managers
Define the goals and challenges of event management as well as their data proxies.
Have a RACI matrix to define roles and responsibilities in event management.
Event management needs to interact with the following service management practices:
Event management may log real-time data for operational goals and non-real time data for informational goals
|
Event Management |
||||
|---|---|---|---|---|
|
Operational Goals (real-time) |
Informational Goals (non-real time) |
|||
|
Incident Response & Prevention |
Availability Scaling |
Availability Scaling |
Modeling and Testing |
Investigation/ Compliance |
Gather a diverse group of IT staff in a room with a whiteboard.
Have each participant write down their top five specific outcomes they want from improved event management.
Consolidate similar ideas.
Prioritize the goals.
Record these goals in your Event Management Cookbook.
| Priority | Example Goals |
|---|---|
| 1 | Reduce response time for incidents |
| 2 | Improve audit compliance |
| 3 | Improve risk analysis |
| 4 | Improve forecasting for resource acquisition |
| 5 | More accurate RCAs |
The infrastructure team is accountable for deciding which events to track, how to track, and how to action the events when detected.
The service desk may respond to events that are indicative of incidents. Setting a root cause for events allows for quicker troubleshooting, diagnosis, and resolution of the incident.
Problem and change management may be involved with certain event alerts as the resultant action could be to investigate the root cause of the alert (problem management) or build and approve a change to resolve the problem (change management).
Download the Event Management Cookbook
| Event Management Task | IT Manager | SME | IT Infrastructure Manager | Service Desk | Configuration Manager | (Event Monitoring System) | Change Manager | Problem Manager |
| Defining systems and configuration items to monitor | R | C | AR | R | ||||
| Defining states of operation | R | C | AR | C | ||||
| Defining event and event thresholds to monitor | R | C | AR | I | I | |||
| Actioning event thresholds: Log | A | R | ||||||
| Actioning event thresholds: Monitor | I | R | A | R | ||||
| Actioning event thresholds: Submit incident/change/problem ticket | R | R | A | R | R | I | I | |
| Close alert for resolved issues | AR | RC | RC | |||||
1.2.1 Set your scope using business impact
Situate Event Management in Your Service Management Environment
Tracking too many events across too many tools could decrease your responsiveness to incidents. Start tracking only what is actionable to keep the signal-to-noise ratio of events as high as possible.
11 Tools: 52">
Source: Riverbed, 2016
| Systems/Services/Applications | Tier | |
|---|---|---|
| 1 | Core Infrastructure | Gold |
| 2 | Internet Access | Gold |
| 3 | Public-Facing Website | Gold |
| 4 | ERP | Silver |
| … | ||
| 15 | PaperSave | Bronze |
It might be tempting to jump ahead and preselect important applications. However, even if an application is not on the top 10 list, it may have cross-dependencies that make it more valuable than originally thought.
For a more comprehensive BIA, see Create a Right-Sized Disaster Recovery Plan
Download the Event Management Cookbook
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
1.1 Set Operational and Informational Goals | 2.1 Define Conditions and Related CIs | 3.1 Define Your Data Policy |
Engineer Your Event Management Process
2.1.1 Define performance conditions
2.1.2 Decompose services into related CIs
For each monitored system, define the conditions of interest and related CIs.
Business system owners
Infrastructure manager
IT managers
List of conditions of interest and related CIs for each monitored system.
2.2.1 Verify your CI conditions with a root-cause analysis
2.2.2 Set thresholds for your events
Set monitoring thresholds for each CI related to each condition of interest.
Business system managers
Infrastructure manager
IT managers
Service desk manager
List of events to track along with their root cause.
Separate the serious from trivial to keep the signal-to-noise ratio high.
You must set your own monitoring criteria based on operational needs. Events triggering an action should be reviewed via an assessment of the potential project and associated risks.
Examples:
Web sever – how many pages per minute
Network – Mbps
Storage – I/O read/writes per sec
Web Server – page load failures
Network – packets dropped
Storage – disk errors
Web Server – % load
Network – % utilization
Storage – % full
RCAs postulate why systems go down; use the RCA to inform yourself of the events leading up to the system going down.
| Dependency | CIs | Tool | Metrics |
|---|---|---|---|
| ISP | WAN | SNMP Traps | Latency |
| Telemetry | Packet Loss | ||
| SNMP Pooling | Jitter | ||
| Network Performance | Web Server | Response Time | |
| Connection Stage Errors | |||
| Web Server | Web Page | DOM Load Time | |
| Performance | |||
| Page Load Time | |||
At the end of the day, most of us can only monitor what our systems let us. Some (like Exchange Servers) offer a crippling number of parameters to choose from. Other (like MPLS) connections are opaque black boxes giving up only the barest of information. The metrics you choose are largely governed by the art of the possible.
Exhaustive RCAs proved that 54% of issues were not caused by storage.
INDUSTRY - Enterprise IT
SOURCE - ESG, 2017
Despite a laser focus on building nothing but all-flash storage arrays, Nimble continued to field a dizzying number of support calls.
Variability and complexity across infrastructure, applications, and configurations – each customer install being ever so slightly different – meant that the problem of customer downtime seemed inescapable.
Nimble embedded thousands of sensors into its arrays, both at a hardware level and in the code. Thousands of sensors per array multiplied by 7,500 customers meant millions of data points per second.
This data was then analyzed against 12,000 anonymized app-data gap-related incidents.
Patterns began to emerge, ones that persisted across complex customer/array/configuration combinations.
These patterns were turned into signatures, then acted on.
54% of app-data gap related incidents were in fact related to non-storage factors! Sub-optimal configuration, bad practices, poor integration with other systems, and even VM or hosts were at the root cause of over half of reported incidents.
Establishing that your system is working fine is more than IT best practice – by quickly eliminating potential options the right team can get working on the right system faster thus restoring the service more quickly.
Event data determined to be of minimal predictive value is shunted aside.
De-duplication and combination of similar events to trigger a response based on the number or value of events, rather than for individual events.
Ignoring events that occur downstream of a known failed system. Relies on accurate models of system relationships.
Initiating the appropriate response. This could be simple logging, any of the exception event responses, an alert requiring human intervention, or a pre-programmed script.
If the event management team toggles the threshold for an alert too low (e.g. one is generated every time a CPU load reaches 60% capacity), they will generate too many false positives and create far too much work for themselves, generating alert fatigue. If they go the other direction and set their thresholds too high, there will be too many false negatives – problems will slip through and cause future disruptions.
| Dependency | Metrics | Threshold |
| Network Performance | Latency | 150ms |
| Packet Loss | 10% | |
| Jitter | >1ms | |
| Web Server | Response Time | 750ms |
| Performance | ||
| Connection Stage Errors | 2 | |
| Web Page Performance | DOM Load time | 1100ms |
| Page Load time | 1200ms | |
2.3.1 Set actions for your thresholds
2.3.2 Build your event management workflow
With your list of tracked events from the previous step, build associated actions and define the handoff from event management to related practices.
Event management team
Infrastructure team
Change manager
Problem manager
Incident manager
Event management workflow
For informational alerts, log the event for future analysis.
For a warning or exception event or a set of events with a well-known root cause, you may have an automated resolution tied to detection.
For warnings and exceptions, human intervention may be needed. This could include manual monitoring or a handoff to incident, change, or problem management.
| Outcome | Metrics | Threshold | Response (s) | |
|---|---|---|---|---|
| Network Performance | Latency | 150ms | Problem Management | Tag to Problem Ticket 1701 |
| Web Page Performance | DOM Load time | 1100ms | Change Management | |
Download the Event Management Catalog
|
Data Fields |
|
|---|---|
|
Device |
Date/time |
|
Component |
Parameters in exception |
|
Type of failure |
Value |
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
1.1 Set Operational and Informational Goals | 2.1 Define Conditions and Related CIs | 3.1 Define Your Data Policy |
3.1.1 Define data policy needs
3.2.1 Build your roadmap
Business system owners
Infrastructure manager
IT managers
Activities
3.1.1 Define data policy needs
Your overall goals from Phase 1 will help define your data retention needs. Document these policy statements in a data policy.
CIO
Infrastructure manager
IT managers
Service desk manager
Outcomes of this step
Data retention policy statements for event management
|
Logs |
Metrics |
||
|---|---|---|---|
|
A log is a complete record of events from a period:
|
Missing entries in logs can be just as telling as the values existing in other entries. | A metric is a numeric value that gives information about a system, generally over a time series. | Adjusting the time series allows different views of the data. |
|
Logs are generally internal constructs to a system:
|
Completeness and context make logs excellent for:
|
As a time series, metrics operate predictably and consistently regardless of system activity. |
This independence makes them ideal for:
|
|
Large amounts of log data can make it difficult to:
|
Context insensitivity means we can apply the same metric to dissimilar systems:
|
||
Source: SolarWinds
| Security | Logs may contain sensitive information. Best practice is to ensure logs are secure at rest and in transit. Tailor your security protocol to your compliance regulations (PCI, etc.). |
|---|---|
| Architecture and Availability | When production infrastructure goes down, logging tends to go down as well. Holes in your data stream make it much more difficult to determine root causes of incidents. An independent secondary architecture helps solve problems when your primary is offline. At the very least, system agents should be able to buffer data until the pipeline is back online. |
| Performance | Log data grows: organically with the rest of the enterprise and geometrically in the event of a major incident. Your infrastructure design needs to support peak loads to prevent it from being overwhelmed when you need it the most. |
| Access Control | Events have value for multiple process owners in your enterprise. You need to enable access but also ensure data consistency as each group performs their own analysis on the data. |
| Retention | Near-real time data is valuable operationally; historic data is valuable strategically. Find a balance between the two, keeping in mind your obligations under compliance frameworks (GDPR, etc.). |
| Metrics/Log | Retention Period | Data Sensitivity | Data Rate |
|---|---|---|---|
| Latency | 150ms | No | |
| Packet Loss | 10% | No | |
| Jitter | >1ms | No | |
| Response Time | 750ms | No | |
| HAProxy Log | 7 days | Yes | 3GB/day |
| DOM Load time | 1100ms | ||
| Page Load time | 1200ms | ||
| User Access | 3 years | Yes |
Download the Event Management Catalog
3.2.1 Build your roadmap
Event management maturity is slowly built over time. Define your future actions in a roadmap to stay on track.
CIO
Infrastructure manager
IT managers
Event management roadmap and action items
Engineer your event management practice to be predictive. For example:
If the expected consequence is not observed there are three places to look:
While impractical to look at every action resulting from an alert, a regular review process will help improve your process. Effective alerts are crafted with specific and measurable outcomes.
False positives are worse than missed positives as they undermine confidence in the entire process from stakeholders and operators. If you need a starting point, action your false positives first.
Mind Your Event Management Errors
Source: IEEE Communications Magazine March 2012
You now have several core systems, their CIs, conditions, and their related events listed in the Event Catalog. Keep the Catalog as your single reference point to help manage your tracked events across multiple tools.
The Event Management Cookbook is designed to be used over and over. Keep your tracked events standard by running through the steps in the Cookbook.
An additional step you could take is to pull the Cookbook out for event tracking for each new system added to your IT environment. Adding events in the Catalog during application onboarding is a good way to manage and measure configuration.
Use the framework in the Event Management Cookbook to populate your event catalog with properly tracked and actioned events.
Add the following in-scope goals for future improvement. Include owner, timeline, progress, and priority.
You now have a structured event management process with a start on a properly tracked and actioned event catalog. This will help you detect incidents before they become incidents, changes needed to the IT environment, and problems before they spread.
Continue to use the Event Management Cookbook to add new monitored events to your Event Catalog. This ensures future events will be held to the same or better standard, which allows you to avoid drowning in too much data.
Lastly, stay on track and continually mature your event management practice using your Event Management Roadmap.
Contact your account representative for more information
workshops@infotech.com
1-888-670-8889
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.
To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
The following are sample activities that will be conducted by Info-Tech analysts with your team:
Define and document the roles and responsibilities in event management.
Define and prioritize in-scope systems and services for event management.
Improve customer service by driving consistency in your support approach and meeting SLAs.
Don’t let persistent problems govern your department
Build a service configuration management practice around the IT services that are most important to the organization.
DeMattia, Adam. “Assessing the Financial Impact of HPE InfoSight Predictive Analytics.” ESG, Softchoice, Sept. 2017. Web.
Hale, Brad. “Estimating Log Generation for Security Information Event and Log Management.” SolarWinds, n.d. Web.
Ho, Cheng-Yuan, et al. “Statistical Analysis of False Positives and False Negatives from Real Traffic with Intrusion Detection/Prevention Systems.” IEEE Communications Magazine, vol. 50, no. 3, 2012, pp. 146-154.
ITIL Foundation ITIL 4 Edition = ITIL 4. The Stationery Office, 2019.
McGillicuddy, Shamus. “EMA: Network Management Megatrends 2016.” Riverbed, April 2016. Web.
McGillicuddy, Shamus. “Network Management Megatrends 2020.” Enterprise Management Associates, APCON, 2020. Web.
Rivas, Genesis. “Event Management: Everything You Need to Know about This ITIL Process.” GB Advisors, 22 Feb. 2021. Web.
“Service Operations Processes.” ITIL Version 3 Chapters, 21 May 2010. Web.
Healthcare cybersecurity is a major concern for healthcare organizations and patients alike. In 2024, the healthcare industry faces several cybersecurity challenges, including the growing threat of ransomware, the increasing use of mobile devices in healthcare, and the need to comply with new regulations.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
A step-by-step approach to walk you through understanding your current state related to accessibility maturity, identifying your desired future state, and building your business case to seek buy-in. This storyboard will help you figure out what’s right for your organization and build the accessibility business case for IT.
The business case for accessibility is strong. Use this template to communicate to senior leaders the benefits, challenges, and risks of inaction.
This tool uses a capability maturity model framework to evaluate your current state of accessibility. Maturity level is assessed on three interconnected aspects (people, process, and technology) across six dimensions proven to impact accessibility. Complete the assessment to get recommendations based on where you’re at.
Accessibility is important for individuals, businesses, and society. Diverse populations need diverse access, and it’s essential to provide access and opportunity to everyone, including people with diverse abilities. In fact, access to information and communications technologies (ICT) is a basic human right according to the United Nations.
The benefits of ICT accessibility go beyond compliance. Many innovations that we use in everyday life, such as voice activation, began as accessibility initiatives and ended up creating a better lived experience for everyone. Accessibility can improve user experience and satisfaction, and it can enhance your brand, drive innovation, and extend your market reach (WAI, 2022).
Although your organization might be required by law to ensure accessibility, understanding your users’ needs and incorporating them into your processes early will determine success beyond just compliance.
Heather Leier-Murray
Senior Research Analyst, People and Leadership
Info-Tech Research Group
| Your Challenge | Common Obstacles | Info-Tech’s Approach |
|
Global IT and business leaders are challenged to make digital products and services accessible because inaccessibility comes with increasing risk to brand reputation, legal ramifications, and constrained market reach.
|
Understanding where to start, where accessibility lives, and if or when you’re done can be overwhelmingly difficult.
Conventional approaches to accessibility often fail because users are expected to do the hard work. You have to be doing 80% of the hard work.1 |
Use Info-Tech’s research and resources to do what’s right for your organization. This framework takes away the overwhelm that many feel when they hear “accessibility” and makes the steps for your organization approachable.
|
1. Harvard Business Review, 2021
Info-Tech Insight
The longer you put off accessibility, the more tech debt you accumulate and the more you risk losing access to new and existing markets. The longer you wait to adopt standards and best practices, the more interest you’ll accumulate on accessibility barriers and costs for remediation.
The cost of inaction related to accessibility is rising. Preparing for accessibility earlier helps prevent tech debt; the longer you wait to address your accessibility obligations, the more costly it gets.
More than 3,500 digital accessibility lawsuits were filed in the US in 2020, up more than 50% from 2018.
Source: UsableNet. Inc.
These barriers make accessibility difficult to address for many organizations:
1. Smashing Magazine
2. Harvard Business Review, 2021
90% of companies claim to prioritize diversity.
Source: Harvard Business Review, 2020
Only 4% of those that claim to prioritize diversity consider disability in those initiatives.
Source: Harvard Business Review, 2020
WCAG (Web Content Accessibility Guidelines) identifies four principles of accessibility. WCAG is the most referenced standard in website accessibility lawsuits.
Source: eSSENTIAL Accessibility, 2022
Top three reasons:
| 61% | 62% | 78% |
|---|---|---|
| To comply with laws | To provide the best UX | To include people with disabilities |
Source: Level Access
Still, most businesses aren’t meeting compliance standards. Even though legislation has been in place for over 30 years, a 2022 study by WebAIM of 1,000,000 homepages returned a 96.8% WCAG 2.0 failure rate.
Source: Institute for Disability Research, Policy, and Practice
43% rated it as a top priority.
36% rated it as important.
Fewer than 5% rated as either low priority or not even on the radar.
More than 65% agreed or strongly agreed it’s a higher priority than last year.
Source: Angel Business Communications
Source: Statistics Canada
Merriam-Webster defines disability as a “physical, mental, cognitive, or developmental condition that impairs, interferes with, or limits a person’s ability to engage in certain tasks or actions or participate in typical daily activities and interactions.”1
The World Health Organization (WHO) points out that a crucial part of the definition of disability is that it’s not just a health problem, but the environment impacts the experience and extent of disability. Inaccessibility creates barriers for full participation in society.2
The likelihood of you experiencing a disability at some point in your life is very high, whether a physical or mental disability, seen or unseen, temporary or permanent, severe or mild.2
Many people acquire disabilities as they age yet may not identify as “a person with a disability.”3 Where life expectancies are over 70 years of age, 11.5% of life is spent living with a disability. 4
“Extreme personalization is becoming the primary difference in business success, and everyone wants to be a stakeholder in a company that provides processes, products, and services to employees and customers with equitable, person-centered experiences and allows for full participation where no one is left out.”
– Paudie Healy, CEO, Universal Access
1. Merriam-Webster
2. World Health Organization
3. Digital Leaders, as cited in WAI, 2018
4. Disabled World, as cited in WAI, 2018
Common myths about people with disabilities:
These assumptions prevent organizations from hiring valuable people into the workforce and retaining them.
Source: Forbes
50% to 70% of people with disabilities are unemployed in industrialized countries. In the US alone, 61 million adults have a disability.
Source: United Nations, as cited in Forbes
| 1. Understand Current State | 2. Plan for Buy-in | 3. Prepare Your Business Case | |
| Phase Steps |
|
|
|
| Phase Outcomes |
|
|
|
| Insight 1 | The longer you put off accessibility, the more tech debt you accumulate and the more you risk losing access to new and existing markets. The longer you wait to adopt standards and best practices, the more interest you’ll accumulate on accessibility barriers and costs for remediation. | |
| Insight 2 | Implementing accessibility feels counterintuitive to IT departments. IT always wants to optimize and move forward, but with accessibility you may stay at one level for what feels like an uncomfortably long period. Don’t worry; building consistency and shifting culture takes time. | |
| Insight 3 | Accessibility goes beyond compliance, which should be an outcome, not the objective. With 1 billion people worldwide with some form of disability, nearly everyone likely has a connection to disability, whether it be in themselves, family, or colleagues. The market of people with disabilities has a spending power of more than $6 trillion.1 |
1. WAI, 2018
This blueprint is accompanied by supporting deliverables to help you accomplish your goals.
Accessibility Business Case Template
The business case for accessibility is strong. Use this template to communicate to senior leaders the benefits and challenges of accessibility and the risks of inaction.
Accessibility Maturity Assessment
Use this assessment to understand your current accessibility maturity.
| Business Benefits | IT Benefits |
|---|---|
|
|
In phase 2 of this blueprint, we will help you establish current-state and target-state metrics for your organization.
Suggested Metrics
Overall end-customer satisfaction
Monies saved through cost optimization efforts
Employee engagement
Monies save through application rationalization and standardization
For more metrics ideas, see the Info-Tech IT Metrics Library.
INDUSTRY
Technology
SOURCE
W3C Web Accessibility Initiative (WAI), 2018
Investing in accessibility
With an innovative edge, Google invests in accessibility with the objective of making life easier for everyone. Google has created a broad array of accessibility innovations in its products and services so that people with disabilities get as much out of them as anyone else.
Part of Google’s core mission, accessibility means more to Google than implementing fixes. It is viewed positively by the organization and drives it to be more innovative to make information available to everyone. Google approaches accessibility problems not as barriers but as ways to innovate and discover breakthroughs that will become mainstream in the future.
Results
Among Google’s innovations are contrast minimums, auto-complete, voice-control, AI advances, and machine learning auto-captioning. All of these were created for accessibility purposes but have positively impacted the user experience in general for Google.
| DIY Toolkit | Guided Implementation | Workshop | Consulting |
|---|---|---|---|
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Diagnostics and consistent frameworks are used throughout all four options.
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 4 to 6 calls over the course of 2 to 4 months.
| Phase 1 | Phase 2 | Phase 3 |
|---|---|---|
|
Call #1: Discuss motivation for the initiative and foundational knowledge requirements. Call #2: Discuss next steps to assess current accessibility maturity. |
Call #3: Discuss stakeholder engagement and future-state analysis. Call #4: Discuss defining goals and objectives, along with roles and responsibilities. |
Call #5: Review draft business case presentation. Call #6: Discuss post-approval steps and timelines. |
Phase 1
1.1 Understand standards and legislation
1.2 Build awareness
1.3 Understand maturity level
Phase 2
2.1 Define desired future state
2.2 Define goals and objectives
2.3 Document roles and responsibilities
Phase 3
3.1 Prepare business case template for presentation and approval
3.2 Validate post-approval steps and establish timelines
The Accessibility Business Case for IT
This phase will walk you through the following activities:
Activities
1.1.1 Make a list of the legislation you need to comply with
1.1.2 Seek legal and/or professional services’ input on compliance
1.1.3 Detail the risks of inaction for your organization
Understand Your Current State
Outcomes of this step
You will gain foundational understanding of the breadth of the regulation requirements for your organization. You will have reviewed and understand what is applicable to your organization.
Canada
Europe
United States
New Zealand
Australia
Regulatory systems are moving toward an international standard.
| a) | Start by looking at your local legislation. |
| b) | Then consider any other regions you conduct business in. |
| c) | Also account for the various industries you are in. |
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Accessibility Business Case Template
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Accessibility Business Case Template
Beyond the costs resulting from a claim, noncompliance can damage your organization in several ways.
|
Financial Impact ADA Warning Shot: A complaint often indicates pending legal action to come. Addressing issues on a reactive, ad hoc basis can be quite expensive. It can cost almost $10,000 to address a single complaint, and chances are if you have one complaint, you have many. Lawsuit Costs: In the US, 265,000 demand letters were sent in 2020 under the ADA for inaccessible websites. On average, a demand letter could cost the company $25,000 (conservatively). These are low-end numbers; another estimate is that a small, quickly settled digital accessibility lawsuit could cost upwards of $350,000 for the defendant. |
Non-Financial Impact Reputational Impact: Claims brought upon a company can bring negative publicity with them. In contrast, having a clear commitment to accessibility demonstrates inclusion and can enhance brand image and reputation. Stakeholder expectations are changing, and consumers, investors, and employees alike want to support businesses with a purpose. Technology Resource Strains: Costly workarounds and ad hoc accommodation processes take away from efficiency and effectiveness. Updates and redesigns for accessibility and best practices will reduce costs associated with maintenance and service, including overall stakeholder satisfaction improvements. Access to Talent: 2022 saw a record high number of job openings, over 11.4 million in the US alone. Ongoing labor shortages require eliminating bias and keeping an open mind about who is qualified. |
Source: May Hopewell
In the last four years, 83% of the retail 500 have been sued. Since 2018, 417 of the top 500 have received ADA-based digital lawsuits.
Source: UsableNet
| a) | Consider legal risks, consumer risks, brand risks, and employee risks. (Remember, risks aren’t just monetary.) |
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Accessibility Business Case Template
Activities
1.2.1 Identify gaps in understanding
1.2.2 Brainstorm how to reframe accessibility positively
Understand Your Current State
Outcomes of this step
You’ll have a better understanding of accessibility so that you can effectively implement and promote it.
First-hand experience of how people with disabilities interact with your organization is often eye-opening. It will help you understand the benefits and value of accessibility.
Where to look for understanding
Source: WAI, 2016
* Remember, people with disabilities aren't obligated to discuss or explain their disabilities and may not be comfortable sharing. If you're asking for their time, be respectful, only ask if appropriate, and accept a "no" answer if the person doesn't wish to assist.
Find out what accessibility is and why it is important. Learn the basics.
| a) | What is accessibility? Why is it important? |
| b) | From the legislation and standards identified in step 1.1, what gaps exist? |
| c) | What is the definition of disability? |
| d) | How does your organization currently address accessibility? |
| e) | What are your risks? |
| f) | Do you have any current employees who have disabilities? |
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Accessibility Business Case Template
A clear understanding of accessibility and the related standards and regulations can turn accessibility from something big and scary to an achievable part of the business.
The benefits of accessibility are:
| Market Reach | Minimized Legal Risks | Innovation | Retention |
|---|---|---|---|
| Over 1 billion people with a spending power of $6 trillion make up the global market of people with disabilities.1 Accessibility improves the experience for all users. In addition, many organizations require you to provide proof you meet accessibility standards during the RFP process. | Accessibility regulations are changing, and claims are rising. Costs associated with legal proceedings can be more than just financial. Many countries have laws you need to follow. | People with disabilities bring diversity of thought, have different lived experiences, and benefit inclusivity, which helps drive engagement. Plus accessibility features often solve unanticipated problems. | Employing and supporting people with disabilities can reduce turnover and improve retention, reliability, company image, employee loyalty, ability awareness, and more. |
Source 1: WAI, 2018
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Accessibility Business Case Template
A first step to disability and accessibility awareness is to talk about it. When it is talked about as freely as other things are in the workplace, this can create a more welcoming workplace.
Accessibility goes beyond physical access and includes technological access and support as well as our attitudes.
Accessibility is making sure everyone (disabled or abled) can access the workplace equally.
Adjustments in the workplace are necessary to create an accessible and welcoming environment. Understanding the three dimensions of accessibility in the workplace is a good place to start.
Source: May Hopewell
Three dimensions of accessibility in the workplace
INDUSTRY
Professional Services
SOURCE
Accenture
Accenture takes an inclusive approach to increase accessibility.
|
Accessibility is more than tools Employee experience was the focus of embarking on the accessibility journey, ensuring inclusivity was built in and every employee was able to use the tools they needed and could achieve their goals. "We are removing barriers in technology to make all of our employees, regardless of their ability, more productive.” |
Accessibility is inclusive The journey began with formalizing a Global IT Accessibility practice and defining an accessibility program charter. This provided direction and underpinned the strategy used to create a virtual Accessibility Center of Excellence and map out a multiyear plan of initiatives. The team then identified all the technologies they wanted to enhance by prioritizing ones that were high use and high impact. Involving disability champions gave insight into focus areas. |
Accessibility is innovation Working with partners like Microsoft and over 100 employees, Accenture continues toward the goal of 75% accessibility for all its global high-traffic internal platforms. Achievements thus far include:
|
Activities
1.3.1 Complete the Accessibility Maturity Assessment
Understand Your Current State
Outcomes of this step
Completed Accessibility Maturity Assessment to inform planning for and building your business case in Phases 2 and 3.
Accessibility Maturity
People
Process
Technology
| INITIAL | DEVELOPING | DEFINED | MANAGED | OPTIMIZE |
|---|---|---|---|---|
| At this level, accessibility processes are mostly undocumented, if they exist. Accessibility is most likely happening on a reactive, ad hoc basis. No one understands who is responsible for accessibility or what their role is. At this stage the organization is driven by the need for compliance. | At the developing level, the organization is taking steps to increase accessibility but still has a lot of opportunity for improvements. The organization is defining and refining processes and is working toward building a library of assistive tools. | At this level, processes related to accessibility are repeatable. However, there’s a tendency to resort to old habits under stress. The organization has tools in place to facilitate accommodation requests and technology is compatible with assistive technologies. Accessibility initiatives are driven by the desire to make the user experience better. | The managed level is defined by its effective accessibility controls, processes, and metrics. The organization can mostly anticipate preferences of customers, employees, and users. The roles and responsibilities are defined, and disability is included as part of the organization’s diversity, equity, and inclusion (DEI) initiatives. | This level is not the goal for all organizations. At this level there is a shift in the organization’s culture to a feeling of belonging. The organization also demonstrates ongoing process improvements. Everyone can experience a seamless interaction with the organization. The focus is on continuous improvement and using feedback to inform future initiatives. |
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Accessibility Business Case Template
Phase 1
1.1 Understand standards and legislation
1.2 Build awareness
1.3 Understand maturity level
Phase 2
2.1 Define desired future state
2.2 Define goals and objectives
2.3 Document roles and responsibilities
Phase 3
3.1 Prepare business case template for presentation and approval
3.2 Validate post-approval steps and establish timelines
The Accessibility Business Case for IT
This phase will walk you through the following activities:
This phase involves the following participants:
Activities
2.1.1 Identify key stakeholders
2.1.2 Hold a key stakeholder focus group
2.1.3 Conduct a future-state analysis
Outcomes of this step
Following this step, you will have identified your aspirational maturity level and what your accessibility future state looks like for your organization.
Plan for Senior Leader Buy-In
Ask stakeholders, “Who else should I be talking to?” to discover additional stakeholders and ensure you don’t miss anyone.
| Identify stakeholders through the following questions: |
|---|
|
| Take a 360-degree view of potential internal and external stakeholders who might be impacted by the initiative. |
|---|
|
A stakeholder prioritization map helps teams categorize their stakeholders by their level of influence and ownership.
There are four areas in the map, and the stakeholders within each area should be treated differently.
Players – Players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.
Mediators – Mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.
Noisemakers – Noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.
Spectators – Generally, spectators are apathetic and have little influence over or interest in the initiative.
Each group of stakeholders draws attention and resources away from critical tasks.
By properly identifying your stakeholder groups, you can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers while ensuring the needs of the Mediators and Players are met.
| Type | Quadrant | Actions |
|---|---|---|
| Players | High influence, high interest | Actively Engage Keep them engaged through continuous involvement. Maintain their interest by demonstrating their value to its success. |
| Mediators | High influence, low interest | Keep Satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust, and include them in important decision-making steps. In turn, they can help you influence other stakeholders. |
| Noisemakers | Low influence, high interest | Keep Informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them. |
| Spectators | Low influence, low interest | Monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates. |
Collect this information by:
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Involve key stakeholders to determine the organizational drivers of accessibility, identify target maturity and key performance indicators (KPIs), and ultimately build the project charter.
Building the project charter as a group will help you to clarify your key messages and secure buy-in from critical stakeholders up-front, which is key.
Executing the business case for accessibility requires significant involvement from your IT leadership team. The challenge is that accessibility can be overwhelming because of inherent bias. Members of your IT leadership team will also need to participate in knowledge transfer, so get them involved up-front. The focus group will help stakeholders feel more engaged in the project, which is pivotal for success.
You may feel like a full project charter isn’t necessary, and depending on your organizational size, it might not be. However, the exercise of building the charter is important regardless. No matter your current climate, some level of socializing the value of and plans for accessibility will be necessary.
Meeting Agenda
Identify the pain points you want to resolve and some of the benefits that you’d like to see from a program. By doing so, you’ll get a holistic view of what you need to achieve and what your drivers are.
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
The Info-Tech Accessibility Maturity Framework identifies three key strategic drivers: compliance, experience, and incorporation.
Even though 90% of companies claim to prioritize diversity,1 over 30% are focused on compliance.2
1. Harvard Business Review, 2020
2. Harvard Business Review, 2022
31.6% of companies remain in the Compliant stage, where they are focused on DEI compliance and not on integrating DEI throughout the organization or on creating continual improvement.
Source: Harvard Business Review, 2022
Although there will be various motivating factors, aligning the drivers of your accessibility program provides direction to the program. Connecting the advantages of program drivers to organizational goals builds the confidence of senior leaders and decision makers, increasing the continued commitment to invest in accessibility programming.
| Drivers | Compliance | Experience | Incorporation | ||
|---|---|---|---|---|---|
| Maturity level | Initial | Developing | Defined | Managed | Optimized |
| Description | Any accessibility initiative is to comply with the minimum legislated requirement. Desire to avoid/decrease legal risk. | Accessibility initiatives are focused on improving the experience of everyone from the start. Most organizations will be experience driven. Desire to increase accessibility and engagement. | Accessibility is a seamless part of the whole organization and initiatives are focused on impacting social issues. | ||
| Advantages | Compliance is a good starting place for accessibility. It will reduce legal risk. | Being people focused from the start of processes enables the organization to reduce tech debt, provide the best user experience, and realize other benefits of accessibility. | There is a sense of belonging in the organization. The entire organization experiences the benefits of accessibility. | ||
| Disadvantages | Accessibility is about more than just compliance. Being compliance driven won’t give you the full benefits of accessibility. | This can mean a culture change for the organization, which can take a long time. IT is used to moving quickly – it might feel counterintuitive to slow down and take time. | It takes much longer to reach the associated level of maturity. Not possible for all organizations. | ||
After initially ensuring your organization is compliant with regulations and standards, you will progress to building disciplined process and consistent standardized processes. Eventually you will build the ability for predictable process, and lastly, you’ll optimize by continuously improving.
Depending on the level of maturity you are trying to achieve, it could take months or even years to implement. The important thing to understand, however, is that accessibility work is never done.
At all levels of the maturity framework, you must consider the interconnected aspects of people, process, and technology. However, as the organization progresses, the impact will shift from largely being focused on process and technology improvement to being focused on people.
Info-Tech Insight
IT typically works through maturity frameworks from the bottom to the top, progressing at each level until they reach the end. When it comes to digital accessibility initiatives, being especially thorough, thoughtful, and collaborative is critical to success. This will mean spending more time in the Developing, Defined, and Managed levels of maturity rather than trying to reach Optimized as quickly as you can. This may feel contrary to what IT historically considers as a successful implementation.
| Driver | Description | Benefits | |
|---|---|---|---|
| Initial | Compliance |
|
|
| Developing | Experience |
|
|
| Defined | Experience |
|
|
| Managed | Experience |
|
|
| Optimized | Incorporation |
|
|
Identify your target state of maturity
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Accessibility Business Case Template
Accessibility as a differentiator
INDUSTRY
Financial
SOURCE
WAI-Engage
|
Accessibility inside and out As a financial provider, Barclays embarked on the accessibility journey to engage customers and employees with the goal of equal access for all. One key statement that provided focus was “Essential for some, easier for all. ” “It's about helping everyone to work, bank and live their lives regardless of their age, situation, abilities or circumstances.” |
Embedding into experiences “The Barclays Accessibility team [supports] digital teams to embed accessibility into our services and culture through effective governance, partnering, training and tools. Establishing an enterprise-wide accessibility strategy, standards and programmes coupled with senior sponsorship helps support our publicly stated ambition of becoming the most accessible and inclusive FTSE company.” – Paul Smyth, Head of Digital Accessibility, Barclays |
It’s a circle, not a roadmap
|
Activities
2.2.1 Create a list of goals and objectives
2.2.2 Finalize key metrics
Plan for Senior Leader Buy-In
Outcomes of this step
You will have clear measurable goals and objectives to respond to identified accessibility issues and organizational goals.
Use the SMART framework to build effective goals.
| S | Specific: Is the goal clear, concrete, and well defined? |
| M | Measurable: How will you know when the goal is met? |
| A | Achievable: Is the goal possible to achieve in a reasonable time? |
| R | Relevant: Does this goal align with your responsibilities and with departmental and organizational goals? |
| T | Time-based: Have you specified a time frame in which you aim to achieve the goal? |
SMART is a common framework for setting effective goals. Make sure your goals satisfy these criteria to ensure you can achieve real results.
Use the outcomes from activity 2.1.2.
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Accessibility Business Case Template
Use the outcomes from activity 2.1.2.
Baseline metrics will be improved through:
| Metric | Current | Goal |
| Overall end-customer satisfaction | 90 | 120 |
| Monies saved through cost optimization efforts | ||
| Employee engagement | ||
| Monies save through application rationalization and standardization |
For more metrics ideas, see the Info-Tech IT Metrics Library.
Finalize key metrics the organization will use to measure accessibility success
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Accessibility Business Case Template
Activities
2.3.1 Populate a RACI chart
Plan for Senior Leader Buy-In
Outcomes of this step
At the end of this step, you will have a completed RACI chart documenting the roles and responsibilities related to accessibility for your accessibility business case.
Populate a RACI chart to identify who should be responsible, accountable, consulted, and informed for each key activity.
Define who is responsible, accountable, consulted, and informed for the project team:
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Accessibility Business Case Template
Phase 1
1.1 Understand standards and legislation
1.2 Build awareness
1.3 Understand maturity level
Phase 2
2.1 Define desired future state
2.2 Define goals and objectives
2.3 Document roles and responsibilities
Phase 3
3.1 Prepare business case template for presentation and approval
3.2 Validate post-approval steps and establish timelines
The Accessibility Business Case for IT
This phase will walk you through the following activities:
This phase involves the following participants:
Source: WAI, 2018
“Many organizations are waking up to the fact that embracing accessibility leads to multiple benefits – reducing legal risks, strengthening brand presence, improving customer experience and colleague productivity.”
– Paul Smyth, Head of Digital Accessibility, Barclays
Source: WAI, 2018
Activities
3.1.1 Prepare your business case template for presentation and approval
Build Your Business Case
Outcomes of this step
Following this step, you will have a customized business case presentation that you can present to senior leaders.
Obtain approval for your accessibility program by customizing Info-Tech’s Accessibility Business Case Template, which is designed to effectively convey your key messages. Tailor the template to suit your needs.
It includes:
Info-Tech Insight
The support of senior leaders is critical to the success of your accessibility program development. Remind them of the benefits and impact and the risks associated with inaction.
Download the Accessibility Business Case Template
Now that you understand your current and desired accessibility maturity, the next step is to get sign-off to begin planning your initiatives.
Know your audience:
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Download the Accessibility Business Case Template
Activities
3.2.1 Prepare for implementation: Complete the implementation prep to-do list and assign proposed timelines
Build Your Business Case
Outcomes of this step
This step will help you gain leadership’s approval to move forward with building and implementing the accessibility program.
Complete the to-do list to ensure you are ready to move your accessibility program forward.
| To Do | Proposed Timeline |
| Reach out to your change management team for assistance. | |
| Discuss your plan with HR. | |
| Build a project team. | |
| Incorporate any necessary changes from senior leaders into your business case. | |
| [insert your own addition here] | |
| [insert your own addition here] | |
| [insert your own addition here] | |
| [insert your own addition here] |
Use the implementation prep to-do list to make sure you have gathered relevant information and completed critical steps to be ready for success.
Use the list on the previous slide to make sure you are set up for implementation success and that you’re ready to move your accessibility program forward.
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Implement and Mature Your User Experience Design Practice
Modernize Your Corporate Website to Drive Business Value
IT Diversity & Inclusion Tactics
“2021 State of Digital Accessibility.” Level Access, n.d. Accessed 10 Aug. 2022
”2022 Midyear Report: ADA Digital Accessibility Lawsuits.” UsableNet, 2022. Accessed 9 Nov. 2022
“Barclay’s Bank Case Study.” WAI-Engage, 12 Sept. 2018. Accessed 7 Nov. 2022.
Bilodeau, Howard, et al. “StatCan COVID-19 Data to Insights for a Better Canada.” Statistics Canada, 24 June 2021. Accessed 10 Aug. 2022.
Casey, Caroline. “Do Your D&I Efforts Include People With Disabilities?” Harvard Business Review, 19 March 2020. Accessed 28 July 2022.
Digitalisation World. “Organisations failing to meet digital accessibility standards.” Angel Business Communications, 19 May 2022. Accessed Oct. 2022.
“disability.” Merriam-Webster.com Dictionary, Merriam-Webster, https://www.merriam-webster.com/dictionary/disability. Accessed 10 Aug. 2022.
“Disability.” World Health Organization, 2022. Accessed 10 Aug 2022.
“Driving the Accessibility Advantage at Accenture.” Accenture, 2022. Accessed 7 Oct. 2022.
eSSENTIAL Accessibility. The Must-Have WCAG 2.1 Checklist. 2022
Hopewell, May. Accessibility in the Workplace. 2022.
“Initiate.” W3C Web Accessibility Initiative (WAI), 31 March 2016. Accessed 18 Aug. 2022.
Kalcevich, Kate, and Mike Gifford. “How to Bake Layers of Accessibility Testing Into Your Process.” Smashing Magazine, 26 April 2021. Accessed 31 Aug. 2022.
Noone, Cat. “4 Common Ways Companies Alienate People with Disabilities.” Harvard Business Review, 29 Nov. 2021. Accessed Jul. 2022.
Taylor, Jason. “A Record-Breaking Year for ADA Digital Accessibility Lawsuits.” UsableNet, 21 December 2020. Accessed Jul. 2022.
“The Business Case for Digital Accessibility.” W3C Web Accessibility Initiative (WAI), 9 Nov. 2018. Accessed 4 Aug. 2022.
“The WebAIM Million.” Web AIM, 31 March 2022. Accessed 28 Jul. 2022.
Washington, Ella F. “The Five Stages of DEI Maturity.” Harvard Business Review, November - December 2022. Accessed 7 Nov. 2022.
Wyman, Nicholas. “An Untapped Talent Resource: People With Disabilities.” Forbes, 25 Feb. 2021. Accessed 14 Sep. 2022.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Review to confirm if you are eligible for Microsoft cloud transition discounts and what is your best time to move to the cloud.
Begin with a review to understand user-based cloud licensing, then move to mapping your existing licenses to the cloud users and plans.
Use your cloud mapping activity as well your eligible discounts to estimate your cloud transition licensing costs.
Start by summarizing your choice license program, decide on the ideal time, then move on to total cost review.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand what you own and what you can transition to the cloud.
Learn which new cloud user licenses to transition.
All your licenses in one summary.
Eligible transition discounts.
Mapping of on-premises to cloud users.
1.1 Validate your discount availability.
1.2 Summarize agreements.
1.3 Itemize your current license ownership.
1.4 Review your timing options.
1.5 Map your on-premises licenses to the cloud-based, user-based model.
Current agreement summary
On-premises to cloud user mapping summary
Understanding of cloud app and plan features
Estimate cloud license costs and other associated expenses.
Summarize and decide on the best timing, users, and program.
Good cost estimate of equivalent cloud user-based licenses.
Understanding of when and how to move your on-premises licensing to the new Dynamics 365 cloud model.
2.1 Estimate cloud user license costs.
2.2 Calculate additional costs related to license transitions.
2.3 Review all activities.
2.4 Summarize and analyze your decision.
Cloud user licensing cost modeling
Summary of total costs
Validation of costs and transition choices
An informed decision on your Dyn365 timing, licensing, and costs
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Develop an effective structure for managing and supporting Database Administrators.
Build a team that is relevant to the focus of the organization.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Identify your open data program's current state maturity, and gain buy-in from the business for the program.
Identify a target state maturity and reach it through building a policy and processes and the use of metrics.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Ensure that the open data program is being driven out from the business in order to gain business support.
Identify drivers for the open data program that are coming directly from the business.
1.1 Understand constraints for the open data program.
1.2 Conduct interviews with the business to gain input on business drivers and level-set expectations.
1.3 Develop list of business drivers for open data.
Defined list of business drivers for the open data program
Understand the gaps between where your program currently is and where you want it to be.
Identify top processes for improvement in order to bring the open data program to the desired target state maturity.
2.1 Perform current state maturity assessment.
2.2 Define desired target state with business input.
2.3 Highlight gaps between current and target state.
Defined current state maturity
Identified target state maturity
List of top processes to improve in order to reach target state maturity
Develop a draft open data policy that will give you a starting point when building your policy with the community.
A draft open data policy will be developed that is based on best-practice standards.
3.1 Define the purpose of the open data policy.
3.2 Establish principles for the open data program.
3.3 Develop a rough governance outline.
3.4 Create a draft open data policy document based on industry best-practice examples.
Initial draft of open data policy
Build open data processes and identify metrics for the program in order to track benefits realization.
Formalize processes to set in place to improve the maturity of the open data program.
Identify metrics that can track the success of the open data program.
4.1 Develop the roles that will make up the open data program.
4.2 Create processes for new dataset requests, updates of existing datasets, and the retiring of datasets.
4.3 Identify metrics that will be used for measuring the success of the open data program.
Initial draft of open data processes
Established metrics for the open data program
Info-Tech’s approach to establishing and sustaining effective data governance is anchored in the strong alignment of organizational value streams and their business capabilities with key data governance dimensions and initiatives. Info-Tech's approach will help you:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Data governance is a strategic program that will help your organization control data by managing the people, processes, and information technology needed to ensure that accurate and consistent data policies exist across varying lines of the business, enabling data-driven insight. This research will provide an overview of data governance and its importance to your organization, assist in making the case and securing buy-in for data governance, identify data governance best practices and the challenges associated with them, and provide guidance on how to implement data governance best practices for a successful launch.
This workbook will help your organization understand the business and user context by leveraging your business capability map and value streams, develop data use cases using Info-Tech's framework for building data use cases, and gauge the current state of your organization's data culture.
This business needs gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organization. This template provides a framework for data requirements and a mapping methodology for creating use cases.
This tool will help your organization plan the sequence of activities, capture start dates and expected completion dates, and create a roadmap that can be effectively communicated to the organization.
Use this template to document information about key data assets such as data definition, source system, possible values, data sensitivity, data steward, and usage of the data.
This template will help get the backing required to get a data governance project rolling. The program charter will help communicate the project purpose, define the scope, and identify the project team, roles, and responsibilities.
This policy establishes uniform data governance standards and identifies the shared responsibilities for assuring the integrity of the data and that it efficiently and effectively serves the needs of your organization.
Use this exemplar to understand how to establish data governance in your organization. Follow along with the sections of the blueprint Establish Data Governance and complete the document as you progress.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify key business data assets that need to be governed.
Create a unifying vision for the data governance program.
Understand the value of data governance and how it can help the organization better leverage its data.
Gain knowledge of how data governance can benefit both IT and the business.
1.1 Establish business context, value, and scope of data governance at the organization
1.2 Introduction to Info-Tech’s data governance framework
1.3 Discuss vision and mission for data governance
1.4 Understand your business architecture, including your business capability map and value streams
1.5 Build use cases aligned to core business capabilities
Sample use cases (tied to the business capability map) and a repeatable use case framework
Vision and mission for data governance
Assess which data contains value and/or risk and determine metrics that will determine how valuable the data is to the organization.
Assess where the organization currently stands in data governance initiatives.
Determine gaps between the current and future states of the data governance program.
Gain a holistic understanding of organizational data and how it flows through business units and systems.
Identify which data should fall under the governance umbrella.
Determine a practical starting point for the program.
2.1 Understand your current data governance capabilities and maturity
2.2 Set target-state data governance capabilities
Current state of data governance maturity
Definition of target state
Determine strategic initiatives and create a roadmap outlining key steps required to get the organization to start enabling data-driven insights.
Determine timing of the initiatives.
Establish clear direction for the data governance program.
Step-by-step outline of how to create effective data governance, with true business-IT collaboration.
3.1 Evaluate and prioritize performance gaps
3.2 Develop and consolidate data governance target-state initiatives
3.3 Define the role of data governance: data domain to data governance role mapping
Target-state data governance initiatives
Data domain to data governance role mapping
Consolidate the roadmap and other strategies to determine the plan of action from Day One.
Create the required policies, procedures, and positions for data governance to be sustainable and effective.
Prioritized initiatives with dependencies mapped out.
A clearly communicated plan for data governance that will have full business backing.
4.1 Identify and prioritize next steps
4.2 Define roles and responsibilities and complete a high-level RACI
4.3 Wrap-up and discuss next steps and post-workshop support
Initialized roadmap
Initialized RACI
Data governance does not sit as an island on its own in the organization – it must align with and be driven by your enterprise governance. As you build out data governance in your organization, it’s important to keep in mind that this program is meant to be an enabling framework of oversight and accountabilities for managing, handling, and protecting your company’s data assets. It should never be perceived as bureaucratic or inhibiting to your data users. It should deliver agreed-upon models that are conducive to your organization’s operating culture, offering clarity on who can do what with the data and via what means. Data governance is the key enabler for bringing high-quality, trusted, secure, and discoverable data to the right users across your organization. Promote and drive the responsible and ethical use of data while helping to build and foster an organizational culture of data excellence.
Crystal Singh
Director, Research & Advisory, Data & Analytics Practice
Info-Tech Research Group
The amount of data within organizations is growing at an exponential rate, creating a need to adopt a formal approach to governing data. However, many organizations remain uninformed on how to effectively govern their data. Comprehensive data governance should define leadership, accountability, and responsibility related to data use and handling and be supported by a well-oiled operating model and relevant policies and procedures. This will help ensure the right data gets to the right people at the right time, using the right mechanisms.
Organizations are faced with challenges associated with changing data landscapes, evolving business models, industry disruptions, regulatory and compliance obligations, and changing and maturing user landscape and demand for data. Although the need for a data governance program is often evident, organizations miss the mark when their data governance efforts are not directly aligned to delivering measurable business value. Initiatives should support key strategic initiatives, as well as value streams and their underlying business capabilities.
Info-Tech’s approach to establishing and sustaining effective data governance is anchored in the strong alignment of organizational value streams and their business capabilities with key data governance dimensions and initiatives. Organizations should:
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operating costs, missed opportunities, eroded stakeholder satisfaction, and increased business risk.
As you embark on establishing data governance in your organization, it’s vital to ensure from the get-go that you define the drivers and business context for the program. Data governance should never be attempted without direction on how the program will yield measurable business value.
“Data processing and cleanup can consume more than half of an analytics team’s time, including that of highly paid data scientists, which limits scalability and frustrates employees.” – Petzold, et al., 2020
“The productivity of employees across the organization can suffer.” – Petzold, et al., 2020
Respondents to McKinsey’s 2019 Global Data Transformation Survey reported that an average of 30% of their total enterprise time was spent on non-value-added tasks because of poor data quality and availability. – Petzold, et al., 2020
78% of companies (and 92% of top-tier companies) have a corporate initiative to become more data-driven. – Alation, 2020
But despite these ambitions, there appears to be a “data culture disconnect” – 58% of leaders overestimate the current data culture of their enterprises, giving a grade higher than the one produced by the study. – Fregoni, 2020
Respond to industry disruptors
Optimize the way you serve your stakeholders and customers
Develop products and services to meet ever-evolving needs
Manage operations and mitigate risk
Data Disengaged
You have a low appetite for data and rarely use data for decision making.
Data Enabled
Technology, data architecture, and people and processes are optimized and supported by data governance.
Data Driven
You are differentiating and competing on data and analytics; described as a “data first” organization. You’re collaborating through data. Data is an asset.
Data governance is an enabling framework of decision rights, responsibilities, and accountabilities for data assets across the enterprise.
Data governance is:
If done correctly, data governance is not:
Conformance: Establishing data governance to meet regulations and compliance requirements.
Performance: Establishing data governance to fuel data-driven decision making for driving business value and managing and mitigating business risk.
“Albert Einstein is said to have remarked, ‘The world cannot be changed without changing our thinking.’ What is clear is that the greatest barrier to data success today is business culture, not lagging technology. “– Randy Bean, 2020
“It is not enough for companies to embrace modern data architectures, agile methodologies, and integrated business-data teams, or to establish centers of excellence to accelerate data initiatives, when only about 1 in 4 executives reported that their organization has successfully forged a data culture.”– Randy Bean, 2020
Data-driven culture = “data matters to our company”
Data debt is “the accumulated cost that is associated with the sub-optimal governance of data assets in an enterprise, like technical debt.”
Data debt is a problem for 78% of organizations.
40% of organizations say individuals within the business do not trust data insights.
66% of organizations say a backlog of data debt is impacting new data management initiatives.
33% of organizations are not able to get value from a new system or technology investment.
30% of organizations are unable to become data-driven.
Source: Experian, 2020
Only 3% of companies’ data meets basic quality standards. (Source: Nagle, et al., 2017)
Organizations suspect 28% of their customer and prospect data is inaccurate in some way. (Source: Experian, 2020)
Only 51% of organizations consider the current state of their CRM or ERP data to be clean, allowing them to fully leverage it. (Source: Experian, 2020)
35% of organizations say they’re not able to see a ROI for data management initiatives. (Source: Experian, 2020)
Make the available data governance tools and technology work for you:
While data governance tools and technologies are no panacea, leverage their automated and AI-enabled capabilities to augment your data governance program.
Put data governance into the context of the business:
Start substantiating early on how you are going to measure success as your data governance program evolves.
Key considerations:
Data Governance Leadership & Org Structure Definition
Define the home for data governance and other key roles around ownership and stewardship, as approved by senior leadership.
Data Governance Charter and Policies
Create a charter for your program and build/refresh associated policies.
Data Culture Diagnostic
Understand the organization’s current data culture, perception of data, value of data, and knowledge gaps.
Use Case Build and Prioritization
Build a use case that is tied to business capabilities. Prioritize accordingly.
Business Data Glossary
Build and/or refresh the business’ glossary for addressing data definitions and standardization issues.
Tools & Technology
Explore the tools and technology offering in the data governance space that would serve as an enabler to the program. (e.g. RFI, RFP).
Data governance leadership and sponsorship is key.
Ensure strategic business alignment.
Build and foster a culture of data excellence.
Evolve along the data journey.
Make data governance an enabler, not a hindrance.
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face the impact of elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.
Data governance should not sit as an island in your organization. It must continuously align with the organization’s enterprise governance function. It shouldn’t be perceived as a pet project of IT, but rather as an enterprise-wide, business-driven initiative.
Ensure your data governance program delivers measurable business value by aligning the associated data governance initiatives with the business architecture. Leverage the measures of success or KPIs of the underlying business capabilities to demonstrate the value data governance has yielded for the organization.
Data governance remains the foundation of all forms of reporting and analytics. Advanced capabilities such as AI and machine learning require effectively governed data to fuel their success.
Tailor your data literacy program to meet your organization’s needs, filling your range of knowledge gaps and catering to your different levels of stakeholders. When it comes to rolling out a data literacy program, there is no one-size-fits-all solution. Your data literacy program is intended to fill the knowledge gaps about data, as they exist in your organization. It should be targeted across the board – from your executive leadership and management through to the subject matter experts across different lines of the business in your organization.
| 1. Build Business and User Context | 2. Understand Your Current Data Governance Capabilities | 3. Build a Target State Roadmap and Plan | |
|---|---|---|---|
| Phase Steps |
|
|
|
| Phase Outcomes |
|
|
|
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Data Governance Planning and Roadmapping Workbook
Use the Data Governance Planning and Roadmapping Workbook as you plan, build, roll-out, and scale data governance in your organization.
Data Use Case Framework Template
This template takes you through a business needs gathering activity to highlight and create relevant use cases around the organization’s data-related problems and opportunities.
Business Data Glossary
Use this template to document the key data assets that are to be governed and create a data flow diagram for your organization.
Data Culture Diagnostic and Scorecard
Leverage Info-Tech’s Data Culture Diagnostic to understand how your organization scores across 10 areas relating to data culture.
Data Governance Planning and Roadmapping Workbook
In phases 1 and 2 of this blueprint, we will help you establish the business context, define your business drivers and KPIs, and understand your current data governance capabilities and strengths.
In phase 3, we will help you develop a plan and a roadmap for addressing any gaps and improving the relevant data governance capabilities so that data is well positioned to deliver on those defined business metrics.
"Our team, has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."
"Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keeps us on track."
"We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."
"Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
| 1. Build Business and User context | 2. Understand Your Current Data Governance Capabilities | 3. Build a Target State Roadmap and Plan | |
|---|---|---|---|
| Best-Practice Toolkit |
|
|
|
| Guided Implementation |
|
|
|
| Phase Outcomes |
|
|
|
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is between 8 to 12 calls over the course of 4 to 6 months.
| Day 1 | Day 2 | Day 3 | Day 4 | |
|---|---|---|---|---|
| Establish Business Context and Value | Understand Current Data Governance Capabilities and Plot Target-State Levels | Build Data Domain to Data Governance Role Mapping | Formulate a Plan to Get to Your Target State | |
| Activities |
|
|
|
|
| Deliverables |
|
|
|
|
“When business users are invited to participate in the conversation around data with data users and IT, it adds a fundamental dimension — business context. Without a real understanding of how data ties back to the business, the value of analysis and insights can get lost.” – Jason Lim, Alation
This phase will guide you through the following activities:
This phase involves the following participants:
Activities
1.1.1 Identify Your Business Capabilities
1.1.2 Categorize Your Organization’s Key Business Capabilities
1.1.3 Develop a Strategy Map Tied to Data Governance
This step will guide you through the following activities:
Outcomes of this step
Gaining a sound understanding of your business architecture (value streams and business capabilities) is a critical foundation for establishing and sustaining a data governance program that delivers measurable business value.
Confirm your organization's existing business capability map or initiate the formulation of a business capability map:
Note: A business capability defines what a business does to enable value creation. Business capabilities are business terms defined using descriptive nouns such as “Marketing” or “Research and Development.” They represent stable business functions, are unique and independent of each other, and typically will have a defined business outcome.
Input
Output
Materials
Participants
For more information, refer to Info-Tech’s Document Your Business Architecture.
Value streams connect business goals to the organization’s value realization activities. These value realization activities, in turn, depend on data.
If the organization does not have a business architecture function to conduct and guide Activity 1.1.1, you can leverage the following approach:
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face the possibilities of elevated operational costs, missed opportunities, eroded stakeholder satisfaction, negative impact to reputation and brand, and/or increased exposure to business risk.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Info-Tech’s Industry Reference Architecture for Retail Banking.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Higher Education.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Local Government.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Manufacturing.
Value streams connect business goals to the organization’s value realization activities.
Value streams enable the organization to create or capture value in the market in which it operates by engaging in a set of interconnected activities.
For this value stream, download Info-Tech’s Industry Reference Architecture for Retail.
A business capability defines what a business does to enable value creation. Business capabilities represent stable business functions and typically will have a defined business outcome.
Business capabilities can be thought of as business terms defined using descriptive nouns such as “Marketing” or “Research and Development.”
If your organization doesn’t already have a business capability map, you can leverage the following approach to build one. This initiative requires a good understanding of the business. By working with the right stakeholders, you can develop a business capability map that speaks a common language and accurately depicts your business.
Working with the stakeholders as described above:
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
For more information, refer to Info-Tech’s Document Your Business Architecture.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Retail Banking
For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail Banking.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Higher Education
For this business capability map, download Info-Tech’s Industry Reference Architecture for Higher Education.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Local Government
For this business capability map, download Info-Tech’s Industry Reference Architecture for Local Government.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Manufacturing
For this business capability map, download Info-Tech’s Industry Reference Architecture for Manufacturing.
A business capability map can be thought of as a visual representation of your organization’s business capabilities and hence represents a view of what your data governance program must support.
Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.
Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realization capabilities under discussion. This will help to build awareness and visibility of the data governance program.
Example business capability map for: Retail
For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail.
Determine which capabilities are considered high priority in your organization.
This categorization/prioritization exercise helps highlight prime areas of opportunity for building use cases, determining prioritization, and the overall optimization of data and data governance.
Input
Output
Materials
Participants
For more information, refer to Info-Tech’s Document Your Business Architecture.
This exercise is useful in ensuring the data governance program is focused and aligned to support the priorities and direction of the business.
Example: Retail
For this business capability map, download Info-Tech’s Industry Reference Architecture for Retail.
Identify the strategic objectives for the business. Knowing the key strategic objectives will drive business-data governance alignment. It’s important to make sure the right strategic objectives of the organization have been identified and are well understood.
Guide to creating your map: Starting with strategic objectives, map the value streams that will ultimately drive them. Next, link the key capabilities that enable each value stream. Then map the data and data governance to initiatives that support those capabilities. This is one approach to help you prioritize the data initiatives that deliver the most value to the organization.
Input
Output
Materials
Participants
Download Info-Tech’s Data Governance Planning and Roadmapping Workbook
Start with the strategic objectives, then map the value streams that will ultimately drive them. Next, link the key capabilities that enable each value stream. Then map the data and data governance initiatives that support those capabilities. This process will help you prioritize the data initiatives that deliver the most value to the organization.
Example: Retail
For this strategy map, download Info-Tech’s Industry Reference Architecture for Retail.
Activities
1.2.1 Build High-Value Use Cases
This step will guide you through the following activities:
Outcomes of this step
One of the most important aspects when building use cases is to ensure you include KPIs or measures of success. You have to be able to demonstrate how the use case ties back to the organizational priorities or delivers measurable business value. Leverage the KPIs and success factors of the business capabilities tied to each particular use case.
This business needs-gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organization.
Tip: Don’t conclude these use case discussions without substantiating what measures of success will be used to demonstrate the business value of the effort to produce the desired future state, as relevant to each particular use case.
Input
Output
Materials
Participants
Download Info-Tech’s Data Use Case Framework Template
Leveraging your business capability map, build use cases that align with the organization’s key business capabilities.
Consider:
Info-Tech’s Data Requirements and Mapping Methodology for Creating Use Cases
The resulting use cases are to be prioritized and leveraged for informing the business case and the data governance capabilities optimization plan.
Taken from Info-Tech’s Data Use Case Framework Template
This phase will guide you through the following activities:
This phase involves the following participants:
This step will guide you through the following activities:
Outcomes of this step
A well-defined data governance program will deliver:
The key components of establishing sustainable enterprise data governance, taken from Info-Tech’s Data Governance Framework:
The office of the chief data officer (CDO):
“Compared to most of their C-suite colleagues, the CDO is faced with a unique set of problems. The role is still being defined. The chief data officer is bringing a new dimension and focus to the organization: ‘data.’ ”
– Carruthers and Jackson, 2020
“The title matters. In my opinion, you can’t have a CDO without executive authority. Otherwise no one will listen.”
– Anonymous European CDO
“The reporting structure depends on who’s the ‘glue’ that ties together all these uniquely skilled individuals.”
– John Kemp, Senior Director, Executive Services, Info-Tech Research Group
Who are best suited to be data owners?
Data owners are typically senior business leaders with the following characteristics:
Data governance working groups:
Traditionally, data stewards:
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.
Enabling business capabilities with data governance role definitions
“Generate excitement for data: When people are excited and committed to the vision of data enablement, they’re more likely to help ensure that data is high quality and safe.” – Petzold, et al., 2020
Operating Model
Defining your data governance operating model will help create a well-oiled program that sustainably delivers value to the organization and manages risks while building and fostering a culture of data excellence along the way. Some organizations are able to establish a formal data governance office, whether independent or attached to the office of the chief data officer. Regardless of how you are organized, data governance requires a home, a leader, and an operating model to ensure its sustainability and evolution.
Examples of focus areas for your operating model:
The key is to determine what style will work best in your organization, taking into consideration your organizational culture, executive leadership support (present and ongoing), catalysts such as other enterprise-wide transformative and modernization initiatives, and/or regulatory and compliances drivers.
Furthermore, communication with the wider organization of data producers, users, and consumers is one of the core elements of the overall data governance communications plan.
Communication is vital for ensuring acceptance of new processes, rules, guidelines, and technologies by all data producers and users as well as for sharing success stories of the program.
“Leading organizations invest in change management to build data supporters and convert the skeptics. This can be the most difficult part of the program, as it requires motivating employees to use data and encouraging producers to share it (and ideally improve its quality at the source)[.]” – Petzold, et al., 2020
Examples of focus areas for your operating model (continued):
Preparing people for change well in advance will allow them to take the steps necessary to adapt and reduce potential confrontation. By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.
Attempting to implement change without an effective communications plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.
Aligning your data governance to the organization's value realization activities enables you to leverage the KPIs of those business capabilities to demonstrate tangible and measurable value. Use terms and language that will resonate with your senior business leadership.
Launching a data governance program will bring with it a level of disruption to the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.
“Data standards are the rules by which data are described and recorded. In order to share, exchange, and understand data, we must standardize the format as well as the meaning.” – U.S. Geological Survey
Examples of data policies:
“Organizational culture can accelerate the application of analytics, amplify its power, and steer companies away from risky outcomes.” – Petzold, et al., 2020
What does a healthy data culture look like?
Building a culture of data excellence.
Leverage Info-Tech’s Data Culture Diagnostic to understand your organization’s culture around data.
Contact your Info-Tech Account Representative for more information on the Data Culture Diagnostic
“People are at the heart of every culture, and one of the biggest challenges to creating a data culture is bringing everyone into the fold.” – Lim, Alation
“Companies that have succeeded in their data-driven efforts understand that forging a data culture is a relentless pursuit, and magic bullets and bromides do not deliver results.” – Randy Bean, 2020
There is a trusted, single source of data the whole company can draw from.
There’s a business glossary and data catalog and users know what the data fields mean.
Users have access to data and analytics tools. Employees can leverage data immediately to resolve a situation, perform an activity, or make a decision – including frontline workers.
Data literacy, the ability to collect, manage, evaluate, and apply data in a critical manner, is high.
Data is used for decision making. The company encourages decisions based on objective data and the intelligent application of it.
Data governance will support your organization’s ethical use and handling of data by facilitating definition around important factors, such as:
Activities
2.2.1 Gauge Your Organization’s Current Data Culture
This step will guide you through the following activities:
Outcomes of this step
Conduct a Data Culture Survey or Diagnostic
The objectives of conducting a data culture survey are to increase the understanding of the organization's data culture, your users’ appetite for data, and their appreciation for data in terms of governance, quality, accessibility, ownership, and stewardship. To perform a data culture survey:
Input
Output
Materials
Participants
Contact your Info-Tech Account Representative for details on launching a Data Culture Diagnostic.
“Achieving data success is a journey, not a sprint.” Companies that set a clear course, with reasonable expectations and phased results over a period of time, get to the destination faster.” – Randy Bean, 2020
This phase will guide you through the following activities:
This phase involves the following participants:
This step will guide you through the following activities:
Outcomes of this step
Key considerations:
Sample milestones:
Data Governance Leadership & Org Structure Definition
Define the home for data governance and other key roles around ownership and stewardship, as approved by senior leadership.
Data Governance Charter and Policies
Create a charter for your program and build/refresh associated policies.
Data Culture Diagnostic
Understand the organization’s current data culture, perception of data, value of data, and knowledge gaps.
Use Case Build and Prioritization
Build a use case that is tied to business capabilities. Prioritize accordingly.
Business Data Glossary/Catalog
Build and/or refresh the business’ glossary for addressing data definitions and standardization issues.
Tools & Technology
Explore the tools and technology offering in the data governance space that would serve as an enabler to the program. (e.g. RFI, RFP).
Define key roles for getting started.
Start small and then scale – deliver early wins.
Start understanding data knowledge gaps, building the program, and delivering.
Make the available data governance tools and technology work for you.
Sample data governance roadmap milestones:
Key Considerations:
Your organization’s value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.
Enable business capabilities with data governance role definitions.
These are some of the data governance tools and technology players. Check out SoftwareReviews for help making better software decisions.
The data steward must be empowered and backed politically with decision-making authority, or the role becomes stale and powerless.
Ensuring compliance can be difficult. Data stewards may experience pushback from stakeholders who must deliver on the policies, procedures, and processes that the data steward enforces.
Because the data steward must enforce data processes and liaise with so many different people and departments within the organization, the data steward role should be their primary full-time job function – where possible.
However, in circumstances where budget doesn’t allow a full-time data steward role, develop these skills within the organization by adding data steward responsibilities to individuals who are already managing data sets for their department or line of business.
A stewardship role is generally more about managing the cultural change that data governance brings. This requires the steward to have exceptional interpersonal skills that will assist in building relationships across departmental boundaries and ensuring that all stakeholders within the organization believe in the initiative, understand the anticipated outcomes, and take some level of responsibility for its success.
Data governance initiatives must contain a strong organizational disruption component. A clear and concise communication strategy that conveys milestones and success stories will address the various concerns that business unit stakeholders may have.
By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.
Governance recommendations will require significant business change. The redesign of a substantial number of data processes affecting various business units will require an overhaul of the organization’s culture, thought processes, and procedures surrounding its data. Preparing people for change well in advance will allow them to take the necessary steps to adapt and reduce potential confrontation.
Because a data governance initiative will involve data-driven business units across the organization, the governance team must present a compelling case for data governance to ensure acceptance of new processes, rules, guidelines, and technologies by all data producers and users.
Attempting to implement change without an effective communication plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.
Launching a data governance initiative is guaranteed to disrupt the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.
To create a strong vision for data governance, there must be participation from the business and IT. A common vision will articulate the state the organization wishes to achieve and how it will reach that state. Visioning helps to develop long-term goals and direction.
Once the vision is established, it must be effectively communicated to everyone, especially those who are involved in creating, managing, disposing, or archiving data.
The data governance program should be periodically refined. This will ensure the organization continues to incorporate best methods and practices as the organization grows and data needs evolve.
A successful data governance communications plan involves making the initiative visible and promoting staff awareness. Educate the team on how data is collected, distributed, and used, what internal processes use data, and how that data is used across departmental boundaries.
By demonstrating how data governance will affect staff directly, you create a deeper level of understanding across lines of business, and ultimately, a higher level of acceptance for new processes, rules, and guidelines.
A clear and concise communications strategy will raise the profile of data governance within the organization, and staff will understand how the program will benefit them and how they can share in the success of the initiative. This will end up providing support for the initiative across the board.
Focus on literacy and communication: include training in the communication plan. Providing training for data users on the correct procedures for updating and verifying the accuracy of data, data quality, and standardized data policies will help validate how data governance will benefit them and the organization.
The data governance program is responsible for continuously promoting the value of data to the organization. The data governance program should seek a variety of ways to educate the organization and data stakeholders on the benefit of data management.
Even if data policies and procedures are created, they will be highly ineffective if they are not properly communicated to the data producers and users alike.
There needs to be a communication plan that highlights how the data producer and user will be affected, what their new responsibilities are, and the value of that change.
To learn how to manage organizational change, refer to Info-Tech’s Master Organizational Change Management Practices.
It can be difficult to understand what a policy is, and what it is not. Start by identifying the differences between a policy and standards, guidelines, and procedures.
The following are key elements of a good policy:
| Heading | Descriptions |
|---|---|
| Purpose | Describes the factors or circumstances that mandate the existence of the policy. Also states the policy’s basic objectives and what the policy is meant to achieve. |
| Scope | Defines to whom and to what systems this policy applies. Lists the employees required to comply or simply indicates “all” if all must comply. Also indicates any exclusions or exceptions, i.e. those people, elements, or situations that are not covered by this policy or where special consideration may be made. |
| Definitions | Define any key terms, acronyms, or concepts that will be used in the policy. A standard glossary approach is sufficient. |
| Policy Statements | Describe the rules that comprise the policy. This typically takes the form of a series of short prescriptive and proscriptive statements. Sub-dividing this section into sub-sections may be required depending on the length or complexity of the policy. |
| Non-Compliance | Clearly describe consequences (legal and/or disciplinary) for employee non-compliance with the policy. It may be pertinent to describe the escalation process for repeated non-compliance. |
| Agreement | Confirms understanding of the policy and provides a designated space to attest to the document. |
Most organizations have problems with policy management. These include:
Technology should be used as a means to solve these problems and effectively monitor, enforce, and communicate policies.
Product Overview
myPolicies is a web-based solution to create, distribute, and manage corporate policies, procedures, and forms. Our solution provides policy managers with the tools they need to mitigate the risk of sanctions and reduce the administrative burden of policy management. It also enables employees to find the documents relevant to them and build a culture of compliance.
Some key success factors for policy management include:
myPolicies
Data policies are short statements that seek to manage the creation, acquisition, integrity, security, compliance, and quality of data. These policies vary amongst organizations, depending on your specific data needs.
Trust
Availability
Security
Compliance
Info-Tech’s Data Management Policy:
This policy establishes uniform data management standards and identifies the shared responsibilities for assuring the integrity of the data and that it efficiently and effectively serves the needs of the organization. This policy applies to all critical data and to all staff who may be creators and/or users of such data.
Info-Tech’s Data Entry Policy:
The integrity and quality of data and evidence used to inform decision making is central to both the short-term and long-term health of an organization. It is essential that required data be sourced appropriately and entered into databases and applications in an accurate and complete manner to ensure the reliability and validity of the data and decisions made based on the data.
Info-Tech’s Data Provenance Policy:
Create policies to keep your data's value, such as:
Info-Tech’s Data Integration and Virtualization Policy:
This policy aims to assure the organization, staff, and other interested parties that data integration, replication, and virtualization risks are taken seriously. Staff must use the policy (and supporting guidelines) when deciding whether to integrate, replicate, or virtualize data sets.
Although they can be highly subjective, metrics are extremely important to data governance success.
Policies are great to have from a legal perspective, but unless they are followed, they will not benefit the organization.
Review metrics on an ongoing basis with those data owners/stewards who are accountable, the data governance steering committee, and the executive sponsors.
Examples include:
Have a fundamental data definition model for the entire business to adhere to. Those in the positions that generate and produce data must follow the common set of standards developed by the steering committee and be accountable for the creation of valid, clean data.
By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.
Governance recommendations will require significant business change. The redesign of a substantial number of data processes affecting various business units will require an overhaul of the organization’s culture, thought processes, and procedures surrounding its data. Preparing people for change well in advance will allow them to take the necessary steps to adapt and reduce potential confrontation.
Because a data governance initiative will involve data-driven business units across the organization, the governance team must present a compelling case for data governance to ensure acceptance of new processes, rules, guidelines, and technologies by all data producers and users.
Attempting to implement change without an effective communications plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.
Data governance initiatives will very likely bring about a level of organizational disruption. A clear and concise communications strategy that conveys milestones and success stories will address the various concerns that business unit stakeholders may have.
Launching a data governance program will bring with it a level of disruption to the culture of the organization. That disruption doesn’t have to be detrimental if you are prepared to manage the change proactively and effectively.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team. Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
The following are sample activities that will be conducted by Info-Tech analysts with your team:
Build Your Business and User Context
Work with your core team of stakeholders to build out your data governance strategy map, aligning data governance initiatives with business capabilities, value streams, and, ultimately, your strategic priorities.
Formulate a Plan to Get to Your Target State
Develop a data governance future state roadmap and plan based on an understanding of your current data governance capabilities, your operating environment, and the driving needs of your business.
Key to building and fostering a data-driven culture.
Streamline your data management program with our simplified framework.
Be the voice of data in a time of transformation.
| Name | Position | Company |
|---|---|---|
| David N. Weber | Executive Director - Planning, Research and Effectiveness | Palm Beach State College |
| Izabela Edmunds | Information Architect | Mott MacDonald |
| Andy Neill | Practice Lead, Data & Analytics | Info-Tech Research Group |
| Dirk Coetsee | Research Director, Data & Analytics | Info-Tech Research Group |
| Graham Price | Executive Advisor, Advisory Executive Services | Info-Tech Research Group |
| Igor Ikonnikov | Research Director, Data & Analytics | Info-Tech Research Group |
| Jean Bujold | Senior Workshop Delivery Director | Info-Tech Research Group |
| Rajesh Parab | Research Director, Data & Analytics | Info-Tech Research Group |
| Reddy Doddipalli | Senior Workshop Director | Info-Tech Research Group |
| Valence Howden | Principal Research Director, CIO | Info-Tech Research Group |
Alation. “The Alation State of Data Culture Report – Q3 2020.” Alation, 2020. Accessed 25 June 2021.
Allott, Joseph, et al. “Data: The next wave in forestry productivity.” McKinsey & Company, 27 Oct. 2020. Accessed 25 June 2021.
Bean, Randy. “Why Culture Is the Greatest Barrier to Data Success.” MIT Sloan Management Review, 30 Sept. 2020. Accessed 25 June 2021.
Brence, Thomas. “Overcoming the Operationalization Challenge with Data Governance at New York Life.” Informatica, 18 March 2020. Accessed 25 June 2021.
Bullmore, Simon, and Stuart Coleman. “ODI Inside Business – a checklist for leaders.” Open Data Institute, 19 Oct. 2020. Accessed 25 June 2021.
Canadian Institute for Health Information. “Developing and implementing accurate national standards for Canadian health care information.” Canadian Institute for Health Information. Accessed 25 June 2021.
Carruthers, Caroline, and Peter Jackson. “The Secret Ingredients of the Successful CDO.” IRM UK Connects, 23 Feb. 2017.
Dashboards. “Useful KPIs for Healthy Hospital Quality Management.” Dashboards. Accessed 25 June 2021.
Dashboards. “Why (and How) You Should Improve Data Literacy in Your Organization Today.” Dashboards. Accessed 25 June 2021.
Datapine. “Healthcare Key Performance Indicators and Metrics.” Datapine. Accessed 25 June 2021.
Datapine. “KPI Examples & Templates: Measure what matters the most and really impacts your success.” Datapine. Accessed 25 June 2021.
Diaz, Alejandro, et al. “Why data culture matters.” McKinsey Quarterly, Sept. 2018. Accessed 25 June 2021.
Everett, Dan. “Chief Data Officer (CDO): One Job, Four Roles.” Informatica, 9 Sept. 2020. Accessed 25 June 2021.
Experian. “10 signs you are sitting on a pile of data debt.” Experian. Accessed 25 June 2021.
Fregoni, Silvia. “New Research Reveals Why Some Business Leaders Still Ignore the Data.” Silicon Angle, 1 Oct. 2020.
Informatica. Holistic Data Governance: A Framework for Competitive Advantage. Informatica, 2017. Accessed 25 June 2021.
Knight, Michelle. “What Is a Data Catalog?” Dataversity, 28 Dec. 2017. Web.
Lim, Jason. “Alation 2020.3: Getting Business Users in the Game.” Alation, 2020. Accessed 25 June 2021.
McDonagh, Mariann. “Automating Data Governance.” Erwin, 29 Oct. 2020. Accessed 25 June 2021.
NewVantage Partners. Data-Driven Business Transformation: Connecting Data/AI Investment to Business Outcomes. NewVantage Partners, 2020. Accessed 25 June 2021.
Olavsrud, Thor. “What is data governance? A best practices framework for managing data assets.” CIO.com, 18 March 2021. Accessed 25 June 2021.
Open Data Institute. “Introduction to data ethics and the data ethics canvas.” Open Data Institute, 2020. Accessed 25 June 2021.
Open Data Institute. “The UK National Data Strategy 2020: doing data ethically.” Open Data Institute, 17 Nov. 2020. Accessed 25 June 2021.
Open Data Institute. “What is the Data Ethics Canvas?” Open Data Institute, 3 July 2019. Accessed 25 June 2021.
Pathak, Rahul. “Becoming a Data-Driven Enterprise: Meeting the Challenges, Changing the Culture.” MIT Sloan Management Review, 28 Sept. 2020. Accessed 25 June 2021.
Redman, Thomas, et al. “Only 3% of Companies’ Data Meets Basic Quality Standards.” Harvard Business Review. 11 Sept 2017.
Petzold, Bryan, et al. “Designing data governance that delivers value.” McKinsey & Company, 26 June 2020. Accessed 25 June 2021.
Smaje, Kate. “How six companies are using technology and data to transform themselves.” McKinsey & Company, 12 Aug. 2020. Accessed 25 June 2021.
Talend. “The Definitive Guide to Data Governance.” Talend. Accessed 25 June 2021.
“The Powerfully Simple Modern Data Catalog.” Atlan, 2021. Web.
U.S. Geological Survey. “Data Management: Data Standards.” U.S. Geological Survey. Accessed 25 June 2021.
Waller, David. “10 Steps to Creating a Data-Driven Culture.” Harvard Business Review, 6 Feb. 2020. Accessed 25 June 2021.
“What is the Difference Between A Business Glossary, A Data Dictionary, and A Data Catalog, and How Do They Play A Role In Modern Data Management?” Analytics8, 23 June 2021. Web.
Wikipedia. “RFM (market research).” Wikipedia. Accessed 25 June 2021.
Windheuser, Christoph, and Nina Wainwright. “Data in a Modern Digital Business.” Thoughtworks, 12 May 2020. Accessed 25 June 2021.
Wright, Tom. “Digital Marketing KPIs - The 12 Key Metrics You Should Be Tracking.” Cascade, 3 March 2021. Accessed 25 June 2021.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand the breadth of the regulation’s requirements and document roles and responsibilities.
Define your GDPR scope and prioritize initiatives based on risk.
Understand the requirements for a record of processing and determine who will own it.
Document your DPO decision and align security strategy to data privacy.
Prioritize any initiatives driven out of Phases 1-4 and begin developing policies that help in the documentation effort.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Kick-off the workshop; understand and define GDPR as it exists in your organizational context.
Prioritize your business units based on GDPR risk.
Assign roles and responsibilities.
1.1 Kick-off and introductions.
1.2 High-level overview of weekly activities and outcomes.
1.3 Identify and define GDPR initiative within your organization’s context.
1.4 Determine what actions have been done to prepare; how have regulations been handled in the past?
1.5 Identify key business units for GDPR committee.
1.6 Document business units and functions that are within scope.
1.7 Prioritize business units based on GDPR.
1.8 Formalize stakeholder support.
Prioritized business units based on GDPR risk
GDPR Compliance RACI Chart
Know the rationale behind a record of processing.
Determine who will own the record of processing.
2.1 Understand the necessity for a record of processing.
2.2 Determine for each prioritized business unit: are you a controller or processor?
2.3 Develop a record of processing for most-critical business units.
2.4 Perform legitimate interest assessments.
2.5 Document an iterative process for creating a record of processing.
Initial record of processing: 1-2 activities
Initial legitimate interest assessment: 1-2 activities
Determination of who will own the record of processing
Review existing security controls and highlight potential requirements.
Ensure the initiatives you’ll be working on align with existing controls and future goals.
3.1 Determine the appetite to align the GDPR project to data classification and data discovery.
3.2 Discuss the benefits of data discovery and classification.
3.3 Review existing incident response plans and highlight gaps.
3.4 Review existing security controls and highlight potential requirements.
3.5 Review all initiatives highlighted during days 1-3.
Highlighted gaps in current incident response and security program controls
Documented all future initiatives
Review project plan and initiatives and prioritize.
Finalize outputs of the workshop, with a strong understanding of next steps.
4.1 Analyze the necessity for a data protection officer and document decision.
4.2 Review project plan and initiatives.
4.3 Prioritize all current initiatives based on regulatory compliance, cost, and ease to implement.
4.4 Develop a data protection policy.
4.5 Finalize key deliverables created during the workshop.
4.6 Present the GDPR project to key stakeholders.
4.7 Workshop executive presentation and debrief.
GDPR framework and prioritized initiatives
Data Protection Policy
List of key tools
Communication plans
Workshop summary documentation
COVID-19 is driving the need for quick technology solutions, including some that require personal data collection. Organizations are uncertain about the right thing to do.
Data equity approaches personal data like money, putting the owner in control and helping to protect against unethical systems.
There are some key considerations for businesses grappling with digital ethics:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard will help you understand the spectrum of different Agile xOps working modes and how best to leverage them and build an architecture and toolset that support rapid continuous IT operations
IT Operations continue to be challenged by increasing needs for scale and speed, often in the face of constrained resources and time. For most, Agile methodologies have become a foundational part of tackling this problem. Since then, we've seen Agile evolve into DevOps, which started a trend into different categories of "xOps" that are too many to count. How does one make sense of the xOps spectrum? What is InfraOps and where does it fit in?
Ultimately, all these methodologies and approaches are there to serve the same purpose: increase effectiveness through automation and improve governance through visibility. The key is to understand what tools and methodologies will deliver actual benefits to your IT operation and to the organization as a whole.
By defining your end goals and framing solutions based on the type of visibility and features you need, you can enable speed and reliability without losing control of the work.
InfraOps, when applied well, should be the embodiment of the governance policies as expressed by standards in architecture and automation.
|
Understand the xOps spectrum |
There are as many different types of "xOps" as there are business models and IT teams. To pick the approaches that deliver the best value to your organization and that align to your way of operating, it's important to understand the different major categories in the spectrum and how they do or don't apply to your IT approach. |
|---|---|
|
How to optimize the Ops in DevOps |
InfraOps is one of the major methodologies to address a key problem in IT at cloud scale: eliminating friction and error from your deliveries and outputs. The good news is there are architectures, tools, and frameworks you can easily leverage to make adopting this approach easier. |
|
Evolve to integration and build a virtuous cycle |
Ultimately your DevOps and InfraOps approaches should embody your governance needs via architecture and process. As time goes on, however, both your IT footprint and your business environment will shift. Build your tools, telemetry, and governance to anticipate and adapt to change and build a virtuous cycle between development needs and IT Operations tools and governance. |
There is no definitive list of x's in the xOps spectrum. Different organizations and teams will divide and define these in different ways. In many cases, the definitions and domains of various xOps will overlap.
Some of the commonly adopted and defined xOps models are listed here.
Shifting left or right isn't an either/or choice. They're more like opposite sides of the same coin. Like the different xOps approaches, usually more than one shift approach will apply to your IT Operations.
With the shift from execution to governing and validating, the role of deployment falls downstream of IT Operations.
IT Operations needs to move to a mindset that focuses on creating the guardrails, enforced standards, and compliance rules that need to be used downstream, then apply those standards using automation and tooling to remove friction and error from the interstitia (the white spaces between chevrons) of the various phases.
Your tools can be broken into two categories:
Keep in mind that while your infrastructure architecture is usually an either/or choice, your automation approach should use any and all tooling that helps.
Hyperconvergence is the next phase of convergence, virtualizing servers, networks, and storage on a single server/storage appliance. Capacity scales as more appliances are added to a cluster or stack.
The disruptive departure:
HCI follows convergence trends of the past ten years but is also a departure from how IT infrastructure has traditionally been provisioned and managed.
HCI is at the same time a logical progression of infrastructure convergence and a disruptive departure.
HCI can be the foundation block for a fully software defined data center, a prerequisite for private cloud.
Key attributes of a cloud are automation, resource elasticity, and self-service. This kind of agility is impossible if physical infrastructure needs intervention.
Virtualization alone does not a private cloud make, but complete stack virtualization (software defined) running on a hands-off preconfigured HCI appliance (or group of appliances) provides a solid foundation for building cloud services.
Silo-busting and private cloud sound great, but are your people and processes able to manage the change?
In traditional infrastructure, performance and capacity are managed as distinct though complementary jobs. An all-in-one approach may not work.
Use Case Example: Composable AI flow
Data Ingestion > Data Cleaning/Tagging > Training > Conclusion
Where it's useful
Considerations
Many organizations using a traditional approach report resource stranding as having an impact of 20% or more on efficiency. When focusing specifically on the stranding of memory in workloads, the number can often approach 40%.
Infrastructure as code (IaC) is the process of managing and provisioning computer data centers through machine-readable definition files rather than physical hardware configuration or interactive configuration tools.
Before IaC, IT personnel would have to manually change configurations to manage their infrastructure. Maybe they would use throwaway scripts to automate some tasks, but that was the extent of it.
With IaC, your infrastructure's configuration takes the form of a code file, making it easy to edit, copy, and distribute.
Orchestration describes the automated arrangement, coordination, and management of complex computer systems, middleware, and services.
This usage of orchestration is often discussed in the context of service-oriented architecture, virtualization, provisioning, converged infrastructure, and dynamic data center topics. Orchestration in this sense is about aligning the business request with the applications, data, and infrastructure.
It defines the policies and service levels through automated workflows,
provisioning, and change management. This creates an application-aligned infrastructure that can be scaled up or down based on the needs of each application.
As the requirement for more resources or a new application is triggered, automated tools now can perform tasks that previously could only be done by multiple administrators operating on their individual pieces of the physical stack.
Orchestration also provides centralized management of the resource pool, including billing, metering, and chargeback for consumption. For example, orchestration reduces the time and effort for deploying multiple instances of a single application.
Automation and orchestration tools can be key components of an effective governance toolkit too! Remember to understand what data can be pulled from your various tools and leveraged for other purposes such as cost management and portfolio roadmapping.
Configuration Management
|
Configuration Management |
|
|---|---|
|
CI/CD |
|
|
Container |
|
|
Cloud-Specific |
|
|
PaaS |
Automation and orchestration tools and software offerings are plentiful, and many of them have a different focus on where in the application delivery ecosystem they provide automation functionality.
Often there are different tools for different deployment and service models as well as for different functional phases for each service model.
Let the large ecosystem of tools be your ally. Leverage the right tools where needed and then address the complexity of tools using a master orchestration scheme.
Additionally, most tools do not cover all aspects required for most automation implementations, especially in hybrid cloud scenarios.
As such, often multiple tools must be deployed, which can lead to fragmentation and loss of unified controls.
Many enterprises address this fragmentation using a cloud management platform approach.
One method of achieving this is to establish a higher layer of orchestration – an "orchestrator of orchestrators," or metaorchestration.
In complex scenarios, this can be a challenge that requires customization and development.
| Toolkit | Pros | Cons | Tips |
|---|---|---|---|
| HCI | Easy scale out | Shift in skills required | Good for enabling automation and hybridization with current-gen public cloud services |
| CI | Maximal workload resource efficiency | Investment in new fabrics and technologies | Useful for very dynamic or highly scalable workloads like AI |
| IaC | Error reduction and standardization | Managing drift in standards and requirements | Leverage a standards and exception process to keep track of drift |
| A&O | Key enabler of DevOps automation within phases | Usually requires multiple toolsets/frameworks | Use the right tools and stitch together at the metaorchestration layer |
| Metaorchestration | Reduces the complexity of a diverse A&O and IaC toolkit | Requires understanding of the entire ecosystems of tools used | Key layer of visibility and control for governance |
Remember, the goal is to increase speed AND reliability. That's why we focus on removing friction from our delivery pipelines.
Remember that, especially in modern and rapid methodologies, your IT footprint can drift unexpectedly. This means you need a real feedback mechanism on where the friction moves to next.
This is particularly important in more Agile methodologies.
| Plan | Code | Test | Deploy | Monitor | |
|---|---|---|---|---|---|
| Incoming Friction | |||||
| In-Cycle Friction | |||||
| Outgoing Friction |
Map your ops groups to the delivery cycles in your pipeline. How many delivery cycles do you have or need?
Good InfraOps is a reflection of governance policies, expressed by standards in architecture and automation.
Evaluate Hyperconverged Infrastructure for Your Infrastructure Roadmap
Banks, Ethan, host. "Choosing Your Next Infrastructure." Datanauts, episode 094, Packet Pushers, 26 July 2017. Podcast.
"Composable Infrastructure Solutions." Hewlett Packard Canada, n.d. Web.
"Composable Infrastructure Technology." Liqid Inc., n.d. Web.
"DataOps architecture design." Azure Architecture Center, Microsoft Learn, n.d. Web.
Tan, Pei Send. "Differences: DevOps, ITOps, MLOps, DataOps, ModelOps, AIOps, SecOps, DevSecOps." Medium, 5 July 2021. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Diverse teams are necessary to foster creativity and guide business strategies. Overcome limitations by recruiting people of color and creating a diverse workforce.
Underrepresented employees benefit from an expansive culture. Create an inclusive environment and retain people of color and promote value within your organization.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Introduce challenges and concerns around recruiting and retaining people of color.
Gain a sense of direction.
1.1 Introduction to diversity conversations.
1.2 Assess areas to focus on and determine what is right, wrong, missing, and confusing.
1.3 Obtain feedback from your team about the benefits of working at your organization.
1.4 Establish your employee value proposition (EVP).
1.5 Discuss and establish your recruitment goals.
Current State Analysis
Right, Wrong, Missing, Confusing Quadrant
Draft EVP
Recruitment Goals
Identify areas in your current recruitment process that are preventing you from hiring people of color.
Establish a plan to make improvements.
Optimized recruitment process
2.1 Brainstorm and research community partners.
2.2 Review current job descriptions and equity statement.
2.3 Update job description template and equity statement.
2.4 Set team structure for interview and assessment.
2.5 Identify decision-making structure.
List of community partners
Updated job description template
Updated equity statement
Interview and assessment structure
Behavioral Question Library
Create a plan for an inclusive culture where your managers are supported.
Awareness of how to better support employees of color.
3.1 Discuss engagement and belonging.
3.2 Augment your onboarding materials.
3.3 Create an inclusive culture plan.
3.4 Determine how to support your management team.
List of onboarding content
Inclusive culture plan
Management support plan
Establish mechanisms to gain feedback from your employees and act on them.
Finalize the plan to create your diverse and inclusive workforce.
4.1 Ask and listen: determine what to ask your employees.
4.2 Create your roadmap.
4.3 Wrap-up and next steps.
List of survey questions
Roadmap
Completed support plan
Remote work calls for leveraging your Office 365 license to use Microsoft Teams – but IT is unsure about best practices for governance and permissions. Moreover, IT has few resources to help train end users with Teams best practices.
Microsoft Teams is not a standalone app. Successful utilization of Teams occurs when conceived in the broader context of how it integrates with Office 365. Understanding how information flows between Teams, SharePoint Online, and OneDrive for Business, for instance, will aid governance with permissions, information storage, and file sharing.
Use Info-Tech’s Microsoft Teams Cookbook to successfully implement and use Teams. This cookbook includes recipes for:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Understand best practices for governance of the Teams creation process and Teams rollout.
Get end users on board with this series of how-tos and common use cases for Teams.
[infographic]
Executive Brief
Section 1: Teams for IT
Section 2: Teams for End Users
Remote work calls for leveraging your Office 365 license to utilize Teams – but IT is unsure about best practices for governance and permissions.
Without a framework or plan for governing the rollout of Teams, IT risks overlooking secure use of Teams, the phenomenon of “teams sprawl,” and not realizing how Teams integrates with Office 365 more broadly.
Teams needs to be rolled out quickly, but IT has few resources to help train end users with Teams best practices.
With teams, channels, chats, meetings, and live events to choose from, end users may get frustrated with lack of guidance on how to use Teams’ many capabilities.
Use Info-Tech’s Microsoft Teams Cookbook to successfully implement and utilize Teams. This cookbook includes recipes for:
Successful utilization of Teams occurs when conceived in the broader context of how it integrates with Office 365. Understanding how information flows between Teams, SharePoint Online, and OneDrive for Business, for instance, will aid governance with permissions, information storage, and file sharing.
No initial governance for team creation can lead to “teams sprawl.” While Teams was built to allow end users’ creativity to flow in creating teams and channels, this can create problems with a cluttered interface and keeping track of information. To prevent end-user dissatisfaction here, IT’s initial Teams rollout should offer a basic structure for end users to work with first, limiting early teams sprawl.
Knowing how Teams integrates with other Office 365 apps will help with rolling out sensitivity labels to protect important information being accidentally shared in Teams. Of course, technology only does so much – proper processes to train and hold people accountable for their actions with data sharing must be implemented, too.
Don’t waste your time deploying yet another collaboration tool that won’t get used.
Your legacy telephony infrastructure is dragging you down – modern communications and collaboration technology will dramatically improve productivity.
One small step to cloud, one big leap to Office 365. The key is to look before you leap.
| Section 1
Teams for IT |
Section 2
Teams for end users |
From determining prerequisites to engaging end users.
IT needs to be prepared to manage other dependent services when rolling out Teams. See the figure below for how Teams integrates with these other Office 365 applications.
Please note: To appeal to the majority of Info-Tech’s members, this blueprint refers to Teams in the context of Office 365 Enterprise licenses.
You will already have at least one global administrator from setting up Office 365.
Global administrators have almost unlimited access to settings and most of the data within the software, so Microsoft recommends having only two to four IT and business owners responsible for data and security.
Configure multifactor authentication for your dedicated Office 365 global administrator accounts and set up two-step verification.
Once you have organized your global administrators, you can designate your other administrators with “just-enough” access for managing Teams. There are four administrator roles:
| Teams Service Administrator | Manage the Teams service; manage and create Microsoft 365 groups. |
| Teams Communications Administrator | Manage calling and meetings features with Teams. |
| Teams Communications Support Engineer | Troubleshoot communications issues within Teams using the advanced troubleshooting toolset. |
| Teams Communications Support Specialist | Troubleshoot communications issues using Call Analytics. |
There are three prerequisites before Teams can be rolled out:
Microsoft then recommends the following checklist to optimize your Teams utilization:
For online support and walkthroughs, utilize Advisor for Teams. This assistant can be found in the Teams admin center.
You can create and manage Teams through the Teams PowerShell module and the Teams admin center. Only the global administrator and Teams service administrator have full administrative capabilities in this center.
Governance over team creation intends to prevent “teams sprawl” – the phenomenon whereby end users create team upon team without guidance. This creates a disorganized interface, with issues over finding the correct team and sharing the right information.
Prevent teams sprawl by painting the first picture for end users:
For smaller organizations that are project-driven, organize teams by projects. For larger organizations with established, siloed departments, organize by department; projects within departments can become channels.
Teams does not integrate with SharePoint Server.
Governance of Teams is important because of how tightly it integrates with other Office 365 apps, including SharePoint Online.
A poor rollout of Teams will have ramifications in SharePoint. A good rollout will optimize these apps for the organization.
Teams and SharePoint integrate in the following ways:
End users should be encouraged to integrate their teams and channels with existing SharePoint folders and, where no folder exists, to create one in SharePoint first before then attaching a team to it.
Within the Teams admin center, the global or Teams service administrator can manage Teams policies.
Typical Teams policies requiring governance include:
Chosen policies can be either applied globally or assigned to specific users.
If organizations need to share sensitive information within the bounds of a certain group, private channels help protect this data. However, inviting users into that channel will enable them to see all shared history.
Within the security and compliance center, the global or Teams service administrator can set external and guest access.
External access (federation) – turned on by default.
Guest access – turned off by default.
If guest access is enabled, it is subject to Azure AD and Office 365 licensing and service limits. Guests will have no access to the following, which cannot be changed:
Within the security and compliance center, you can allow users to add sensitivity labels to their teams that can prevent external and guest access.
To reduce the number of unused teams and channels, or delete information permanently, the global or Teams service administrator can implement an Office 365 group expiration and archiving policy through the Teams admin center.
If a team has an expiration policy applied to it, the team owner will receive a notification for team renewal 30 days, 15 days, and 1 day before the expiry date. They can renew their team at any point within this time.
Alternatively, teams and their channels (including private) can be archived. This will mean that all activity for the team ceases. However, you can still add, remove, and update roles of the members.
Retention policies can be created and managed in the Microsoft 365 Compliance Center or the security and compliance center PowerShell cmdlets. This can be applied globally or to specific users.
By default, information shared through Teams is retained forever.
However, setting up retention policies ensures data is retained for a specified time regardless of what happens to that data within Teams (e.g. user deletes).
To prevent external or guest users accessing and deleting sensitive data, Teams is able to block this content when shared by internal users. Ensure this is configured appropriately in your organization:
Please note the following limitations of Teams’ retention and data loss prevention:
Teams has built-in functionality to call any team member within the organization through VoIP.
However, Teams does not automatically connect to the PSTN, meaning that calling or receiving calls from external users is not immediately possible.
Bridging VoIP calls with the PSTN through Teams is available as an add-on that can be attached to an E3 license or as part of an E5 license.
There are two options to enable this capability:
Skype for Business is being retired; Microsoft offers a range of transitions to Teams.
Combine the best transition mode with Info-Tech’s adoption best practices to successfully onboard and socialize Teams.
Skype for Business Online will be retired on July 31, 2021. Choose from the options below to see which transition mode is right for your organization.
Skype for Business On-Premises will be retired in 2024. To upgrade to Teams, first configure hybrid connectivity to Skype for Business Online.
The more that’s left behind in Slack, the easier the transition. As a prerequisite, pull together the following information:
Your Slack service plan will determine what you can and can’t migrate. By default, public channels content can be exported. However, private channels may not be exportable, and a third-party app is needed to migrate Direct Messages.
Once you have set up your teams and channels in Teams, you can programmatically copy files from Slack into the target Teams channel.
Once you have a list of apps and their configurations used in Slack’s workspaces, you can search in Teams’ app store to see if they’re available for Teams.
Slack user identities may not map onto a Microsoft account. This will cause migration issues, such as problems with exporting text content posted by that user.
| Follow the migration steps to the right.
Importantly, determine which Slack workspaces and channels should become teams and channels within Teams. Usage statistics from Slack can help pinpoint which workspaces and channels are redundant. This will help IT paint an ordered first picture for new Teams end users. |
|
Avoid data-handling violations. Determine what privacy and compliance regulations (if any) apply to the handling, storage, and processing of data during this migration.
Change management is a challenging aspect of implementing a new collaboration tool. Creating a communication and adoption plan is crucial to achieving universal buy-in for Teams.
To start, define SMART objectives and create a goals cascade.
| Specific | Measurable | Actionable | Realistic | Time Bound |
| Make sure the objective is clear and detailed. | Objectives are `measurable` if there are specific metrics assigned to measure success. Metrics should be objective. | Objectives become actionable when specific initiatives designed to achieve the objective are identified. | Objectives must be achievable given your current resources or known available resources. | An objective without a timeline can be put off indefinitely. Furthermore, measuring success is challenging without a timeline. |
| Who, what, where, why? | How will you measure the extent to which the goal is met? | What is the action-oriented verb? | Is this within my capabilities? | By when: deadline, frequency? |
Sample list of stakeholder-specific benefits from improving collaboration
| Stakeholder | Driver | Benefits |
| Senior Leadership | Resource optimization | Increased transparency into IT operational costs. Better ability to forecast hardware, resourcing costs. |
| All employees | Increasing productivity | Apps deployed faster. Issues fixed faster. Easier access to files. Able to work more easily offsite. |
| LBU-HR, legal, finance | Mitigating risk | Better able to verify compliance with external regulations. Better understanding of IT risks. |
| Service desk | Resource optimization | Able to resolve issues faster. Fewer issues stemming from updates. |
| Tier 2 | Increasing productivity | Less time spent on routine maintenance. |
Use these activities to define what pain points stakeholders face and how Teams can directly mitigate those pain points.
(Source: Rationalize Your Collaboration Tools (coming soon), Activities: 3.1C – 3.1D)Deploy Teams over a series of phases. As such, if you are already using Skype for Business, choose one of the coexistence phases to start.

(Source: Rationalize Your Collaboration Tools (coming soon), Tools:GANTT Chart and Marketing Materials, Activities: 3.2A – 3.2B)
Be in control of setting and maintaining expectations. Aligning expectations with reality and the needs of employees will lower onboarding resistance.
Microsoft has a range of training support that can be utilized. From instructor-led training to “Coffee in the Cloud” sessions, leverage all the support you can.
Your organization requires you to retain data and documents for a certain period of time; however, after this period, your organization wishes to delete or archive the data instead of maintaining it indefinitely. Within the timeframe of the retention policy, the admin may be asked to retrieve information that has been requested through a legal channel.
| Content type | eDiscoverable | Notes |
| Teams chat messages | Yes | Chat messages from chats where guest users are the only participants in a 1:1 or 1:N chat are not e-discoverable. |
| Audio recordings | No | |
| Private channel messages | Yes | |
| Emojis, GIFs, stickers | Yes | |
| Code snippets | No | |
| Chat links | Yes | |
| Reactions (likes, hearts, etc) | No | |
| Edited messages | Yes | If the user is on hold, previous versions of edited messages are preserved. |
| Inline images | Yes | |
| Tables | Yes | |
| Subject | Yes | |
| Quotes | Yes | Quoted content is searchable. However, search results don’t indicate that the content was quoted. |
| Name of channel | No |
E-discovery does not capture audio messages and read receipts in MS Teams.
Since files shared in private channels are stored separately from the rest of a team, follow Microsoft’s directions for how to include private channels in e-discovery. (Source: “Conduct an eDiscovery investigation of content in Microsoft Teams,” Microsoft, 2020.)
A team in your organization needs to work in an ongoing way with someone external to the company. This user needs access to the relevant team’s work environment, but they should not be privy to the goings-on in the other parts of the organization.
This external person needs to be able to:
In order to avoid teams sprawl, organizations may want IT to periodically delete or archive unused teams within the Teams client in order to improve the user interface.
Alternately, if you are using a project-based approach to organizing Teams, you may wish to formalize a process to archive a team once the project is complete.
Remind end users that they can hide teams or channels they do not wish to see in their Teams interface. Knowing a team can be hidden may impact a team owner’s decision to delete it.
| Section 1
Teams for IT |
Section 2
Teams for end users |
From Teams how-tos to common use cases for end users.
For any Microsoft Teams newcomer, the differences between teams, channels, and chat can be confusing.
Use Microsoft’s figure (left) to see how these three mediums differ in their role and function.
| Team A workspace for a group of collaborative individuals. |
Public Channel A focused area where all members of a team can meet, communicate, and share ideas and content. |
Private Channel Like a public channel but restricted to a subset of team members, defined by channel owner. |
Group Chat Two or more users collected into a common conversation thread. |
|
| Limits and Administrative Control | ||||
| Who can create? | Default setting: All users in an organization can create a team
Maximum 500,000 teams per tenant |
Any member of a team can create a public channel within the team
Maximum 200 public channels per team |
Any member of a team can create a private channel and define its members
Maximum 30 private channels per team |
Anyone |
| Who can add members? | Team owner(s); max 5,000 members per team | N/A | Channel owner(s) can add up to 250 members | Anyone can bring new members into the chat (and decide if they can see the previous history) up to 100 members |
| Who can delete? | Team owner/admin can delete | Any team member | Channel owner(s) | Anyone can leave a chat but cannot delete chat, but they are never effectively deleted |
| Social Context | ||||
| Who can see it? | Public teams are indexed and searchable
Private teams are not indexed and are visible only to joined members |
All members of the team can see all public channels. Channels may be hidden from view for the purposes of cleaning up the UI. | Individuals will only see private channels for which they have membership | Only participants in the group chat can see the group chat |
| Who can see the content? | Team members can see any content that is not otherwise part of a private channel | All team members | All members of the private channel | Only members of the group chat |
When does a Group Chat become a Channel?
When does a Channel become a Team?
| Team A workspace for a group of collaborative individuals. |
Public Channel A focused area where all members of a team can meet, communicate, and share ideas and content. |
Private Channel Like a public channel but restricted to a subset of team members, defined by channel owner. |
Group Chat Two or more users collected into a common conversation thread. |
|
| Data and Applications | ||||
| Where does the content live? | SharePoint: Every team resides in its own SharePoint site | SharePoint: Each team (public and private) has its own folder off the root of the SharePoint site’s repository | SharePoint: Each team (public and private) has its own folder off the root of the SharePoint site’s repository | OneDrive: Files that are shared in a chat are stored in the OneDrive folder of the original poster and shared to the other members |
| How does the data persist or be retained? | If a team expires/is deleted, its corresponding SharePoint site and those artifacts are also deleted | Available for 21 days after deletion. Any member of the team can delete a public channel. | The team owner and private channel owner can delete/restore a private channel | Chats are never effectively deleted. They can be hidden to clean up the user interface. |
| Video | N/A | Yes, select “Meet now” in channel below text entry box | Yes, select “Meet now” in channel below text entry box | Yes |
| Phone calls | N/A | Yes, select “Meet now” in channel below text entry box | Yes, select “Meet now” in channel below text entry box | Yes |
| Shared computer audio/screen | N/A | Yes, select “Meet now” in channel below text entry box | Yes, select “Meet now” in channel below text entry box | Yes |
| File-sharing | Within channels | Yes. Frequently used/collaborated files can be turned into discrete tab. | Yes. Frequently used/collaborated files can be turned into discrete tab. | Yes |
| Wikis | Within channels | Yes | Yes | No |
| Whiteboarding | No | No | No | No |
When does a Team become a Channel?
When does a Channel become a Group Chat?
Team owner: The person who creates the team. It is possible for the team owner to then invite other members of the team to become co-owners to distribute administrative responsibilities.
Team members: People who have accepted their invitation to be a part of the team.
NB: Your organization can control who has permission to set up a team. If you can’t set a up a team, contact your IT department.
tab on the left-hand side of the app'. Step 2: 'At the bottom of the app, click '. Step 3: 'Under the banner , click '.">
Decide from these two options:
NB: You cannot create a team from an existing group if:

Decide if you want you new team from scratch to be private or public. If you set up a private team, any internal or external user you invite into the team will have access to all team history and files shared.
'.">

Decide from these two options:
NB: You cannot create a team from an existing group if:

Configure your new team settings, including privacy, apps, tabs, and members.
'.">
Add team members |
Remove team members |
||
![]() |
To add a team member, on the right-hand side of the team name, click “More options.” Then, from the drop-down menu, click “Add member.” |
![]() |
Only team owners can remove a team member. To do so, on the right-hand side of the team name, click “More options.” Then, from the drop-down menu, click “Manage team.” |
If you’re a team owner, you can then type a name or an email address to add another member to the team. If you’re a team member, typing a name or an email address will send a request to the team owner to consider adding the member. |
![]() Under the “Members” tab, you’ll see a list of the members in the team. Click the “X” at the far right of the member’s name to remove them. Team owners can only be removed if they change their role to team member first. |
||
![]() |
On the right-hand side of the team name, click “More options.” Then, from the drop-down menu, click “Add channel.” |
Name your channel, give a description, and set your channel’s privacy. |
![]() |
To manage subsequent permissions, on the right-hand side of the channel name, click “More options.” Then, from the drop-down menu, click “Manage channel.” |
Adding and removing members from channels:Only members in a team can see that team’s channels. Setting channel privacy as “standard” means that the channel can be accessed by anyone in a team. Unless privacy settings for a channel are set as “private” (from which the channel creator can choose who can be in that channel), there is no current way to remove members from channels. It will be up to the end user to decide which channels they want to hide. |
![]() |
Need to find the SharePoint URL? ', 'Click to access the folder's SharePoint URL.'"> |
Hide/unhide teams |
Hide/unhide channels |
||
![]() |
To hide a team, on the right-hand side of the team name, click “More options.” Then, from the drop-down menu, click “Hide.” Hidden teams are moved to the “hidden teams” menu at the bottom of your team list. |
![]() |
To hide a channel, on the right-hand side of the channel name, click “More options.” Then, from the drop-down menu, click “Hide.” Hidden channels are moved to the “hidden channels” menu at the bottom of your channel list in that team. |
![]() |
To unhide a team, click on the “hidden teams” menu. On the right-hand side of the team name, click “More options.” Then, from the drop-down menu, click “Show.” |
![]() |
To unhide a channel, click on the “hidden channels” menu at the bottom of the team. This will produce a drop-down menu of all hidden channels in that team. Hover over the channel you want to unhide and click “Show.” |
Find/join teams |
Leave teams |
||||
![]() |
Click the “Teams” tab on the left-hand side of the app. | ![]() At the bottom of the app, click “Join or create a team.” Teams will then suggest a range of teams that you might be looking for. You can join public teams immediately. You will have to request approval to join a private team. |
![]() |
To leave a team, on the right-hand side of the team name, click “More options.” Then, from the drop-down menu, click “Leave the team.” |
|
| NB: If the owner of a private team has switched off discoverability, you will have to contact that owner to join that team. | ![]() |
If you can’t immediately see the team, you have two options: either search for the team or enter that team’s code under the banner “Join a team with a code.” | Can I find a channel?
No. To join a channel, you need to first join the team that channel belongs to. Can I leave a channel?No. The most you can do is hide the channel. By default, if you join a team you will have access to all the channels within that team (unless a channel is private, in which case you’ll have to request access to that channel). |
||

Hide a chat |
Unhide a chat |
|
![]() |
To unhide a chat, search for the hidden person or name of the group chat in the search bar. Click “More options.” Then click “Unhide.” | ![]() |
Leave a chat |
||
| You can only leave group chats. To do so, click “More options.” Then click “Leave.” | ![]() |
|
Teams Meetings: Real-time communication and collaboration between a group, limited to 250 people.
Teams Live Events: designed for presentations and webinars to a large audience of up to 10,000 people, in which attendees watch rather than interact.
Office 365 and Microsoft 365 Licenses |
||||||
| I want to: | F1 | F3 | E1 | E3 | E5 | Audio conferencing add-on |
| Join a Teams meeting | No license required. Any email address can participate in a Teams meeting. | |||||
| Attend a Teams meeting with a dial-in phone number | No license required. Any phone number can dial into a Teams meeting. (Meeting organizers need to have an Audio Conferencing add-on license to send an invite that includes dial-in conferencing.) | |||||
| Attend a Teams live event | No license required. Any phone number can dial into a Teams live event. | |||||
| Create a Teams meeting for up to 250 attendees | One of these licensing plans | |||||
| Create a Teams meeting for up to 250 attendees with a dial-in phone number | One of these licensing plans + Audio Conferencing (Meeting organizers need to have an Audio Conferencing add-on license to send an invite that includes dial-in conferencing.) | |||||
| Create a Teams live event for up to 10,000 attendees | One of these licensing plans | |||||
| Dial out from a Teams meeting to add someone at their Call me at number | One of these licensing plans + Audio Conferencing (Meeting dial out to a Call me at number requires organizers to have an E5 or Audio Conference add-in license. A dial plan may also be needed.) | |||||
Depending on the use case, end users will have to determine whether they need to hold a meeting or a live event.
Use Microsoft’s table (left) to see what license your organization needs to perform meetings and live events.
(Source: “Admin quick start – Meetings and live events in Microsoft Teams,” Microsoft, 2020.)| Ad Hoc Call Direct audio/video call |
Scheduled Meeting | Live Event | |
| Limits and Administrative Control | |||
| Who can create? | Anyone | Anyone | Anyone, unless altered by admin (permission to create MS Stream events also required if external production tools are used). |
| Who can add members? | Anyone in the session. | The meeting organizer can add new attendees to the meeting. | The event creator (the “organizer”) sets attendee permissions and assigns event group roles (“producer” and “presenter”). |
| Can external stakeholders attend? | Yes, through email invite. However, collaboration tools are restricted. | Yes, through email invite. However, collaboration tools are restricted. | Public events: yes, through shared invite link. Org-wide event: yes, if guest/external access granted. |
| Who can delete? | Anyone can leave the session. There is no artifact to delete. | The meeting organizer | Any attendee can leave the session. The organizer can cancel the event. |
| Maximum attendees | 100 | 250 | 10,000 attendees and 10 active presenters/producers (250 presenters and producers can be present at the event). |
| Social Context | |||
| How does the request come in? | Unscheduled. Notification of an incoming audio or video call. |
Scheduled. Meeting invite, populated in the calendar, at a scheduled time. |
Meeting only auto-populated in event group’s calendars. Organizer must circulate event invite link to attendees – for instance, by pasting link into an Outlook meeting invite. |
| Available Functionality | |||
| Screen-sharing | Yes | Yes | Producers and Presenters (through Teams, no third-party app). |
| Whiteboard | No | Yes | Yes |
| OneNote (for minutes) | Yes (from a member’s OneDrive) | Yes, part of the meeting construct. | No. A Meeting Notes tab is available instead. |
| Dedicated chat space | Yes. Derived from a group chat. | Meeting has its own chat room. | The organizer can set up a moderated Q&A (not chat) when creating the event. Only Presenters and Producers can chat. |
| Recording | Yes | Yes | Yes. Event can last up to 4 hours. |
When should an Ad Hoc Call become a Scheduled Meeting?
When should a Scheduled Meeting become an Ad Hoc Call?
When should a Live Event be created?


When you host a meeting online with Microsoft Teams, there will always be a chatroom associated with the meeting. While this is a great place for meeting participants to interact, there is one particular downside.
Problem: The never-ending chat. Often the activity in these chatrooms can persist long after the meeting. The chatroom itself becomes, unofficially, a channel. When end users can’t keep up with the deluge of communication, the tools have failed them.
Solution: Adding an existing channel to the meeting. This ensures that discussion activity is already hosted in the appropriate venue for the group, during and after the meeting. Furthermore, it provides non-attendees with a means to catch up on the discussion they have missed.
In section two of this cookbook, we will often refer to this tactic.
Don’t have a channel for the chat session of your online meeting? Perhaps you should!
If your meeting is with a group of individuals that will be collaborating frequently, they may need a workspace that persists beyond the meeting.
Guests can still attend the meeting, but they can’t chat!
If there are attendees in your meeting that do not have access to the channel you select to host the chat, they will not see the chat discussion nor have any ability to use this function.
This may be appropriate in some cases – for example, a vendor providing a briefing as part of a regular team meeting.
However, if there are attendees outside the channel membership that need to see the meeting chat, consider another channel or simply default to not assigning one.
Show device settings. For settings concerning audio, video, and whether viewing is private.
Show meeting notes. Use to take notes throughout the meeting. The notes will stay attached to this event.
Show meeting details. Find meeting information for: a dial-in number, conference ID, and link to join.
Enter full screen.
Show background effects. Choose from a range of video backgrounds to hide/blur your location.
Turn on the captions (preview). Turn on live speech-to-text captions.
Keypad. For dialing a number within the meeting (when enabled as an add-on with E3 or as part of E5).
Start recording. Recorded and saved using Microsoft Stream.
End meeting.
Turn off incoming video. To save network bandwidth, you can decline receiving attendee’s video.
Click “More options” to access the meetings settings.
Screen share. In the tool tray, select “Share” to share your screen. Select particular applications if you only want to share certain information; otherwise, you can share your whole desktop.
System audio share. To share your device’s audio while screen sharing, checkbox the “Include system audio” option upon clicking “Share.”
If you didn’t click that option at the start but now want to share audio during screen share, click the “Include systems audio” option in the tool tray along the top of the screen.
Give/take control of screen share. To give control, click “Give control” in the tool tray along the top of the screen when sharing content. Choose from the drop-down who you would like to give control to. In the same spot, click “Take back control” when required.
To request control, click “Request control” in the same space when viewing someone sharing their content. Click “Release control” once finished.
NB: Anonymous, federated, or guest users are currently not supported to start, view, or ink a whiteboard in a Teams meeting.
No. However, the final whiteboard will be available to all meeting attendees after the meeting, under “Board Gallery” in the Microsoft Whiteboard app. Attendees can then continue to work on the whiteboard after the meeting has ended.
![]() |
As the organizer, you can invite other people to the event who will be the “producers” or “presenters.” Producers: Control the live event stream, including being able to start and stop the event, share their own and others’ video, share desktop or window, and select layout. Presenters: Present audio, video, or a screen. |
![]() |
Select who your audience will be for your live event from three options: specified people and groups, the organization, or the public with no sign-in required. Edit the setting for whether you want recording to be available for attendees. Then click “Schedule” to finish. |
|
When you join the live event as a producer/presenter, nothing will be immediately broadcast. You’ll be in a pre-live state. Decide what content to share and in what order. Along the bottom of the screen, you can share your video and audio, share your screen, and mute incoming attendees. Once your content is ready to share along the bottom of the screen, add it to the screen on the left, in order of viewing. This is your queue – your “Pre-live” state. Then, click “Send now.” This content will now move to the right-hand screen, ready for broadcasting. Once you’re ready to broadcast, click “Start.” Your state will change from “Pre-live” to “Live.” Along the top right of the app will be a tools bar. |
![]() |
Scenario: Most of your organization’s communication and collaboration occurs within its pre-existing departmental divisions.
Conventional communication channels:
Solution: Determine the best way to organize your organization’s departments in Teams based on its size and your requirements to keep information private between departments.
Option A:
Option B:
Option C:
Scenario: Your organization has struck a committee composed of members from different departments. The rest of the organization should not have access to the work done in the committee.
Purpose: To analyze a particular organizational challenge and produce a plan or report; to confidentially develop or carry out a series of processes that affect the whole organization.
Jobs: Committee members must be able to:
Solution:
Ingredients:
Construction:
Scenario: The organization holds a yearly innovation day event in which employees form small groups and work on a defined, short-term problem or project.
Purpose: To develop innovative solutions and ideas.
Jobs:
Solution:
Ingredients:
Construction:
Scenario: Employees within the organization wish to organize social events around shared interests: board game clubs, book clubs, TV show discussion groups, trivia nights, etc.
Purpose: To encourage cohesion among coworkers and boost morale.
Jobs:
Solution:
Ingredients:
Construction:
Scenario: Within a department/workplace team, employees are assigned to projects with defined end times, after which they will be assigned to a new project.
Purpose: To complete project-based work that fulfills business needs.
Jobs:
Solution:
If your working group already has its own team within Teams:
If your workplace team does not already have its own team in Teams:
Hide the channel after the project concludes to de-clutter your Teams user interface.
Scenario: The organization must interview a slate of candidates to fill an open position.
Purpose:
Jobs:
Solution:
Ingredients:
Construction:
NB: The external candidate does not need the Teams application. Through the meeting invite, the external candidate will join via a web browser.
Scenario: Every quarter, the organization holds its regular board meeting.
Purpose: To discuss agenda items and determine the company’s future direction.
Jobs:
During meeting:Solution:
Ingredients:
Construction:
NB: The external guests do not need the Teams application. Through the meeting invite, the guests will join via a web browser.
Scenario: A team meets for a weekly recurring meeting. The meeting is facilitated by the team lead (or manager) who addresses through agenda items and invites participation from the attendees.
Purpose: The purpose of the meeting is to:
Jobs: The facilitator must:
Solution:
Ingredients:
Construction:
NB: Create the meeting in the Teams calendar, not Outlook, or you will not be able to add the Teams channel. As meeting organizer, put your name in the meeting invite notes, as the channel will show as the organizer in the Outlook invite.
Scenario: Each morning, at 9am, members of the team meet online.
Purpose: After some pleasantries, the team discusses what tasks they each plan to complete in the day.
Jobs: The team leader (or scrum master) must:
Solution:
Ingredients:
Meeting Place Construction:
Scrum Board Construction:
Scenario: An audio-only conversation that could be a regularly scheduled event but is more often conducted on an ad-hoc basis.
Purpose: To quickly share information, achieve consensus, or clarify misunderstandings.
Jobs:
Solution:
Ingredients:
Construction:
NB: Microsoft Teams can be configured to provide an organization’s telephony for external calls, but this requires an E5 license. Additional audio-conferencing licenses are required to call in to a Teams meeting over a phone.
You have a mandate to create an accurate and actionable database of the IT assets in your environment, but:
ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. But there’s no value in data for data’s sake. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an ITAM strategy that maximizes the value they can deliver as service providers.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This two-phase, step-by-step methodology will guide you through the activities to build a business-aligned, coherent, and durable approach to ITAM. Review the executive brief at the start of the slide deck for an overview of the methodology and the value it can provide to your organization.
Use this template to document your IT asset management strategy and approach.
Use this tool to estimate key data points related to your IT asset estate, as well as your confidence in your estimates.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Align key stakeholders to the potential strategic value of the IT asset management practice.
Ensure the ITAM practice is focused on business-aligned goals.
Define a business-aligned direction and expected outcomes for your ITAM program.
1.1 Brainstorm ITAM opportunities and challenges.
1.2 Conduct an executive alignment working session.
1.3 Set ITAM priorities, goals and tactics.
1.4 Identify target and current state ITAM maturity.
ITAM opportunities and challenges
Align executive priorities with ITAM opportunities.
ITAM metrics and KPIs
ITAM maturity
Translate goals into specific and coherent actions to enable your ITAM practice to deliver business value.
A business-aligned approach to ITAM, encompassing scope, structure, tools, audits, budgets, documentation and more.
A high-level roadmap to achieve your vision for the ITAM practice.
2.1 Define ITAM scope.
2.2 Acquire ITAM services (outsourcing and contracting).
2.3 Centralize or decentralize ITAM capabilities.
2.4 Create a RACI for the ITAM practice.
2.5 Align ITAM with other service management practices.
2.6 Evaluate ITAM tools and integrations.
2.7 Create a plan for internal and external audits.
2.8 Improve your budget processes.
2.9 Establish a documentation framework.
2.10 Create a roadmap and communication plan.
Your ITAM approach
ITAM roadmap and communication plan
17 Phase 1: Establish Business-Aligned ITAM Goals and Priorities
59 Phase 2: Support ITAM Goals and Priorities
116 Bibliography
| Track hardware and software. Seems easy, right?
It’s often taken for granted that IT can easily and accurately provide definitive answers to questions like “how many laptops do we have at Site 1?” or “do we have the right number of SQL licenses?” or “how much do we need to budget for device replacements next year?” After all, don’t we know what we have? IT can’t easily provide these answers because to do so you must track hardware and software throughout its lifecycle – which is not easy. And unfortunately, you often need to respond to these questions on very short notice because of an audit or to support a budgeting exercise. IT Asset Management (ITAM) is the solution. It’s not a new solution – the discipline has been around for decades. But the key to success is to deploy the practice in a way that is sustainable, right-sized, and maximizes value. Use our practical methodology to develop and document your approach to ITAM that is aligned with the goals of your organization.
|
Realize the value of asset management
Cost optimization, application rationalization and reduction of technical debt are all considered valuable to right-size spending and improve service outcomes. Without access to accurate data, these activities require significant investments of time and effort, starting with creation of point-in-time inventories, which lengthens the timeline to reaching project value and may still not be accurate. Cost optimization and reduction of technical debt should be part of your culture and technical roadmap rather than one-off projects. Why? Access to accurate information enables the organization to quickly make decisions and pivot plans as needed. Through asset management, ongoing harvest and redeployment of assets improves utilization-to-spend ratios. We would never see any organization saying, “We’ve closed our year end books, let’s fire the accountants,” but often see this valuable service relegated to the back burner. Similar to the philosophy that “the best time to plant a tree is 20 years ago and the next best time is now,” the sooner you can start to collect, validate, and analyze data, the sooner you will find value in it.
|
| Your Challenge
You have a mandate to create an accurate and actionable database of the IT assets in your environment, but:
|
Common Obstacles
It is challenging to make needed changes because:
|
Info-Tech’s Approach
|
ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. But there’s no value in data for data’s sake. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an ITAM strategy that maximizes the value they can deliver as service providers.
Unlock business value with IT asset management
This blueprint will help you develop your approach for the management of IT hardware and software, including cloud services. Leverage other Info-Tech methodologies to dive directly into developing hardware asset management procedures, software asset management procedures, or to implement configuration management best practices. |
Info-Tech Members report significant savings from implementing our hardware and software asset management frameworks. In order to maximize value from the process-focused methodologies below, develop your ITAM strategy first. Implement Hardware Asset Management (Based on Info-Tech Measured Value Surveys results from clients working through these blueprints, as of February 2022.)
|
ITAM provides both early and ongoing valueITAM isn’t one-and-done. Properly supported, your ITAM practice will deliver up-front value that will help demonstrate the value ongoing ITAM can offer through the maintenance of an accurate, accessible, and actionable ITAM database. |
Example: Software Savings from ITAM![]() This chart shows the money saved between the first quote and the final price for software and maintenance by a five-person ITAM team. Over a year and a half, they saved their organization a total of $7.5 million from a first quote total of $21 million over that period. This is a perfect example of the direct value that ITAM can provide on an ongoing basis to the organization, when properly supported and integrated with IT and the business. |
|
|
Examples of up-front value delivered in the first year of the ITAM practice:
|
Examples of long-term value from ongoing governance, management, and operational ITAM activities:
|
|
The rulebook is available, but hard to follow
|
ITAM is a mature discipline with well-established standards, certifications, and tools, but we still struggle with it.
|
Adopt, manage, and mature activities to enable business value thorugh actionable, accessible, and accurate ITAM data
|
Enable Business Value |
|
Business-Aligned Spend
|
Facilitate IT Services
|
Context-Aware Risk Management
|
Plan & GovernBusiness Goals, Risks, and Structure
Ongoing Management Commitment
Culture
|
|
Build & ManageTools & Data
Process
People, Policies, and Providers
|
ITAM is a foundational IT service that provides actionable, accessible, and accurate data on IT assets. But there's no value in data for data's sake. Use this methodology to enable collaboration between ITAM, the business, and IT to develop an approach to ITAM that maximizes the value the ITAM team can deliver as service providers.
| IT asset management requires ongoing practice – you can’t just implement it and walk away.
Our methodology will help you build a business-aligned strategy and approach for your ITAM practice with the following outputs:
|
Each step of this blueprint is designed to help you create your IT asset management strategy:
|
| 1. Establish business-aligned ITAM goals and priorities | 2. Identify your approach to support ITAM priorities and goals | |
| Phase Steps |
|
|
| Phase Outcomes | Defined, business-aligned goals and priorities for ITAM. | Establish an approach to achieving ITAM goals and priorities including scope, structure, tools, service management integrations, documentation, and more. |
| Project Outcomes | Develop an approach and strategy for ITAM that is sustainable and aligned with your business priorities. | |
ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an approach to ITAM that maximizes the value they can deliver as service providers.
ITAM is often viewed (when it’s viewed at all) as a low-value administrative task that doesn’t directly drive business value. This can make it challenging to build a case for funding and resources.
Your ITAM strategy is a critical component to help you define how ITAM can best deliver value to your organization, and to stop creating data for the sake of data or just to fight the next fire.
To align ITAM practices to deliver organizational value, you need a very clear understanding of the organization’s goals – both in the moment and as they change over time.
Ensure your ITAM team has clear line of sight to business strategy, objectives, and decision-makers, so you can continue to deliver value as priorities change
ITAM teams rely heavily on staff, systems, and data beyond their direct area of control. Identify how you will influence key stakeholders, including technicians, administrators, and business partners.
Help them understand how ITAM success relies on their support, and highlight how their contributions have created organizational value to encourage ongoing support.
Benefits for IT
|
|
Benefits for the business
|
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." | "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." | "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." | "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Diagnostics and consistent frameworks used throughout all four options |
|||
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI around 12 calls over the course of 6 months.
What does a typical GI on this topic look like?
| Call #1: Scope requirements, objectives, and your specific challenges.
Call #2: Review business priorities. Call #3: Identify ITAM goals & target maturity. |
Call #4: Identify metrics and KPIs. | Call #5: Define ITAM scope.
Call #6: Acquire ITAM services. |
Call #7: ITAM structure and RACI.
Call #8: ITAM and service management. Tools and integrations. |
Call #10: Internal and external audits.
Call #11: Budgets & documentation Call #12: Roadmap, comms plan. Wrap-up. |
| Phase 1 | Phase 2 | |||
Workshop Overview |
Contact your account representative for more information.
|
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | |
Identify ITAM priorities & goals, maturity, metrics and KPIs |
Identify your approach to support ITAM priorities and goals |
Next Steps and wrap-Up (offsite) |
|||
| Activities |
1.1 Define ITAM. 1.2 Brainstorm ITAM opportunities and challenges. Conduct an executive alignment working session: 1.3 Review organizational priorities, strategy, and key initiatives. 1.4 Align executive priorities with ITAM opportunities. 1.5 Set ITAM priorities. |
2.1 Translate opportunities into ITAM goals and tactics. 2.2 Identify target and current state ITAM maturity. 2.3 Create mission and vision statements. 2.4 Identify key ITAM metrics and KPIs. |
3.1 Define ITAM scope. 3.2 Acquire ITAM services (outsourcing and contracting) 3.3 Centralize or decentralize ITAM capabilities. 3.4 Create a RACI for the ITAM practice. 3.5 Align ITAM with other service management practices. 3.6 Evaluate ITAM tools and integrations. |
4.1 Create a plan for internal and external audits. 4.2 Improve your budget processes. 4.3 Establish a documentation framework and identify documentation gaps. 4.4 Create a roadmap and communication plan. |
5.1 Complete in-progress deliverables from previous four days. 5.2 Set up review time for workshop deliverables and to discuss next steps. |
| Deliverables |
|
|
|
|
|
Phase 1:Establish business-aligned ITAM goals and priorities |
Phase 11.1 Define ITAM and brainstorm opportunities and challenges. Executive Alignment Working Session: 1.2 Review organizational priorities, strategy, and key initiatives. 1.3 Align executive priorities with ITAM opportunities & priorities. 1.4 Identify business-aligned ITAM goals and target maturity. 1.5 Write mission and vision statements. 1.6 Define ITAM metrics and KPIs. |
Phase 22.1 Define ITAM scope. 2.2 Acquire ITAM services (outsourcing and contracting). 2.3 Centralize or decentralize ITAM capabilities. 2.4 Create a RACI for the ITAM practice. 2.5 Align ITAM with other service management practices. 2.6 Evaluate ITAM tools and integrations. 2.7 Create a plan for internal and external audits. 2.8 Improve your budget processes. 2.9 Establish a documentation framework. 2.10 Create a roadmap and communication plan. |
Defined, business-aligned goals, priorities, and KPIs for ITAM. A concise vision and mission statement. The direction you need to establish a practical, right-sized, effective approach to ITAM for your organization.
Set yourself up for success with these three steps:
|
1. Identify participantsReview recommended roles and identify who should participate in the development of your ITAM strategy. |
2. Estimate assets managed todayWork through an initial assessment to establish ease of access to ITAM data and your level of trust in the data available to you. |
3. Create a working folderCreate a repository to house your notes and any work in progress, including your copy of the ITAM Strategy Template. |
Output: List of key roles for the strategy exercises outlined in this methodology
Participants: Project sponsor, Lead facilitator, ITAM manager and SMEs
This methodology relies on having the right stakeholders in the room to identify ITAM goals, challenges, roles, structure, and more. On each activity slide in this deck, you’ll see an outline of the recommended participants. Use the table below to translate the recommended roles into specific people in your organization. Note that some people may fill multiple roles.
| Role | Expectations | People |
| Project Sponsor | Accountable for the overall success of the methodology. Ideally, participates in all exercises in this methodology. May be the asset manager or whoever they report to. | Jake Long |
| Lead Facilitator | Leads, schedules, and manages all working sessions. Guides discussions and ensures activity outputs are completed. Owns and understands the methodology. Has a working knowledge of ITAM. | Robert Loblaw |
| Asset Manager(s) | SME for the ITAM practice. Provides strategic direction to mature ITAM practices in line with organizational goals. Supports the facilitator. | Eve Maldonado |
| ITAM Team | Hands-on ITAM professionals and SMEs. Includes the asset manager. Provide input on tactical ITAM opportunities and challenges. | Bruce Wayne, Clark Kent |
| IT Leaders & Managers | Leaders of key stakeholder groups from across the IT department – the CIO and direct reports. Provide input on what IT needs from ITAM, and the role their teams should play in ITAM activities. May include delegates, particularly those familiar with day-to-day processes relevant to a particular discussion or exercise. | Marcelina Hardy, Edmund Broughton |
| ITAM Business Partners | Non-IT business stakeholders for ITAM. This could include procurement, vendor management, accounting, and others. | Zhang Jin, Effie Lamont |
| Business Executives | Organizational leaders and executives (CFO, COO, CEO, and others) or their delegates. Will participate in a mini-workshop to identify organizational goals and initiatives that can present opportunities for the ITAM practice. | Jermaine Mandar, Miranda Kosuth |
Output: Estimates of quantity and spend related to IT assets, Confidence/margin of error on estimates
Participants: IT asset manager, ITAM team
| This exercise will help you evaluate the size of the challenge ahead in terms of the raw number of assets in your environment, the spend on those assets, and the level of trust your organization has in the ITAM data.
It is also a baseline snapshot your ability to relay key ITAM metrics quickly and confidently, so you can measure progress (in terms of greater confidence) over time.
Download the IT Asset Estimation Tracker |
“Any time there is doubt about the data and it doesn’t get explained or fixed, then a new spreadsheet is born. Data validation and maintenance is critical to avoid the hidden costs of having bad data” Allison Kinnaird,
|
Output: A repository for templates and work in progress
Participants: Lead facilitator
Create a central repository for collaboration – it seems like an obvious step, but it’s one that gets forgotten about
|
|
Don’t wait until the end to write down your good ideas.
|
|
“ITAM is a cultural shift more than a technology shift.” (Rory Canavan, SAM Charter)
| Any piece of technology can be considered an asset, but it doesn’t mean you need to track everything. |
|
|
|
According to the ISO 19770 standard on ITAM, an IT Asset is “[an] item, thing, or entity that can be used to acquire, process, store and distribute digital information and has potential or actual value to an organization.”
|
||
|
IT assets are distinct from capital assets. Some IT assets will also be capital assets, but not all will be. And not all capital assets are IT assets, either. |
||
|
IT assets are typically tracked by IT, not by finance or accounting.
|
||
|
It’s important to track IT assets in a way that enables IT to deliver value to the business – and an important part of this is understanding what not to track. This list should be aligned to the needs of your organization. |
||
What is IT asset management?
What IT Asset Management is NOT:Configuration Management: Configuration management databases (CMDBs) often draw from the same data pool as ITAM (many configuration items are assets, and vice versa), but they focus on the interaction, interconnection, and interoperation of configuration items within the IT estate. In practice, many configuration items will be IT assets (or parts of assets) and vice versa. Configuration and asset teams should work closely together as they develop different but complementary views of the IT environment. Use Info-Tech’s methodology to harness configuration management superpowers. Organizational Data Management: Leverage a different Info-Tech methodology to develop a digital and data asset management program within Info-Tech’s DAM framework. |
“Asset management’s job is not to save the organization money, it’s not to push back on software audits. It’s to keep the asset database as up-to-date and as trustworthy as possible. That’s it.” (Jeremy Boerger, Consultant & Author) “You can’t make any real decisions on CMDB data that’s only 60% accurate. You start extrapolating that out, you’re going to get into big problems.” (Mike Austin, Founder & CEO, MetrixData 360) |
What is an ITAM strategy?Our strategy document will outline a coherent, sustainable, business-aligned approach to ITAM.No single approach to ITAM fits all organizations. Nor will the same approach fit the same organization at different times. A world-leading research university, a state government, and a global manufacturer all have very different goals and priorities that will be best supported by different approaches to ITAM. This methodology will walk you through these critical decisions that will define your approach to ITAM:
|
“A good strategy has coherence, coordinating actions, policies, and resources so as to accomplish an important end. Most organizations, most of the time, don’t have this. Instead, they have multiple goals and initiatives that symbolize progress, but no coherent approach to accomplish that progress other than ‘spend more and try harder.’” (Good Strategy, Bad Strategy, Richard Rumelt) |
If you’ve never experienced a mature ITAM program before, it is almost certainly more rewarding than you’d expect once it’s functioning as intended.
Each of the below activities can benefit from accessible, actionable, and accurate ITAM data.
| Manage Risk: Effective ITAM practices provide data and processes that help mitigate the likelihood and impact of potentially damaging IT risks.
ITAM supports the following practices that help manage organizational risk:
|
Optimize Spend: Asset data is essential to maintaining oversight of IT spend, ensuring that scarce resources are allocated where they can have the most impact.
ITAM supports these activities that help optimize spend:
|
Improve IT Services: Asset data can help inform solutions development and can be used by service teams to enhance and improve IT service practices.
Use ITAM to facilitate these IT services and initiatives:
|
Input: Stakeholders with a vision of what ITAM could provide, if resourced and funded adequately
Output: A collection of ideas that, when taken together, create a vision for the future ITAM practice
Materials: ITAM strategy template, Whiteboard or virtual whiteboard
Participants: ITAM team, IT leaders and managers, ITAM business partners
It can be easy to lose sight of long-term goals when you’re stuck in firefighting mode. Let’s get the working group into a forward-looking mindset with this exercise.
Think about what ITAM could deliver with unlimited time, money, and technology.
As you hear your peers describe what they hope and expect to achieve with ITAM, a shared vision of what ITAM could be will start to emerge.
30 minutes
Input: The list of common challenges on the next slide, Your estimated visibility into IT assets from the previous exercise, The experience and knowledge of your participants
Output: Identify current ITAM challenges
Materials: Your working copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers, ITAM business partners
| What’s standing in the way today of delivering the ITAM practices you want to achieve?
Review the list of common challenges on the next slide as a group.
Add your results to your copy of the ITAM Strategy Template |
“The problem – the reason why asset management initiatives keep falling on their face – is that people attack asset management as a problem to solve, instead of a practice and epistemological construct.” (Jeremy Boerger, Consultant & Author) |
|
|
| What Else? | |
Copy results to your copy of the ITAM Strategy Template
Enter the executivesDeliver on leadership priorities
|
“What outcomes does the organization want from IT asset management? Often, senior managers have a clear vision for the organization and where IT needs to go, and the struggle is to communicate that down.” (Kylie Fowler, ITAM Intelligence)
|
A note to the lead facilitator and project sponsor:
Consider working through these exercises by yourself ahead of time. As you do so, you’ll develop your own ideas about where these discussions may go, which will help you guide the discussion and provide examples to participants.
Input: Organizational strategy documents
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template
Participants: Asset manager, IT leadership, Business executives or delegates
Welcome your group to the working session and outline the next few exercises using the previous slide.
Ask the most senior leader present to provide a summary of the following:
The facilitator or a dedicated note-taker should record key points on a whiteboard or flipchart paper.
30 minutes
Input: Organizational strategy documents
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template
Participants: Asset manager, IT leadership, Business executives or delegates
Ask the most senior leader present to provide a summary of the following: What transformative business and IT initiatives are planned? When will they begin and end?
Using one box per initiative, draw the initiatives in a timeline like the one below.
Add your results to your copy of the ITAM Strategy Template
45 minutes
Input: Organizational strategy documents
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: The diagram in the next slide, and/or a whiteboard, Your copy of the ITAM Strategy Template
Participants: Asset manager, IT leaders and managers, Business executives or delegates
In this exercise, we’ll use the table on the next slide to identify the top priorities of key business and IT stakeholders and connect them to opportunities for the ITAM practice.
Add your results to your copy of the ITAM Strategy Template
| ITAM is for the… | Who wants to… | Which presents these ITAM opportunities |
| CEO | Deliver transformative business initiatives | Acquire the right tech at the right time to support transformational initiatives. |
| Establish a data-driven culture of stewardship | Improve data to increase IT spend transparency. | |
| COO | Improve organizational efficiency | Increase asset use.
Consolidate major software contracts to drive discounts. |
| CFO | Accurately forecast spending | Track and anticipate IT asset spending. |
| Control spending | Improve data to increase IT spend transparency.
Consolidate major software contracts to drive discounts. |
|
| CIO | Demonstrate IT value | Use data to tell a story about value delivered by IT assets. |
| Govern IT use | Improve data to increase IT spend transparency. | |
| CISO | Manage IT security and compliance risks | Identify abandoned or out-of-spec IT assets.
Provide IT asset data to support controls development. |
| Respond to security incidents | Support security incident teams with IT asset data. | |
| Apps Leader | Build, integrate, and support applications | Identify opportunities to retire applications with redundant functionality.
Connect applications to relevant licensing and support agreements. |
| IT Infra Leader | Build and support IT infrastructure. | Provide input on opportunities to standardize hardware and software.
Provide IT asset data to technicians supporting end users. |
10-15 minutes
Input: The outputs from the previous exercise
Output: Executive priorities, sorted into the three categories at the right
Materials: The table in this slide, The outputs from the previous exercise
Participants: Lead facilitator
Give your participants a quick break. Quickly sort the identified ITAM opportunities into the three main categories below as best you can.
We’ll use this table as context for the next exercise.
| Example: | Optimize Spend | Enhance IT Services | Manage Risk |
| ITAM Opportunities |
|
|
|
Add your results to your copy of the ITAM Strategy Template
30 minutes
Input: Organizational strategy documents
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: Whiteboard, The template on the next slide, Your copy of the ITAM Strategy Template
Participants: Asset manager, IT leaders and managers, Business executives or delegates
The objective of this exercise is to prioritize the outcomes your organization wants to achieve from its ITAM practice, given the context from the previous exercises.
Review the image below. The three points of the triangle are the three core goals of ITAM: Enhance IT Service, Manage Risk, and Optimize Spend. This exercise was first developed by Kylie Fowler of ITAM Intelligence. It is an essential exercise to understand ITAM priorities and the tradeoffs associated with those priorities. These priorities aren’t set in stone and should be revisited periodically as technology and business priorities change.
| Draw the diagram on the next slide on a whiteboard. Have the most senior leader in the room place the dot on the triangle – the closer it is to any one of the goals, the more important that goal is to the organization. Note: The center of the triangle is off limits! It’s very rarely possible to deliver on all three at once.
Track notes on what’s being prioritized – and why – in the template on the next slide. |
|
Add your results to your copy of the ITAM Strategy Template
The priorities of the ITAM practice are to:
|
|
“ITAM is really no different from the other ITIL practices: to succeed, you’ll need some ratio of time, treasure, and talent… and you can make up for less of one with more of the other two.” (Jeremy Boerger, Consultant and Author)
15-30 minutes
Input: Organizational strategy documents
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers
Narrow down the list of opportunities to identify specific goals for the ITAM practice.
The highlighted opportunities are your near- and medium-term objectives.
| Optimize Spend | Enhance IT Services | Manage Risk | |
| Priority | Critical | Normal | High |
| ITAM Opportunities |
|
|
|
30 minutes
Input: Organizational strategy documents
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers
Let’s dig down a little deeper. Connect the list of opportunities from earlier to specific ITAM tactics that allow the team to seize those opportunities.
Add another row to the earlier table for ITAM tactics. Brainstorm tactics with your participants (e.g. sticky notes on a whiteboard) and align them with the priorities they’ll support.
| Optimize Spend | Enhance IT Services | Manage Risk | |
| Priority | Critical | Normal | High |
| ITAM Opportunities |
|
|
|
| ITAM Tactics to Seize Opportunities |
|
|
|
Add your results to your copy of the ITAM Strategy Template
20 minutes
Input: Organizational strategy documents
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers
We’ll use this exercise to identify the current and one-year target state of ITAM using Info-Tech’s ITAM maturity framework.
Add your results to your copy of the ITAM Strategy Template
|
Innovator – Optimized Asset Management
|
|
|
Innovator – Optimized Asset Management Business & Technology Partner – Proactive Asset Management Trusted Operator – Controls Assets Firefighter – Reactive Asset Tracking Unreliable - Struggles to Support |
Create two short, compelling statements that encapsulate:
Why bother creating mission and vision statements? After all, isn’t it just rehashing or re-writing all the work we’ve just done? Isn’t that (at best) a waste of time? There are a few very important reasons to create mission and vision statements:
|
“Brevity is the soul of wit.” (Hamlet, Act 2, Scene 2) “Writing is easy. All you have to do is cross out the wrong words.” (Mark Twain) |
30 minutes
Input: Organizational strategy documents
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: A whiteboard, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT Leaders and managers
Your vision statement describes the ITAM practice as it will be in the far future. It is a target to aspire to, beyond your ability to achieve in the near or medium term.
Examples of ITAM vision statements:
Develop the single accurate view of IT assets, available to anyone who needs it.
Indispensable data brokers that support strategic decisions on the IT environment.
Provide sticky notes to participants. Write out the three questions below on a whiteboard side by side. Have participants write their answers to the questions and post them below the appropriate question. Give everyone 10 minutes to write and post their ideas.
Review the answers and combine them into one focused vision statement. Use the 20x20 rule: take no more than 20 minutes and use no more than 20 words. If you’re not finished after 20 minutes, the ITAM manager should make any final edits offline.
Document your vision statement in your ITAM Strategy Template.
Add your results to your copy of the ITAM Strategy Template
30 minutes
Input: Organizational strategy documents
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers
Your ITAM mission statement is an expression of what your IT asset management function brings to your organization today. It should be presented in straightforward language that is compelling, easy to understand, and sharply focused.
Examples of ITAM mission statements:
Maintain accurate, actionable, accessible on data on all IT assets.
Support IT and the business with centralized and integrated asset data.
Provide sticky notes to participants. Write out the questions below on a whiteboard side by side. Have participants write their answers to the questions and post them below the appropriate question. Give everyone 10 minutes to write and post their ideas.
Review the answers and combine them into one focused vision statement. Use the 20x20 rule: take no more than 20 minutes and use no more than 20 words. If you’re not finished after 20 minutes, the ITAM manager should make any final edits offline.
Document your vision statement in your ITAM Strategy Template.
Add your results to your copy of the ITAM Strategy Template
Navigate a universe of ITAM metricsWhen you have the data, how will you use it?
|
ITAM Metrics
|
Drill down by:
|
60 minutes
Input: Organizational strategy documents
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers
Use this exercise to identify as many potentially useful ITAM metrics and reports as possible, and narrow them down to a few high-priority metrics. Leverage the list of example metrics on the next slide for your own exercise. If you have more than six participants, consider splitting into two or more groups, and divide the table between groups to minimize overlap.
| Role | Compliance | Quality | Quantity | Cost | Time | Progress |
| IT Asset Manager | Owned devices not discovered in last 60 days | Discrepancies between discovery data and ITAM DB records | # of corporate-owned devices | Spend on hardware (recent and future/ planned) | Average time, maximum time to deploy end-user devices | Number of ITAM roadmap items in progress |
| Service Desk | … |
Add your results to your copy of the ITAM Strategy Template
| Compliance | Quality | Quantity | Cost | Time/Duration/Age | Progress |
| Owned devices not discovered in last 60 days | Discrepancies between discovery data and ITAM DB records | # of corporate-owned devices | Spend on hardware (recent and future/planned) | Average time, maximum time to deploy end-user devices | Number of ITAM roadmap items in progress or completed |
| Disposed devices without certificate of destruction | Breakage rates (in and out of warranty) by vendor | # of devices running software title X, # of licenses for software title X | Spend on software (recent and future/planned) | Average time, maximum time to deploy end user software | Number of integrations between ITAM DB and other sources |
| Discrepancies between licenses and install count, by software title | RMAs by vendor, model, equipment type | Number of requests by equipment model or software title | Spend on cloud (recent and future/planned) | Average & total time spent on software audit responses | Number of records in ITAM database |
| Compliance reports (e.g. tied to regulatory compliance or grant funding) | Tickets by equipment type or software title | Licenses issued from license pool in the last 30 days | Value of licenses issued from license pool in the last 30 days (cost avoidance) | Devices by age | Software titles with an up-to-date ELP report |
| Reports on lost and stolen devices, including last assigned, date reported stolen, actions taken | User device satisfaction scores, CSAT scores | Number of devices retired or donated in last year | Number of IT-managed capital assets | Number of hardware/software request tickets beyond time-to-fulfil targets | Number of devices audited (by ITAM team via self-audit) |
| Number of OS versions, unpatched systems | Number of devices due for refresh in the next year | Spend saved by harvesting unused software | Number of software titles, software vendors managed by ITAM team | ||
| Audit accuracy rate | Equipment in stock | Cost savings from negotiations | |||
| # of users assigned more than one device | Number of non-standard devices or requests | Dollars charged during audit or true-up |
| Key performance indicators (KPIs) are metrics with targets aligned to goals.
Targets could include one or more of:
You may track many metrics, but you should have only a few KPIs (typically 2-3 per objective). A breached KPI should be a trigger to investigate and remediate the root cause of the problem, to ensure progress towards goals and priorities can continue. Which KPIs you track will change over the life of the practice, as ITAM goals and priorities shift. For example, KPIs may initially track progress towards maturing ITAM practices. Once you’ve reached target maturity, KPIs may shift to track whether the key service targets are being met. |
|
20 minutes
Input: Organizational strategy documents
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers
Good KPIs are a more objective measure of whether you’re succeeding in meeting the identified priorities for the ITAM practice.
Identify metrics that can measure progress or success against the priorities and goals set earlier. Aim for around three metrics per goal. Identify targets for the metric you think are SMART (specific, measurable, achievable, relevant, and timebound). Track your work using the example table below.
| Goal | Metric | Target |
| Consolidate major software contracts to drive discounts | Amount spent on top 10 software contracts | Decrease by 10% by next year |
| Customer satisfaction scores with enterprise software | Satisfaction is equal to or better than last year | |
| Value of licenses issued from license pool | 30% greater than last year | |
| Identify abandoned or out-of-spec IT assets | # of security incidents involving undiscovered assets | Zero |
| % devices with “Deployed” status in ITAM DB but not discovered for 30+ days | ‹1% of all records in ITAM DB | |
| Provide IT asset data to technicians for service calls | Customer satisfaction scores | Satisfaction is equal to or better than last year |
| % of end-user devices meeting minimum standards | 97% |
Add your results to your copy of the ITAM Strategy Template
Develop an IT Asset Management Strategy
Phase 2:Identify your approach to support ITAM priorities and goals | Phase 11.1 Define ITAM and brainstorm opportunities and challenges. Executive Alignment Working Session: 1.2 Review organizational priorities, strategy, and key initiatives. 1.3 Align executive priorities with ITAM opportunities & priorities. 1.4 Identify business-aligned ITAM goals and target maturity. 1.5 Write mission and vision statements. 1.6 Define ITAM metrics and KPIs. | Phase 22.1 Define ITAM scope. 2.2 Acquire ITAM services (outsourcing and contracting). 2.3 Centralize or decentralize ITAM capabilities. 2.4 Create a RACI for the ITAM practice. 2.5 Align ITAM with other service management practices. 2.6 Evaluate ITAM tools and integrations. 2.7 Create a plan for internal and external audits. 2.8 Improve your budget processes. 2.9 Establish a documentation framework. 2.10 Create a roadmap and communication plan. |
Establish an approach to achieving ITAM goals and priorities, including scope, structure, tools, service management integrations, documentation, and more.
Create a roadmap that enables you to realize your approach.
| Not all categories of assets require the same level of tracking, and some equipment and software should be excluded from the ITAM practice entirely.
In some organizations, portions of the environment won’t be tracked by the asset management team at all. For example, some organizations will choose to delegate tracking multi-function printers (MFPs) or proprietary IoT devices to the department or vendor that manages them. Due to resourcing or technical limitations, you may decide that certain equipment or software is out of scope for the moment. |
What do other organizations typically track in detail?
|
45 minutes
Input: Organizational strategy documents
Output: ITAM scope, in terms of types of assets tracked and not tracked
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers, ITAM business partners
Establish the hardware and software that are within the scope of the ITAM program by updating the tables below to reflect your own environment. The “out of scope” category will include asset types that may be of value to track in the future but for which the capability or need don’t exist today.
| Hardware | Software | Out of Scope |
|
|
|
The following locations will be included in the ITAM program: All North and South America offices and retail locations.
Add your results to your copy of the ITAM Strategy Template
“We would like our clients to come to us with an idea of where they want to get to. Why are you doing this? Is it for savings? Because you want to manage your security attack surface? Are there digital initiatives you want to move forward? What is the end goal?” (Mike Austin, MetrixData 360)
Allow your team to focus on strategic, value-add activities by acquiring services that free them from commodity tasks.
|
Business Enablement
|
Vendor’s Performance Advantage
|
Ask yourself:
You may ultimately choose to engage a single vendor or a combination of multiple vendors who can best meet your ITAM needs. Establishing effective vendor management processes, where you can maximize the amount of service you receive while relying on the vendor’s expertise and ability to scale, can help you make your asset management practice a net cost-saver. |
ITAM activities and capabilities
|
ITAM-adjacent activities and capabilities
|
1-2 hours
Input: Understanding of current ITAM processes and challenges
Output: Understanding of potential outsourcing opportunities
Materials: The table in this slide, and insight in previous slides, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers, ITAM business partners
At a high level, discuss which functions of ITAM are good candidates for outsourcing.
Start with the previous slide for examples of outsourcing activities or capabilities directly related to or adjacent to the ITAM practice. Categorize these activities as follows:
| Outsource | Potentially Outsource | Insource |
|
|
|
Go through the list of activities to potentially or definitely outsource and confirm:
Answering “no” to more than one of these questions suggests a need to further review options to ensure the goals are aligned with the potential value of the service offerings available.
Add your results to your copy of the ITAM Strategy Template
ITAM’s structure will typically align with the larger business and IT structure. The wrong structure will undermine your ability to meet ITAM goals and lead to frustration, missed work, inefficiency, and loss of value.
Which of the four archetypes below reflects the structure you need?
|
Example: Centralized
|
| Example: Decentralized
|
| Example: Federation
|
| Example: Shared Services
|
Why centralize?
|
Why decentralize?
|
Requirements for success:
|
Requirements for success:
|
Why centralize?
|
Why decentralize?
|
Requirements for success:
|
Requirements for success:
|
Why centralize?
|
Why decentralize?
|
Requirements for success:
|
Requirements for success:
|
1-2 hours
Input: Understanding of current organizational structure, Understanding of challenges and opportunities related to the current structure
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers, ITAM business partners
Outline the current model for your organization and identify opportunities to centralize or decentralize ITAM-related activities.
| Centralize | Decentralize | |
| Data collection & analysis |
|
|
| Budget and contract management |
|
|
| Technology management |
|
|
Add your results to your copy of the ITAM Strategy Template
| There’s too much change in the technology and business environment to expect ITAM to be “a problem to solve.” It is a practice that requires care and feeding through regular iteration to achieve success. At the helm of this practice is your asset manager, whose approach and past experience will have a significant impact on how you approach ITAM.
The asset manager role requires a variety of skills, knowledge, and abilities including:
|
“Where your asset manager sits, and what past experience they have, is going to influence how they do asset management.” (Jeremy Boerger, Consultant & Author) “It can be annoying at times, but a good IT asset manager will poke their nose into activities that do not obviously concern them, such as programme and project approval boards and technical design committees. Their aim is to identify and mitigate ITAM risks BEFORE the technology is deployed as well as to ensure that projects and solutions ‘bake in’ the necessary processes and tools that ensure IT assets can be managed effectively throughout their lifecycle.” (Kylie Fowler, ITAM by Design, 2017) |
|
|
|
Align authority and accountability.
|
|
1-2 hours
Input: An understanding of key roles and activities in ITAM practices, An understanding of your organization, High-level structure of your ITAM program
Output: A RACI diagram for IT asset management
Materials: The table in the next slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers, ITAM business partners
Let’s face it – RACI exercises can be dry. We’ve found that the approach below is more collaborative, engaging, and effective compared to filling out the table as a large group.
Add your results to your copy of the ITAM Strategy Template
Configuration Management Database (CMDB)A database of uniquely identified configuration items (CIs). Each CI record may include information on:Service AttributesSupported Service(s)
CI RelationshipsPhysical Connections
|
|
Hardware InformationSerial, Model and Specs
Software InstallationsHypervisor & OS
|
|
Asset Management Database (AMDB)A database of uniquely identified IT assets. Each asset record may include information on:Procurement/PurchasingPurchase Request/Purchase Order
Asset AttributesModel, Title, Product Info, License Key
|
||||
|
||||||||
IT Security SystemsVulnerability Management
|
IT Service Management (ITSM) SystemChange Tickets
|
Financial System/ERPGeneral Ledger
|
||||||
45 minutes
Input: Knowledge of the organization’s configuration management processes
Output: Define how ITAM and configuration management will support one another
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers, Configuration manager
Work through the table below to identify how you will collaborate and synchronize data across ITAM and configuration management practices and tools.
| What are the goals (if any currently exist) for the configuration management practice? | Connect configuration items to services to support service management. |
| How will configuration and asset management teams collaborate? | Weekly status updates. As-needed working sessions.
Shared visibility on each others’ Kanban tracker. Create tickets to raise and track issues that require collaboration or attention from the other team. |
| How can config leverage ITAM? | Connect CIs to financial, contractual, and ownership data. |
| How can ITAM leverage config? | Connect assets to services, changes, incidents. |
| What key fields will be primarily tracked/managed by ITAM? | Serial number, unique ID, user, location, PO number, … |
| What key fields will be primarily tracked/managed by configuration management? | Supported service(s), dependencies, service description, service criticality, network address… |
Add your results to your copy of the ITAM Strategy Template
Decoupling asset management from other service management practices can result in lost value. Establish how asset management can support other service management practices – and how those practices can support ITAM.
| Incident Management
What broke?
|
ITAM
|
Request Management
What can this user request or purchase?
|
|
What IT assets are related to the known issue?
|
What assets are related to the change?
|
45 minutes
Input: Knowledge of existing organizational IT service management processes
Output: Define how ITAM will help other service management processes, and how other service management processes will help ITAM
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers, Service leads
Complete the table below to establish what ITAM can provide to other service management practices, and what other practices can provide to ITAM.
| Practice | ITAM will help | Will help ITAM |
| Incident Management | Provide context on assets involved in an incident (e.g. ownership, service contracts). | Track when assets are involved in incidents (via incident tickets). |
| Request Management | Oversee request & procurement processes. Help develop asset standards. | Enter new assets in ITAM database. |
| Problem Management | Collect information on assets related to known issues. | Report back on models/titles that are generating known issues. |
| Change Enablement | Provide context on assets for change review. | Ensure EOL assets are retired and licenses are returned during changes. |
| Capacity Management | Identify ownership, location for assets at capacity. | Identify upcoming refreshes or purchases. |
| Availability Management | Connect uptime and reliability to assets. | Identify assets that are causing availability issues. |
| Monitoring and Event Management | Provide context to events with asset data. | Notify asset of unrecognized software and hardware. |
| Financial Management | Establish current and predict future spending. | Identify upcoming purchases, renewals. |
Add your results to your copy of the ITAM Strategy Template
“Everything is connected. Nothing is also connected.” (Dirk Gently’s Holistic Detective Agency)
| ITAM data quality relies on tools and integrations that are managed by individuals or teams who don’t report directly to the ITAM function.
Without direct line of sight into tools management, the ITAM team must influence rather than direct improvement initiatives that are in some cases critical to the performance of the ITAM function. To more effectively influence improvement efforts, you must explicitly identify what you need, why you need it, from which tools, and from which stakeholders.
|
“Active Directory plays a huge role in audit defense and self-assessment, but no-one really goes out there and looks at Active Directory.
I was talking to one organization that has 1,600,000 AD records for 100,000 employees.” (Mike Austin, Founder, MetrixData 360) |
30 minutes
Input: Knowledge of existing ITAM tools
Output: A list of prioritized organizational goals, An initial assessment of how ITAM can support these goals
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers
Identify the use, limitations, and next steps for existing ITAM tools, including those not directly managed by the ITAM team.
| Existing Tool | Use | Constraints | Owner | Proposed Action? |
| ITAM Module |
|
|
ITAM Team/Service Management |
|
| Active Directory |
|
Major data quality issues | IT Operations |
|
Add your results to your copy of the ITAM Strategy Template
30 minutes
Input: Knowledge of tooling gaps, An understanding of available tools that could remediate gaps
Output: New tools that can improve ITAM capabilities, including expected value and proposed next steps
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers
Identify tools that are required to support the identified goals of the ITAM practice.
| New Tool | Expected Value | Proposed Next Steps |
| SAM tool |
|
|
Add your results to your copy of the ITAM Strategy Template
| Compare Tool Records
Audit your data by comparing records in the ITAM system to other discovery sources.
|
IT-led Audit
Conduct a hands-on investigation led by ITAM staff and IT technicians.
|
User-led audit
Have users validate the IT assets assigned to them.
|
30 minutes
Input: An understanding of current data audit capabilities and needs
Output: An outline of how you’ll approach data audits, including frequency, scope, required resources
Materials: Your copy of the ITAM Strategy Template
Participants: ITAM team
Review the three internal data audit approaches outlined on the previous slide, and identify which of the three approaches you’ll use. For each approach, complete the fields in the table below.
| Audit Approach | How often? | What scope? | Who’s involved? | Comments |
| Compare tool records | Monthly | Compare ITAM DB, Intune/ConfigMgr, and Vulnerability Scanner Data; focus on end-user devices to start | Asset manager will lead at first.
Work with tool admins to pull data and generate reports. |
|
| IT-led audit | Annual | End-user devices at a subset of locations | Asset manager will work with ITSM admins to generate reports. In-person audit to be conducted by local techs. | |
| User-led audit | Annual | Assigned personal devices (start with a pilot group) | Asset coordinator to develop procedure with ITSM admin. Run pilot with power users first. |
Add your results to your copy of the ITAM Strategy Template
Are you ready when software vendors come knocking?
| “If software audits are a big part of your asset operations, you have problems. You can reduce the time spent on audits and eliminate some audits by having a proactive ITAM practice.” (Sandi Conrad, Principal Research Director)Info-Tech InsightAudit defense starts long before you get audited. For an in-depth review of your audit approach, see Info-Tech’s Prepare and Defend Against a Software Audit. |
|
“The reality is, software vendors prey on confusion and complication. Where there’s confusion, there’s opportunity.” (Mike Austin, Founder, MetrixData 360) |
|
|
1 hour
Input: Organizational knowledge on your current audit response procedures
Output: Audit response team membership, High-level audit checklist, A list of things to start, stop, and continue doing as part of the audit response
Materials: Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers, ITAM business partners
Example Audit Checklist
Add your results to your copy of the ITAM Strategy Template
Some examples of what ITAM can bring to the budgeting table:
Being part of the budgeting process positions ITAM for success in other ways:
|
“Knowing what you have [IT assets] is foundational to budgeting, managing, and optimizing IT spend.” (Dave Kish, Info-Tech, Practice Lead, IT Financial Management)
|
20 minutes
Input: Context on IT budgeting processes
Output: A list of things to start, stop, and continue doing as part of budgeting exercises
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers, ITAM business partners
What should we start, stop, and continue doing to support organizational budgeting exercises?
| Start | Stop | Continue |
|
|
|
Add your results to your copy of the ITAM Strategy Template
Long-term planning and governance
Operational documentation
|
|
|
15-30 minutes
Input: An understanding of existing documentation gaps and risks
Output: Documentation gaps, Identified owners, repositories, access rights, and review/update protocols
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, Optional: IT managers, ITAM business partners
Discuss and record the following:
| Need to Create | Owner | Stored in | Accessible by | Trigger for review |
| Hardware asset management SOP | ITAM manager | ITAM SharePoint site › Operating procedures folder |
|
|
Add your results to your copy of the ITAM Strategy Template
“Understand that this is a journey. This is not a 90-day project. And in some organizations, these journeys could be three or five years long.” (Mike Austin, MetrixData 360)
30-45 minutes
Input: Organizational strategy documents
Output: A roadmap that outlines next steps
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers, Project sponsor
Add your results to your copy of the ITAM Strategy Template
45 minutes
Input: Key initiatives, Ideas for ITAM improvement collected over the course of previous exercises
Output: Concrete action items to support each initiative
Materials: The table in the next slide, Your copy of the ITAM Strategy Template
Participants: ITAM team, IT leaders and managers, Project sponsor
As you’ve been working through the previous exercises, you have been tracking ideas for improvement – now we’ll align them to your roadmap.
Add your results to your copy of the ITAM Strategy Template
| Initiative 1: Develop hardware/software standards | ||
| Task | Target Completion | Owner |
| Laptop standards | Q1-2023 | ITAM manager |
| Identify/eliminate contracts for unused software using scan tool | Q2-2023 | ITAM manager |
| Review O365 license levels and standard service | Q3-2023 | ITAM manager |
| Initiative 2: Improve ITAM data quality | ||
| Task | Target Completion | Owner |
| Implement scan agent on all field laptops | Q3-2023 | Desktop engineer |
| Conduct in person audit on identified data discrepancies | Q1-2024 | ITAM team |
| Develop and run user-led audit | Q1-2024 | Asset manager |
| Initiative 3: Acquire & implement a new ITAM tool | ||
| Task | Target Completion | Owner |
| Select an ITAM tool | Q3-2023 | ITAM manager |
| Implement ITAM tool, incl. existing data migration | Q1-2024 | ITAM manager |
| Training on new tool | Q1-2024 | ITAM manager |
| Build KPIs, executive dashboards in new tool | Q2-2024 | Data analyst |
| Develop user-led audit functionality in new tool | Q3-2024 | ITAM coordinator |
45 minutes
Input: Proposed ITAM initiatives, Stakeholder priorities and goals, and an understanding of how ITAM can help them meet those goals
Output: A high-level communication plan to communicate the benefits and impact of proposed changes to the ITAM program
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: IT asset manager, Project sponsor
Develop clear, consistent, and targeted messages to key ITAM stakeholders.
| Group | ITAM Benefits | Impact | Channel(s) | Timing |
| CFO |
|
|
Face-to-face – based on their availability | Within the next month |
| CIO |
|
|
Standing bi-monthly 1:1 meetings | Review strategy at next meeting |
| IT Managers | ||||
| Field Techs |
Add your results to your copy of the ITAM Strategy Template
30 minutes
Input: Proposed ITAM initiatives, Stakeholder priorities and goals, and an understanding of how ITAM can help them meet those goals
Output: A high-level communication plan to communicate the benefits and impact of proposed changes to the ITAM program
Materials: The table in this slide, Your copy of the ITAM Strategy Template
Participants: IT asset manager, Project sponsor
You’re almost done! Do a final check of your work before you send a copy to your participants.
Add your results to your copy of the ITAM Strategy Template
| Kylie Fowler
Principal Consultant ITAM Intelligence Kylie is an experienced ITAM/FinOps consultant with a track record of creating superior IT asset management frameworks that enable large companies to optimize IT costs while maintaining governance and control. She has operated as an independent consultant since 2009, enabling organizations including Sainsbury's and DirectLine Insurance to leverage the benefits of IT asset management and FinOps to achieve critical business objectives. Recent key projects include defining an end-to-end SAM strategy, target operating model, policies and processes which when implemented provided a 300% ROI. She is passionate about supporting businesses of all sizes to drive continuous improvement, reduce risk, and achieve return on investment through the development of creative asset management and FinOps solutions. |
Rory Canavan
Owner and Principal Consultant SAM Charter Rory is the founder, owner, and principal consultant of SAM Charter, an internationally recognized consultancy in enterprise-wide Software & IT Asset Management. As an industry leader, SAM Charter is uniquely poised to ensure your IT & SAM systems are aligned to your business requirements. With a technical background in business and systems analysis, Rory has a wide range of first-hand experience advising numerous companies and organizations on the best practices and principles pertaining to software asset management. This experience has been gained in both military and civil organizations, including the Royal Navy, Compaq, HP, the Federation Against Software Theft (FAST), and several software vendors. |
| Jeremy Boerger
Founder, Boerger Consulting Author of Rethinking IT Asset Management Jeremy started his career in ITAM fighting the Y2K bug at the turn of the 21st century. Since then, he has helped companies in manufacturing, healthcare, banking, and service industries build and rehabilitate hardware and software asset management practices. These experiences prompted him to create the Pragmatic ITAM method, which directly addresses and permanently resolves the fundamental flaws in current ITAM and SAM implementations. In 2016, he founded Boerger Consulting, LLC to help business leaders and decision makers fully realize the promises a properly functioning ITAM can deliver. In his off time, you will find him in Cincinnati, Ohio, with his wife and family. |
Mike Austin
Founder and CEO MetrixData 360 Mike Austin leads the delivery team at MetrixData 360. Mike brings more than 15 years of Microsoft licensing experience to his clients’ projects. He assists companies, from Fortune 500 to organizations with as few as 500 employees, with negotiations of Microsoft Enterprise Agreements (EA), Premier Support Contracts, and Select Agreements. In addition to helping negotiate contracts, he helps clients build and implement software asset management processes. Previously, Mike was employed by Microsoft for more than 8 years as a member of the global sales team. With Microsoft, Mike successfully negotiated more than a billion dollars in new and renewal EAs. Mike has also negotiated legal terms and conditions for all software agreements, developed Microsoft’s best practices for global account management, and was awarded Microsoft’s Gold Star Award in 2003 and Circle of Excellence in 2008 for his contributions. |
“Asset Management.” SFIA v8. Accessed 17 March 2022.
Boerger, Jeremy. Rethinking IT Asset Management. Business Expert Press, 2021.
Canavan, Rory. “C-Suite Cheat Sheet.” SAM Charter, 2021. Accessed 17 March 2022.
Fisher, Matt. “Metrics to Measure SAM Success.” Snow Software, 26 May 2015. Accessed 17 March 2022.
Flexera (2021). “State of ITAM Report.” Flexera, 2021. Accessed 17 March 2022.
Fowler, Kylie. “ITAM by design.” BCS, The Chartered Institute for IT, 2017. Accessed 17 March 2022.
Fowler, Kylie. “Ch-ch-ch-changes… Is It Time for an ITAM Transformation?” ITAM Intelligence, 2021. Web. Accessed 17 March 2022.
Fowler, Kylie. “Do you really need an ITAM policy?” ITAM Accelerate, 15 Oct. 2021. Accessed 17 March 2022.
Hayes, Chris. “How to establish a successful, long-term ITAM program.” Anglepoint, Sept. 2021. Accessed 17 March 2022.
ISO/IEC 19770-1-2017. IT Asset Management Systems – Requirements. Third edition. ISO, Dec 2017.
Joret, Stephane. “IT Asset Management: ITIL® 4 Practice Guide”. Axelos, 2020.
Jouravlev, Roman. “IT Service Financial Management: ITIL® 4 Practice Guide”. Axelos, 2020.
Pagnozzi, Maurice, Edwin Davis, Sam Raco. “ITAM Vs. ITSM: Why They Should Be Separate.” KPMG, 2020. Accessed 17 March 2022.
Rumelt, Richard. Good Strategy, Bad Strategy. Profile Books, 2013.
Stone, Michael et al. “NIST SP 1800-5 IT Asset Management.” Sept, 2018. Accessed 17 March 2022.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Gain an understanding of the potential opportunities that Gen AI can provide your solution delivery practices and answer the question "What should I do next?"
Assess the readiness of your solution delivery team for Gen AI. This tool will ask several questions relating to your people, process, and technology, and recommend whether or not the team is ready to adopt Gen AI practices.
Generative AI (Gen AI) presents unique opportunities to address many solution delivery challenges. Code generation can increase productivity, synthetic data generation can produce usable test data, and scanning tools can identify issues before they occur. To be successful, teams must be prepared to embrace the changes that Gen AI brings. Stakeholders must also give teams the opportunity to optimize their own processes and gauge the fit of Gen AI.
Start small with the intent to learn. The right pilot initiative helps you learn the new technology and how it benefits your team without the headache of complex setups and lengthy training and onboarding. Look at your existing solution delivery tools to see what Gen AI capabilities are available and prioritize the use cases where Gen AI can be used out of the box.

Andrew Kum-Seun
Research Director,
Application Delivery and Management
Info-Tech Research Group
Delivery teams are under continuous pressure to deliver high-value, high-quality solutions with limited capacity in complex business and technical environments. Common challenges experienced by these teams include:
Generative AI (Gen AI) offers a unique opportunity to address many of these challenges.
Position Gen AI as a tooling opportunity to enhance the productivity and depth of your solution delivery practice. Current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery. Assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.
Overarching Info-Tech Insight
Position Gen AI is a tooling opportunity to enhance the productivity and depth of your solution delivery practice. However, current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery. Assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.
Understand and optimize first, automate with Gen AI later.
Gen AI magnifies solution delivery inefficiencies and constraints. Adopt a user-centric perspective to understand your solution delivery teams' interactions with solution delivery tools and technologies to better replicate how they complete their tasks and overcome challenges.
Enable before buy. Buy before build.
Your solution delivery vendors see AI as a strategic priority in their product and service offering. Look into your existing toolset and see if you already have the capabilities. Otherwise, prioritize using off-the-shelf solutions with pre-trained Gen AI capabilities and templates.
Innovate but don't experiment.
Do not reinvent the wheel and lower your risk of success. Stick to the proven use cases to understand the value and fit of Gen AI tools and how your teams can transform the way they work. Use your lessons learned to discover scaling opportunities.
IT benefits |
Business benefits |
|---|---|
|
|

Generative AI (Gen AI)
A form of ML whereby, in response to prompts, a Gen AI platform can generate new output based on the data it has been trained on. Depending on its foundational model, a Gen AI platform will provide different modalities and use case applications.
Machine Learning (ML)
The AI system is instructed to search for patterns in a data set and then make predictions based on that set. In this way, the system learns to provide accurate content over time. This requires a supervised intervention if the data is inaccurate. Deep learning is self-supervised and does not require intervention.
Artificial Intelligence (AI)
A field of computer science that focuses on building systems to imitate human behavior. Not all AI systems have learning behavior; many systems (such as customer service chatbots) operate on preset rules.
Many vendors have jumped on Gen AI as the latest marketing buzzword. When vendors claim to offer Gen AI functionality, pin down what exactly is generative about it. The solution must be able to induce new outputs from inputted data via self-supervision – not trained to produce certain outputs based on certain inputs.
Position Gen AI as a tooling opportunity to enhance the productivity and depth of your solution delivery practice. Current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery; assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.
Solution Delivery Team |
|
|---|---|
Humans |
Gen AI Bots |
Product owner and decision maker Business analyst and architect Integrator and builder Collaborator |
Administrator Designer and content creator Paired developer and tester System monitor and support |
Gen AI Solution Delivery Readiness Assessment Tool
Assess the readiness of your solution delivery team for Gen AI. This tool will ask several questions relating to your people, process, and technology, and recommend whether the team is ready to adopt Gen AI practices.

1.1.1 Understand the challenges of your solution delivery teams.
1.1.2 Outline the value you expect to gain from Gen AI.
This step involves the following participants:
Outcomes of this step
Creating high-throughput teams is an organizational priority.
CXOs ranked "optimize IT service delivery" as the second highest priority. "Achieve IT business" was ranked first.
(CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568)
Strengths Internal characteristics that are favorable as they relate to solution delivery |
Weaknesses Internal characteristics that are unfavorable or need improvement |
Opportunities External characteristics that you may use to your advantage |
Threats External characteristics that may be potential sources of failure or risk |
Record the results in the Gen AI Solution Delivery Readiness Assessment Tool
Participants
Why is software delivery an ideal pilot candidate for Gen AI?
Gen AI jumpstarts the most laborious and mundane parts of software delivery. Delivery teams saved 22 hours (avg) per software use case when using AI in 2022, compared to last year when AI was not used ("Generative AI Speeds Up Software Development," PRNewswire, 2023).
Fungible resources
Teams are transferrable across different frameworks, platforms, and products. Gen AI provides the structure and guidance needed to work across a wider range of projects ("Game changer: The startling power generative AI is bringing to software development," KPMG, 2023).
Improved solution quality
Solution delivery artifacts (e.g. code) are automatically scanned to quickly identify bugs and defects based on recent activities and trends and validate against current system performance and capacity.
Business empowerment
AI enhances the application functionalities workers can build with low- and no-code platforms. In fact, "AI high performers are 1.6 times more likely than other organizations to engage non-technical employees in creating AI applications" ("The state of AI in 2022 — and a half decade in review." McKinsey, 2022, N=1,492).
Black Box
Little transparency is provided on the tool's rationale behind content creation, decision making, and the use and storage of training data, creating risks for legal, security, intellectual property, and other areas.
Role Replacement
Some workers have job security concerns despite Gen AI being bound to their rule-based logic framework, the quality of their training data, and patterns of consistent behavior.
Skills Gaps
Teams need to gain expertise in AI/ML techniques, training data preparation, and continuous tooling improvements to support effective Gen AI adoption across the delivery practice and ensure reliable operations.
Data Inaccuracy
Significant good quality data is needed to build trust in the applicability and reliability of Gen AI recommendations and outputs. Teams must be able to combine Gen AI insights with human judgment to generate the right outcome.
Slow Delivery of AI Solution
Timelines are sensitive to organizational maturity, experience with Gen AI, and investments in good data management practices. 65% of organizations said it took more than three months to deploy an enterprise-ready AIOps solution (OpsRamp, 2022).
Well-optimized Gen AI instills stakeholder confidence in ongoing business value delivery and ensures stakeholder buy-in, provided proper expectations are set and met. However, business value is not interpreted or prioritized the same across the organization. Come to a common business value definition to drive change in the right direction by balancing the needs of the individual, team, and organization.
Business value cannot always be represented by revenue or reduced expenses. Dissecting value by the benefit type and the value source's orientation allows you to see the many ways in which Gen AI brings value to the organization.
Financial benefits vs. intrinsic needs
Inward vs. outward orientation
See our Build a Value Measurement Framework blueprint for more information about business value definition.

Establishing and monitoring metrics are powerful ways to drive behavior and strategic changes in your organization. Determine the right measures that demonstrate the value of your Gen AI implementation by aligning them with your Gen AI objectives, business value drivers, and non-functional requirements.
Select metrics with different views
IT Management & Governance
CIO Business Vision
Output
Record the results in the Gen AI Solution Delivery Readiness Assessment Tool
Problem statements
Business and IT outcomes
List of stakeholders
In-scope solution delivery teams, system, and capabilities
An AI strategy details the direction, activities, and tactics to deliver on the promise of your AI portfolio. It often includes:
1.2.1 Align Gen AI opportunities with teams and capabilities.
This step involves the following participants:
| Gen AI opportunity | Common Gen AI tools and vendors | Teams than can benefit | How can teams leverage this? | Case study |
|---|---|---|---|---|
| Synthetic data generation |
|
|
|
|
| Code generation |
|
|
|
|
| Defect forecasting and debugging |
|
|
|
|
| Requirements documentation and elicitation |
|
|
|
Google collaborates with Replit to reduce time to bring new products to market by 30% |
| UI design and prototyping |
|
|
|
Other common AI opportunities solutions include test case generation, code translation, use case creation, document generation, and automated testing.
What are the expected benefits?
What are the notable risks and challenges?
How should teams prepare for synthetic data generation?
It can be used:
"We can simply say that the total addressable market of synthetic data and the total addressable market of data will converge,"
Ofir Zuk, CEO, Datagen (Forbes, 2022)
What are the expected benefits?
What are the notable risks and challenges?
How should teams prepare for code generation?
According to a survey conducted by Microsoft's GitHub, a staggering 92% of programmers were reported as using AI tools in their workflow (GitHub, 2023).
What are the expected benefits?
What are the notable risks and challenges?
How should teams prepare for defect forecasting and debugging?
It can be used to:
Using AI technologies, developers can reduce the time taken to debug and test code by up to 70%, allowing them to finish projects faster and with greater accuracy (Aloa, 2023).
What are the expected benefits?
What are the notable risks and challenges?
How should teams prepare for requirements documentation & elicitation?
It can be used to:
91% of top businesses surveyed report having an ongoing investment in AI (NewVantage Partners, 2021).
Analyze existing patterns and principles to generate design, layouts, and working solutions.
What are the expected benefits?
What are the notable risks and challenges?
How should teams prepare for UI design and prototyping?
A study by McKinsey & Company found that companies that invest in AI-driven design outperform their peers in revenue growth and customer experience metrics. They were found to achieve up to two times higher revenue growth than industry peers and up to 10% higher net promoter score (McKinsey & Company, 2018).
Realizing the complete potential of Gen AI relies on effectively fostering its adoption and resulting changes throughout the entire solution delivery process.
What are the challenges faced by your delivery teams that could be addressed by Gen AI?
What's holding back Gen AI adoption in the organization?
Are your objectives aligned with Gen AI capabilities?
How can Gen AI improve the entire solution delivery process?
1-3 hours
Output
Participants
Record the results in the Gen AI Solution Delivery Readiness Assessment Tool
1.3.1 Assess your readiness for Gen AI.
This step involves the following participants:
Outcomes of this step
As organizations evolve and adopt more tools and technology, their solution delivery processes become more complex. Process improvement is needed to simplify complex and undocumented software delivery activities and artifacts and prepare it for Gen AI. Gen AI scales process throughput and output quantity, but it multiplies the negative impact of problems the process already has.
When is your process ready for Gen AI?
*software development lifecycle
To learn more, visit Info-Tech's Modernize Your SDLC blueprint.
To learn more, visit Info-Tech's Build a Winning Business Process Automation Playbook
By shining a light on considerations that might have otherwise escaped planners and decision makers, an impact analysis is an essential component to Gen AI success. This analysis should answer the following questions on the impact to your solution delivery teams.
See our Master Organizational Change Management Practices blueprint for more information.
Brace for impact
A thorough analysis of change impacts will help your software delivery teams and change leaders:
Portfolio Management
An accurate and rationalized inventory of all Gen AI tools verifies they support the goals and abide to the usage policies of the broader delivery practice. This becomes critical when tooling is updated frequently and licenses and open- source community principles drastically change (e.g. after an acquisition).
Quality Assurance
Gen AI tools are routinely verified and validated to ensure outcomes are accurate, complete, and aligned to solution delivery quality standards. Models are retrained using lessons learned, new use cases, and updated training data.
Security & Access Management
Externally developed and trained Gen AI models may not include the measures, controls, and tactics you need to prevent vulnerabilities and protect against threats that are critical in your security frameworks, policies, and standards.
Data Management & Governance
All solution delivery data and artifacts can be transformed and consumed in various ways as they transit through solution delivery and Gen AI tools. Data integrations, structures, and definitions must be well-defined, governed, and monitored.
OPERATIONAL SUPPORT
Resources are available to support the ongoing operations of the Gen AI tool, including infrastructure, preparing training data, and managing integration with other tools. They are also prepared to recover backups, roll back, and execute recovery plans at a moment's notice.
See Build Your Generative AI Roadmap for more information.
Record the results in the Gen AI Solution Delivery Readiness Assessment Tool
Output
Participants

To learn more, visit Info-Tech's Develop Your Value-First Business Process Automation (BPA) Strategy.
Modernize Your SDLC
Efficient and effective SDLC practices are vital, as products need to readily adjust to evolving and changing business needs and technologies.
Adopt Generative AI in Solution Delivery
Generative AI can drive productivity and solution quality gains to your solution delivery teams. Level set expectations with the right use case to demonstrate its value potential.
Select Your AI Vendor & Implementation Partner
The right vendor and partner are critical for success. Build the selection criteria to shortlist the products and services that best meets the current and future needs of your teams.
Drive Business Value With Off-the-Shelf AI
Build a framework that will guide your teams through the selection of an off-the-shelf AI tool with a clear definition of the business case and preparations for successful adoption.
Build Your Enterprise Application Implementation Playbook
Your Gen AI implementation doesn't start with technology, but with an effective plan that your team supports and is aligned to broader stakeholder and sponsor priorities and goals.
Build a Winning Business Process Automation Playbook
Optimize and automate your business processes with a user-centric approach.
Embrace Business Managed Applications
Empower the business to implement their own applications with a trusted business-IT relationship.
Application Portfolio Management Foundations
Ensure your application portfolio delivers the best possible return on investment.
Maximize the Benefits from Enterprise Applications with a Center of Excellence
Optimize your organization's enterprise application capabilities with a refined and scalable methodology.
Create an Architecture for AI
Build your target state architecture from predefined best-practice building blocks.
Deliver on Your Digital Product Vision
Build a product vision your organization can take from strategy through execution.
Enhance Your Solution Architecture Practices
Ensure your software systems solution is architected to reflect stakeholders' short- and long-term needs.
Apply Design Thinking to Build Empathy With the Business
Use design thinking and journey mapping to make IT the business' go-to problem solver.
Modernize Your SDLC
Deliver quality software faster with new tools and practices.
Drive Business Value With Off-the-Shelf AI
A practical guide to ensure return on your off-the-shelf AI investment.
"Altran Helps Developers Write Better Code Faster with Azure AI." Microsoft, 2020.
"Apply Design Thinking to Complex Teams, Problems, and Organizations." IBM, 2021.
Bianca. "Unleashing the Power of AI in Code Generation: 10 Applications You Need to Know — AITechTrend." AITechTrend, 16 May 2023.
Biggs, John. "Deep Code Cleans Your Code with the Power of AI." TechCrunch, 26 Apr 2018.
"Chat GPT as a Tool for Business Analysis — the Brazilian BA." The Brazilian BA, 24 Jan 2023.
Davenport, Thomas, and Randy Bean. "Big Data and AI Executive Survey 2019." New Vantage Partners, 2019.
Davenport, Thomas, and Randy Bean. "Big Data and AI Executive Survey 2021." New Vantage Partners, 2021.
Das, Tamal. "9 Best AI-Powered Code Completion for Productive Development." Geek flare, 5 Apr 2023.
Gondrezick, Ilya. "Council Post: How AI Can Transform the Software Engineering Process." Forbes, 24 Apr 2020.
"Generative AI Speeds up Software Development: Compass UOL Study." PR Newswire, 29 Mar 2023.
"GitLab 2023 Global Develops Report Series." Gitlab, 2023.
"Game Changer: The Startling Power Generative AI Is Bringing to Software Development." KPMG, 30 Jan 2023.
"How AI Can Help with Requirements Analysis Tools." TechTarget, 28 July 2020.
Indra lingam, Ashanta. "How Spotify Is Upleveling Their Entire Design Team." Framer, 2019.
Ingle, Prathamesh. "Top Artificial Intelligence (AI) Tools That Can Generate Code to Help Programmers." Matchcoat, 1 Jan 2023.
Kaur, Jagreet . "AI in Requirements Management | Benefits and Its Processes." Xenon Stack, 13 June 2023.
Lange, Danny. "Game On: How Unity Is Extending the Power of Synthetic Data beyond the Gaming Industry." CIO, 17 Dec 2020.
Lin, Ying. "10 Artificial Intelligence Statistics You Need to Know in 2020." OBERLO, 17 Mar. 2023.
Mauran, Cecily. "Whoops, Samsung Workers Accidentally Leaked Trade Secrets via ChatGPT." Mashable, 6 Apr 2023.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
By defining your goals, framing solutions based on end-user workloads, and understanding the pros and cons of various solutions, you can visualize what success looks like for your VDI/DaaS deployment. This includes defining your KPIs by end-user experience, knowing the decision gates for a successful deployment, and defining your hypothesis for value to make your decision more accurate and gain C-suite buy-in.
Virtual desktop infrastructure (VDI)/desktop as a service (DaaS) users expect their user experience to be at least equal to that provided by a physical PC, and they do not care about the underlying infrastructure. If the experience is less, then IT has failed in the considerations for VDI/ DaaS. In this research we analyze the data that the IT industry tracks but doesn't use or sometimes even look at regarding user experience (UX).
Understanding the strengths and weaknesses in your in-house technical skills and business requirements will assist you in making the right decision when it comes to VDI or DaaS solutions. In the case of DaaS this will include a managed service provider for small to medium-sized IT teams. Many IT teams lack a seasoned IT project manager who can identify gaps, risks, and weaknesses in the organization's preparedness. Redeploy your IT staff to new roles that impact management and monitoring of UX.
Ultimately, IT needs to reduce its complexity, increase user satisfaction, reduce management and storage costs, and maintain a secure and effective environment for both the end user and the business. They must also ensure productivity standards throughout the considerations, strategically, tactically, and in support of a move to a VDI or DaaS solution.
| Your Challenge With the evolution of VDI over the last 15-plus years, there has been a proliferation of solutions, such as Citrix desktop services, VMware Horizon, and in-house hypervisor solutions (e.g. ESX hosts). There has also been a great deal of growth and competition of DaaS and SaaS solutions in the cloud space. Hybrid work environments, remote from anywhere and any device, and the security concerns that go hand-in-hand with these strategies have certainly accelerated the move to VDI and DaaS. How will you manage and navigate the right solution for your organization? | Common Obstacles IT departments can encounter many obstacles to VDI and DaaS, many of which will be determined by your business model and other factors, such as:
| Info-Tech’s Approach By defining your end goals, framing solutions based on end-user workloads, and understanding the pros and cons of what solution(s) will meet your needs, you can visualize what success looks like.
|
Every IT organization needs to be asking what success looks like. If you do not consider how your end user will be impacted, whether they are doing something as simple as holding a team meeting with voice and video or working with highly technical workloads on a virtual environment, you will run into multiple issues that affect end-user satisfaction, productivity, and adoption. Understand the tension metrics that may conflict with meeting business objectives and KPIs.
Client-Driven InsightDifferent industries have different requirements and issues, so they look at solutions differently. Info-Tech InsightIf end-user experience is at the forefront of business requirements, then any solution that fits the business KPIs can be successful. |
|

Questions you should be asking before you create your RFP
| How would you rate the user experience on your VDI/DaaS solution?
Info-Tech InsightAsking critical use-case questions should give you a clear picture of the end-user experience outcome. |
Security is always quoted as a primary justification for VDI/DaaS, while UX is far down the list of KPIs. WHY?IT engineers use network and performance metrics to manage end-user complaints of “slowness,” which in reality is not what the user is experiencing.IT needs to invest in more meaningful metrics to manage end-user pain:
| ![]() (Source: Enterprise Strategy Group, 2020) |
The dimensions of end-user experience can be broken down into four distinct categories that will impact not only the end user but also the business. Picturing your landscape in this framework will help clearly define your considerations when deciding on whether a VDI or DaaS solution is right for your business. We will investigate how these scenarios impact the end user, what that means, and how that can guide the questions that you are asking as you move to an RFP. Info-Tech InsightIn the world of VDI and DaaS, if you do not get buy-in from the end user, the rate of adoption and the overall success of the implementation will prove difficult to measure. It will be impossible to calculate ROI even as you feel the impact of your TCO.
| ![]() |
What IT measuresMost business KPI objectives concentrate on business goals, whether it be cost containment, security, simplification, ease of management, or centralization of apps and data, but rarely is there a KPI for end-user experience. You can’t fix what you can’t see. Putting a cost benefit to end-user satisfaction may come in the form of productivity. This may be a central reason why VDI has not been widely adopted as an architecture since it came to the marketplace more than 15 years ago. | ![]() |
Monitoring end-user metrics will mitigate the tension between business KPIs and end-user satisfaction
Metric | Description | ||
End-User | PERFORMANCE | Logon duration | Once the user puts in their password, how long does it take to get to their desktop? What is the measurement and how do you measure? |
| App load time | When an app is launched by the user there should be immediate indication that it is loading. | ||
| App response time | When the user performs a task, there should be no wait time, or hourglass icon, waiting for the app to catch up to the user input. (There is no succinct way to measure this.) | ||
| Session response time | How does the user’s OS respond to I/O? The user should not experience any latency issues when doing a drag and drop, clicking on a menu item, or doing a search. | ||
| AVAILABILITY | SLAs | When something goes wrong in the VDI/DaaS environment, how quickly can the user expect to get back to their tasks? | |
| Geographic location | When all other considerations are configured correctly, the user experience may be impacted by their location. So, for example, a user working out of Mexico and logging into a VDI may experience latency based on location compared to a user in California, for example, where the resources are stored, managed, and monitored. | ||
| Application availability | Much like app load time and response time, the only factor affecting the user experience is the back-end load on the app itself, for example a CAD or heavy resource app not properly resourced. | ||
| FUNCTIONALITY | Configuration of user desktop | Degradation in functionality is caused by improper allocation of CPU, RAM, and GPU for the tasks at hand, creating a bad UX and end-user satisfaction score. | |
| Graphics quality and responsiveness | The user should have the same experience as if on their own physical machine. A video experience should not have any lag in it, for example. MS Teams should not have latency or sound quality issues. | ||
| Predictive analysis | Continuous performance and availability monitoring. | ||
| END USER | Browser real user monitoring (RUM) | A real-time view into how the web application is performing from the point of view of a real end user. | |
| Customer satisfaction score | Survey-based metrics on customer satisfaction. | ||
“If employees are the competitive edge and key differentiator for a business, I&O has a duty of care to ensure that the employees’ digital experience enables and does not impede the value of that asset.” (John Annand, Principal Director, Info-Tech Research Group)
Is security and data sovereignty the only reason?
| Technical capability | |
| AVAILABILITY | VDI is a better fit than DaaS in organizations that have limited or unreliable internet connectivity. |
| FUNCTIONALITY | Application flexibility: Resource-intensive applications may require specific virtual desktop configurations, for example in-house GIS apps, CAD, and gaming software requiring specific GPU configurations. |
| SECURITY | Data protection is often stated as a need to maintain an on-premises VDI solution, ensuring sensitive and highly privileged data does not travel across the internet. |
| AVAILABILITY | While some cloud providers will allow you to bring your OS licensing along with a cloud migration, many subscriptions already include OS licensing, and you may be paying additional licensing costs. |
| SECURITY | VDI makes sense if security and control are primary business KPIs, the IT resources are experienced virtual infrastructure engineers and administrators, and funding is not a hindrance. |
| PERFORMANCE | When processing power is a functional requirement, such as CPU, GPU, and storage capacity, VDI offers performance benefits over a standard PC, reducing the need to deploy high-powered PCs to end users. |
“Though the desktops are moving to the cloud, accountability is not.” (Gary Bea, Director of Consulting Services and Technical Operations, Goliath Technologies)
Any device anywhere: key benefits of DaaS
| Technical capability | Challenges | |
| AVAILABILITY | Delivers a consistent user experience regardless of location or device. | Info-Tech InsightThe total cost of the solution will be higher than you anticipate, and management is complex. Additionally, your ability to set your conditions and controls is limited. Info-Tech InsightDepending on your technical abilities and experience with cloud services, you will likely benefit from professional third-party services, technical services, and consulting, which can be critical when deciding if DaaS can fit into your current IT architecture, processes, and security posture. |
| SECURITY | Enhances security posture by eliminating your client VPN and keeping sensitive data off the endpoint device. | |
| FUNCTIONALITY | Onboard and offboard users quickly and securely. | |
| FUNCTIONALITY | Provides centralize workspace management. | |
| FUNCTIONALITY | Scale up or down on demand with a consumption- and subscription-based contract. | |
| FUNCTIONALITY | Significantly reduce operational overhead compared to managing a traditional VDI deployment. |

From an end-user experience perspective, what makes sense in terms of usage and cost?
Thin Client
| Desktop as a Service
| Thick Client
| Device as a Service
| Web Client
|
What is the better security posture and control plane? Clarify your stakeholders’ objectives, then see if VDI is an adequate solution.
![]() | Modernize and Transform Your End-User Computing Strategy Phase 3.2 of this research set covers virtual desktop infrastructure. |
![]() | Implement Desktop Virtualization and Transition to Everything as a Service Follow Info-Tech’s process for implementing the right desktop virtualization solution to create a project plan that will help ensure that you not only choose the right solution but also implement it effectively. |
![]() | Cloud Strategy Workbook Use this tool to assess cloud services (desktop-as-a-service). |
![]() | Desktop Virtualization TCO Calculator This tool is designed to help you understand what desktop virtualization looks like from a cost perspective. |
Anderson, Joseph. “Five Ways VDI Will Grow in 2022 Thanks to Hybrid Work.” StratoDesk, 28 Feb. 2022. Web.
Bowker, Mark. “Are Desktops Doomed? Trends in Digital Workspaces, VDI, and DaaS.” ESG, May 2020. Web.
“The CISO's Dilemma: How Chief Information Security Officers Are Balancing Enterprise Endpoint Security and Worker Productivity in Response to COVID-19.” Hysolate, Oct. 2020. Web.
King, Val. “Why the End-User Experience Is Not Good for Your Remote Workforce .” Whitehat Virtual Technologies, 2 Dec. 2021. Web.
Perry, Yifat. “VDI vs DaaS: 5 Key Differences and 6 Leading Solutions.” NetApp, 26 Aug. 2020. Web.
Rigg, Christian. “Best virtual desktop services 2022.” TechRadar, 20 Jan. 2022 . Web.
Seget, Vladan. “Key metrics to consider when assessing the performance of your VDI/DaaS environment.” vladan.fr, 19 April 2021. Web.
Spruijt, Ruben. “Why Should You Care About VDI and Desktop-as-a-Service?” Nutanix, 28 Jan. 2020. Web.
Stowers, Joshua. “The Best Desktop as a Service (DaaS) Providers 2022.” business.com, 21 Dec. 2021. Web.
“Virtual Desktop Infrastructure(VDI) Market 2022.” MarketWatch, 5 Jan. 2022. Web. Press release.
Zamir, Tal. “VDI Security Best Practices: Busting the Myths.” Hysolate, 29 Nov. 2021. Web.
Zychowicz, Paul. “Why do virtual desktop deployments fail?” Turbonomic Blog, 16 Dec. 2016. Web.
Business and IT leaders aiming to recruit and select the best talent need to:
To create a great candidate experience, IT departments must be involved in the process at key points, recruitment and selection is not a job for HR alone!
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Train your IT department to get involved in the recruitment process to attract and select the best talent.
Use this tool in conjunction with the Improve you IT Recruitment Process to document your action plans
To get useful information from an interview, the interviewer should be focused on what candidates are saying and how they are saying it, not on what the next question will be, what probes to ask, or how they will score the responses. This Interview Guide Template will help interviewers stay focused and collect good information about candidates.
Hiring managers can choose from a comprehensive collection of core, functional, and leadership competency-based behavioral interview questions.
Use this template to develop a well-written job posting that will attract the star candidates and, in turn, deflect submission of irrelevant applications by those unqualified.
The most innovative technology isn’t necessarily the right solution. Review talent acquisition (TA) solutions and evaluate the purpose each option serves in addressing critical challenges and replacing critical in-person activities.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Establish the employee value proposition (EVP) and employer brand.
Have a well-defined EVP that you communicate through your employer brand.
1.1 Gather feedback.
1.2 Build key messages.
1.3 Assess employer brand.
Content and themes surrounding the EVP
Draft EVP and supporting statements
A clearer understanding of the current employer brand and how it could be improved
Develop job postings and build a strong sourcing program.
Create the framework for an effective job posting and analyze existing sourcing methods.
2.1 Review and update your job ads.
2.2 Review the effectiveness of existing sourcing programs.
2.3 Review job ads and sourcing methods for bias.
Updated job ad
Low usage sourcing methods identified for development
Minimize bias present in ads and sourcing methods
Create a high-quality interview process to improve candidate assessment.
Training on being an effective interviewer.
3.1 Create an ideal candidate scorecard.
3.2 Map out your interview process.
3.3 Practice behavioral interviews.
Ideal candidate persona
Finalized interview and assessment process
Practice interviews
Drive employee engagement and retention with a robust program that acclimates, guides, and develops new hires.
Evaluation of current onboarding practice.
4.1 Evaluate and redesign the onboarding program.
Determine new onboarding activities to fill identified gaps.
Follow this blueprint to:
|
|
Effective Interviewing |
Onboarding: Setting up New Hires For Success |
|||||||||
| Awareness | → | Research | → | Application | → | Screening | → | Interview and Assessment | → | Follow Up | → | Onboarding |
Talent is a priority for the entire organization:
Respondents rated “recruitment” as the top issue facing organizations today (McLean & Company 2022 HR Trends Report).
37% of IT departments are outsourcing roles to fill internal skill shortages (Info-Tech Talent Trends 2022 Survey).
Yet bad hires are alarmingly common:
Hiring is one of the least successful business processes, with three-quarters of managers reporting that they have made a bad hire (Robert Half, 2021).
48% of survey respondents stated improving the quality of hires was the top recruiting priority for 2021 (Jobvite, 2021).
Prework |
Day 1 |
Day 2 |
Day 3 |
Day 4 |
Post work |
|
|---|---|---|---|---|---|---|
Current Process and Job Descriptions Documented |
Establish the Employee Value Proposition (EVP) and Employer Brand |
Develop Job Postings and Build a Strong Sourcing Program |
Effective Interviewing |
Onboarding and Action Planning |
Putting the Action Plan Into Action! |
|
Activities |
|
1.1 Introduce the Concept of an EVP 1.2 Brainstorm Unique Benefits of Working at Your Organization 1.2 Employer Brand Introduction |
2.1 What Makes an Attractive Job Posting 2.2 Create the Framework for Job Posting 2.3 Improve the Sourcing Process 2.4 Review Process for Bias |
3.1 Creating an Interview Process 3.2 Selecting Interview Questions 3.3 Avoiding Bias During Interviews 3.4 Practice Interviews |
4.1 Why Onboarding Matters 4.2 Acclimatize New Hires and Set Them Up for Success 4.3 Action Plan |
5.1 Review Outputs and Select Priorities 5.2 Consult With HR and Senior Management to Get Buy-In 5.3 Plan to Avoid Relapse Behaviors |
Deliverables |
|
|
|
|
Develop a strong employee value proposition
The employee value proposition is your opportunity to showcase the unique benefits and opportunities of working at your organization, allowing you to attract a wider pool of candidates.
AN EMPLOYEE VALUE PROPOSITION IS: |
AN EMPLOYEE VALUE PROPOSITION IS NOT: |
||
|
|
||
THE FOUR KEY COMPONENTS OF AN EMPLOYEE VALUE PROPOSITION |
|||
Rewards |
Organizational Elements |
Working Conditions |
Day-to-Day Job Elements |
|
|
|
|
Creating a compelling EVP that presents a picture of your employee experience, with a focus on diversity, will attract a wide pool of diverse candidates to your team. This can lead to many internal and external benefits for your organization.
Existing Employee Value Proposition: If your organization or IT department has an existing employee value proposition, rather than starting from scratch, we recommend leveraging that and moving to the testing phase to see if the EVP still resonates with staff and external parties.
Employee Engagement Results: If your organization does an employee engagement survey, review the results to identify the areas in which the IT organization is performing well. Identify and document any key comment themes in the report around why employees enjoy working for the organization or what makes your IT department a great place to work.
Social Media Sites. Prepare for the good, the bad, and the ugly. Social media websites like Glassdoor and Indeed make it easier for employees to share their experiences at an organization honestly and candidly. While postings on these sites won’t relate exclusively to the IT department, they do invite participants to identify their department in the organization. You can search these to identify any positive things people are saying about working for the organization and potentially opportunities for improvement (which you can use as a starting point in the retention section of this report).
Download the Recruitment Workbook
Input |
Output |
|
|
Materials |
Participants |
|
|
Examples below.
Input | Output |
|
|
Materials | Participants |
|
|
Shopify |
“We’re Shopify. Our mission is to make commerce better for everyone – but we’re not the workplace for everyone. We thrive on change, operate on trust, and leverage the diverse perspectives of people on our team in everything we do. We solve problems at a rapid pace. In short, we get shit done.” |
|---|---|
Bettercloud |
“At Bettercloud, we have a smart, ambitious team dedicated to delighting our customers. Our culture of ownership and transparency empowers our team to achieve goals they didn’t think possible. For all those on board, it’s going to be a challenging and rewarding journey – and we’re just getting started.” |
Ellevest |
“As a team member at Ellevest, you can expect to make a difference through your work, to have a direct impact on the achievement of a very meaningful mission, to significantly advance your career trajectory, and to have room for fun and fulfillment in your daily life. We know that achieving a mission as critical as ours requires incredible talent and teamwork, and team is the most important thing to us.” |
INTERNAL TEST REVOLVES AROUND THE 3A’s |
EXTERNAL TEST REVOLVES AROUND THE 3C’s |
|---|---|
ALIGNED: The EVP is in line with the organization’s purpose, vision, values, and processes. Ensure policies and programs are aligned with the organization’s EVP. |
CLEAR: The EVP is straightforward, simple, and easy to understand. Without a clear message in the market, even the best intentioned EVPs can be lost in confusion. |
ACCURATE: The EVP is clear and compelling, supported by proof points. It captures the true employee experience, which matches the organization’s communication and message in the market. |
COMPELLING: The EVP emphasizes the value created for employees and is a strong motivator to join this organization. A strong EVP will be effective in drawing in external candidates. The message will resonate with them and attract them to your organization. |
ASPIRATIONAL: The EVP inspires both individuals and the IT organization as a whole. Identify and invest in the areas that are sure to generate the highest returns for employees. |
COMPREHENSIVE: The EVP provides enough information for the potential employee to understand the true employee experience and to self-assess whether they are a good fit for your organization. If the EVP lacks depth, the potential employee may have a hard time understanding the benefits and rewards of working for your organization. |
Market your EVP to potential candidates: Employer Brand
The employer brand is the perception internal and external stakeholders hold of the organization and exists whether it has been curated or not. Curating the employer brand involves marketing the organization and employee experience. Grounding your employer brand in your EVP enables you to communicate and market an accurate portrayal of your organization and employee experience and make you desirable to both current and potential employees.
![]() |
The unique offering an employer provides to employees in return for their effort, motivating them to join or remain at the organization. The perception internal and external stakeholders hold of the organization. |
Alignment between the EVP, employer brand, and corporate brand is the ideal branding package. An in-sync marketing strategy ensures stakeholders perceive and experience the brand the same way, creating brand ambassadors.
How you present your employer brand is just as important as the content. Ideally, you want the viewer to connect with and personalize the material for the message to have staying power. Use Marketing’s expertise to help craft impactful promotional materials to engage and excite the viewer.
Visuals
Images are often the first thing viewers notice. Use visuals that connect to your employer brand to engage the viewer’s attention and increase the likelihood that your message will resonate. However, if there are too many visuals this may detract from your content – balance is key!
Language
Wordsmithing is often the most difficult aspect of marketing. Your message should be accurate, informative, and engaging. Work with Marketing to ensure your wording is clever and succinct – the more concise, the better.
Composition
Integrate visuals and language to complete your marketing package. Ensure that the text and images are balanced to draw in the viewer.
This case study is happening in real time. Please check back to learn more as Goddard continues to recruit for the position.
Goddard Space Center is the largest of NASA’s space centers with approximately 11,000 employees. It is currently recruiting for a senior technical role for commercial launches. The position requires consulting and working with external partners and vendors.
NASA is a highly desirable employer due to its strong culture of inclusivity, belonging, teamwork, learning, and growth. Its culture is anchored by a compelling vision, “For the betterment of Humankind,” and amplified by a strong leadership team that actively lives their mission and vision daily.
Firsthand lists NASA as #1 on the 50 most prestigious internships for 2022.
The position is in a rural area of Eastern Shore Virginia with a population of approximately 60,000 people, which translates to a small pool of candidates. Any hire from outside the area will be expected to relocate as the senior technician must be onsite to support launches twice a month. Financial relocation support is not offered and the position is a two-year assignment with the option of extension that could eventually become permanent.
“Looking for a Talent Unicorn: a qualified, experienced candidate with both leadership skills and deep technical expertise that can grow and learn with emerging technologies.”
Steve Thornton
Acting Division Chief, Solutions Division, Goddard Space Flight Center, NASA
Culture takes the lead in NASA's job postings, which attract a high number of candidates. Postings begin with a link to a short video on working at NASA, its history, and how it lives its vision. The video highlights NASA's diversity of perspectives, career development, and learning opportunities.
NASA's company brand and employer brand are tightly intertwined, providing a consistent view of the organization.
The employer vision is presented in the best place to reach NASA's ideal candidate: usajobs.gov, the official website of the United States Government and the “go-to” for government job listings. NASA also extends its postings to other generic job sites as well as LinkedIn and professional associations.
Interview with Robert Leahy
Chief Information Officer, Goddard Space Flight Center, NASA
You can use sites like:
| Input | Output |
|
|
| Materials | Participants |
|
|
Create engaging job ads to attract talent to the organization
A job description is an internal document that includes sections such as general job information, major responsibilities, key relationships, qualifications, and competencies. It communicates job expectations to incumbents and key job data to HR programs.
A job ad is an externally facing document that advertises a position with the intent of attracting job applicants. It contains key elements from the job description as well as information on the organization and its EVP.
A job description informs a job ad, it doesn’t replace it. Don’t be lulled into using a job description as a posting when there’s a time crunch to fill a position. Refer to job postings as job advertisements to reinforce that their purpose is to attract attention and talent.
| Position Title |
|
|---|---|
| Company |
|
| Summary Description |
|
| Responsibilities |
|
| Position Characteristics |
|
| Position Requirements |
|
| Work Conditions |
|
| Process to Apply |
|
Bottom Line: A truly successful job posting ferrets out those hidden stars that may be over cautious and filters out hundreds of applications from the woefully under qualified.
DON’T overlook the power of words. Avoid phrases like “strong English language skills” as this may deter non-native English speakers from applying and a “clean-shaven” requirement can exclude candidates whose faith requires them to maintain facial hair. DON’T post a long requirements list. A study showed that the average jobseeker spends only 49.7 seconds reviewing a listing before deciding it's not a fit.* DON’T present a toxic work culture; phrases such as “work hard, play hard” can put off many candidates and play into the “bro- culture” stereotype in tech. |
Position Title: Senior Lorem Ipsum Salary Band: $XXX to $XXX Diversity is a core value at ACME Inc. We believe that diversity and inclusion is our strength, and we’re passionate about building an environment where all employees are valued and can perform at their best. As a … you will … Our ideal candidate …. Required Education and Experience
Required Skills
Preferred Skills
At ACME Inc. you will find … |
DO promote pay equity by being up front and honest about salary expectations. DO emphasize your organization’s commitment to diversity and an inclusive workplace by adding an equity statement. DO limit your requirements to “must haves” or at least showcase them first before the “nice-to-haves.” DO involve current employees or members of your employee resource groups when creating job descriptions to ensure that they ask for what you really need. DO focus on company values and criteria that are important to the job, not just what’s always been done. |
| ☑ | Does the job posting highlight your organization’s EVP |
| ☐ | Does the job posting avoid words that might discourage women, people of color, and other members of underrepresented groups from applying? |
| ☑ | Has the position description been carefully reviewed and revised to reflect current and future expectations for the position, rather than expectations informed by the persons who have previously held the job? |
| ☐ | Has the hiring committee eliminated any unnecessary job skills or requirements (college degree, years or type of previous experience, etc.) that might negatively impact recruitment of underrepresented groups? |
| ☑ | Has the hiring committee posted the job in places (job boards, websites, colleges, etc.) where applicants from underrepresented groups will be able to easily view or access it? |
| ☐ | Have members of the hiring committee attended job fairs or other events hosted by underrepresented groups? |
| ☐ | Has the hiring committee asked current employees from underrepresented groups to spread the word about the position? |
| ☐ | Has the hiring committee worked with the marketing team to ensure that people from diverse groups are featured in the organization’s website, publications, and social media? |
| ☐ | es the job description clearly demonstrate the organization’s and leadership’s commitment to DEI? |
| Input | Output |
|
|
| Materials | Participants |
|
|
Get involved with sourcing to get your job ad seen
Social Media |
Social media has trained candidates to expect:
|
While the focus on the candidate experience is important throughout the talent acquisition process, social media, technology, and values have made it a critical component of sourcing. |
Technology |
Candidates expect to be able to access job ads from all platforms.
Job ads must be clear, concise, and easily viewed on a mobile device. |
|
Candidate Values |
Job candidate’s values are changing.
Authenticity remains important.
|
Internal Talent Mobility (ITM) Program
Social Media Program
Employee Referral Program
Alumni Program
Campus Recruiting Program
Other Sourcing Tactics
What is it?
Positioning the right talent in the right place, at the right time, for the right reasons, and supporting them appropriately.
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | ITM program benefits:
Provide opportunities to develop professionally, whether in the current role or through promotions/lateral moves. Keep strong performers and high-potential employees committed to the organization. Address rapid change, knowledge drain due to retiring Baby Boomers, and frustration associated with time to hire or time to productivity. Reduce spend on talent acquisition, severance, time to productivity, and onboarding. Increase motivation and productivity by providing increased growth and development opportunities. Align with the organization’s offering and what is important to the employees from a development perspective. Support and develop employees from all levels and job functions. |
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | What is it? The widely accessible electronic tools that enable anyone to publish and access information, collaborate on common efforts, and build relationships. Learning to use social media effectively is key to sourcing the right talent.
(Ku, 2021) | |
Benefits of social media:
| Challenges of social media: With the proliferation of social media and use by most organizations, social media platforms have become overcrowded. As a result:
| |
“It is all about how we can get someone’s attention and get them to respond. People are becoming jaded.”
– Katrina Collier, Social Recruiting Expert, The Searchologist
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | What is it? Employees recommend qualified candidates. If the referral is hired, the referring employee typically receives some sort of reward. Benefits of an employee referral program:
55% of organizations report that hiring a referral is less expensive that a non-referred candidate (Clutch, 2020). The average recruiting lifecycle for an employee referral is 29 days, compared with 55 days for a non referral (Betterup, 2022). 46% percent of employees who were referred stay at their organization for a least one year, compared to 33% of career site hires (Betterup, 2022). High performers are more likely to refer other high performers to an organization (The University of Chicago Press, 2019). |
Avoid the Like Me Bias: Continually evaluate the diversity of candidates sourced from the employee referral program. Unless your workforce is already diverse, referrals can hinder diversity because employees tend to recommend people like themselves.
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | What is it? An alumni referral program is a formalized way to maintain ongoing relationships with former employees of the organization. Successful organizations use an alumni program:
Benefits of an alumni program:
|
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | What is it? A formalized means of attracting and hiring individuals who are about to graduate from schools, colleges, or universities. Almost 70% of companies are looking to employ new college graduates every year (HR Shelf, 2022). Campus recruitment benefits:
|
Target schools that align with your culture and needs. Do not just focus on the most prestigious schools: they are likely more costly, have more intense competition, and may not actually provide the right talent.
Internal Talent Mobility (ITM) Program Social Media Program Employee Referral Program Alumni Program Campus Recruiting Program Other Sourcing Tactics | 1. Professional industry associations
| 5. Not-for-profit intermediaries
| American Expresscreated a boot camp for software engineers in partnership with Year Up and Gateway Community College to increase entry-level IT hires. Results:
(HBR, 2016) |
2. Special interest groups
| 6. Gamification
| ||
3. Customers
| PwC (Hungary) created Multiploy, a two-day game that allows students to virtually experience working in accounting or consulting at the organization. Results:
(Zielinski, 2015) | ||
4. Exit interviews
|
Use knowledge that already exists in the organization to improve talent sourcing capabilities.
Marketing |
HR |
|---|---|
Marketing knows how to:
|
HR knows how to:
|
To successfully partner with other departments in your organization:
Encourage your team to seek out, and learn from, employees in different divisions. Training sessions with the teams may not always be possible but one-on-one chats can be just as effective and may be better received.
| Input | Output |
|
|
| Materials | Participants |
|
|
Create a high-quality interview process to improve candidate assessment
If you…
…then stop. Use this research!
Step 5: Define decision rights
Establish decision-making authority and veto power to mitigate post-interview conflicts over who has final say over a candidate’s status.
Follow these steps to create a positive interview experience for all involved.
Define the attributes of the ideal candidate…
Ideal candidate = Ability to do the job + Motivation to do the job + Fit |
|||
Competencies
|
|
|
|
Experiences
|
Data for these come from:
|
||
Data for these come from:
|
|||
Caution: Evaluating for “organizational or cultural fit” can lead to interviewers falling into the trap of the “like me” bias, and excluding diverse candidates.
Non-negotiable = absolutely required for the job! Usually attributes that are hard to train, such as writing skills, or expensive to acquire after hire, such as higher education or specific technical skills. |
An Asset Usually attributes that can be trained, such as computer skills. It’s a bonus if the new hire has it. |
Nice-to-have Attributes that aren’t necessary for the job but beneficial. These could help in breaking final decision ties. |
Deal Breakers: Also discuss and decide on any deal breakers that would automatically exclude a candidate. |
“The hardest work is accurately defining what kind of person is going to best perform this job. What are their virtues? If you’ve all that defined, the rest is not so tough.”
– VP, Financial Services
| Input | Output |
|
|
| Materials | Participants |
|
|
The Screening Interview Template will help you develop a screening interview by providing:
Once completed, this template will help you or HR staff conduct candidate screening interviews with ease and consistency. Always do screening interviews over the phone or via video to save time and money.
Determine the goal of the screening interview – do you want to evaluate technical skills, communication skills, attitude, etc.? – and create questions based on this goal. If evaluating technical skill, have someone with technical competency conduct the interview.
Unstructured: A traditional method of interviewing that involves no constraints on the questions asked, no requirements for standardization, and a subjective assessment of the candidate. This format is the most prone to bias. |
Semi-Structured: A blend of structured and unstructured, where the interviewer will ask a small list of similar questions to all candidates along with some questions pertaining to the resume. |
Structured: An interview consisting of a standardized set of job-relevant questions and a scoring guide. The goal is to reduce interviewer bias and to help make an objective and valid decision about the best candidate. |
Components of a highly structured interview include:
The more of these components your interview has, the more structured it is, and the more valid it will be.
The purpose of interviewing is to assess, not just listen. Questions are what help you do this.
Use the Interview Question Planning Guide tab in the Candidate Interview Strategy and Planning Guide to prepare your interview questions.
Introduce yourself and ask if now is a good time to talk. (Before calling, prepare your sales pitch on the organization and the position.) |
You want to catch candidates off guard so that they don’t have time to prepare scripted answers; however, you must be courteous to their schedule. |
Provide an overview of the position, then start asking pre-set questions. Take a lot of notes. |
It is important to provide candidates with as much information as possible about the position – they are deciding whether they are interested in the role as much as you are deciding whether they are suitable. |
Listen to how the questions are answered. Ask follow-up questions when appropriate and especially if the candidate seems to be holding something back. |
If there are long pauses or the candidate’s voice changes, there may be something they aren’t telling you that you should know. |
Be alert to inconsistencies between the resume and answers to the questions and address them. |
It’s important to get to the bottom of issues before the in-person interview. If dates, titles, responsibilities, etc. seem to be inconsistent, ask more questions. |
Ask candidates about their salary expectations. |
It’s important to ensure alignment of the salary expectations early on. If the expectations are much higher than the range, and the candidate doesn’t seem to be open to the lower range, there is no point interviewing them. This would be a waste of everyone’s time. |
Answer the applicant’s questions and conclude the interview. |
|
Wait until after the interview to rate the applicant. |
Don’t allow yourself to judge throughout the interview, or it could skew questions. Rate the applicant once the interview is complete. |
When you have a shortlist of candidates to invite to an in-person interview, use the Candidate Communication Template to guide you through proper phone and email communications.
Question (traditional): “What would you identify as your greatest strength?” Answer: Ability to work on a team. |
Top-level interview questions set the stage for probing. Your interview script should contain the top two levels of questions in the pyramid and a few probes that you will likely need to ask. You can then drill down further depending on the candidate’s answers. |
|
Follow-Up Question: “Can you outline a particular example when you were able to exercise your teamwork skills to reach a team goal?” |
||
Probing questions start with asking what, when, who, why, and how, and gain insight into a candidate’s thought process, experiences, and successes. |
Probing Level 1: Probe around the what, how, who, when, and where. “How did you accomplish that?” |
How to develop probes? By anticipating the kinds of responses that candidates from different backgrounds or with different levels of experience are likely to give as a response to an interview question. Probes should provide a clear understanding of the situation, the behavior, and the outcome so that the response can be accurately scored. Common probes include:
|
Tailor probes to the candidate’s answers to evoke meaningful and insightful responses. |
Probing Level 2: Allow for some creativity. “What would you do differently if you were to do it again?” |
Consider leveraging behavioral interview questions in your interview to reduce bias.
Assessments are created by people that have biases. This often means that assessments can be biased, especially with preferences towards a Western perspective. Even if the same assessments are administered, the questions will be interpreted differently by candidates with varying cultural backgrounds and lived experiences. If assessments do not account for this, it ultimately leads to favoring the answers of certain demographic groups, often ones similar to those who developed the assessment.
Attribute you are evaluating Probing questions prepared Area to take notes |
![]() |
Exact question you will ask Place to record score Anchored scale with definitions of a poor, ok and great answer |
The must-haves:
“At the end of the day, it’s the supervisor that has to live with the person, so any decision that does not involve the supervisor is a very flawed process.” – VP, Financial Services
The nice-to-haves:
Record the interview team details in the Candidate Interview Strategy and Planning Guide template.
Who Should… Contact candidates to schedule interviews or communicate decisions?
Who Should… Be responsible for candidate welcomes, walk-outs, and hand-offs between interviews?
Who Should… Define and communicate each stakeholder’s role?
Who Should… Chair the preparation and debrief meetings and play the role of the referee when trying to reach a consensus?
“Unless you’ve got roles within the panel really detailed and agreed upon, for example, who is going to take the lead on what area of questions, you end up with a situation where nobody is in charge or accountable for the final interview assessment." – VP, Financial Services
Try a Two Lens Assessment: One interviewer assesses the candidate as a project leader while another assesses them as a people leader for a question such as “Give me an example of when you exercised your leadership skills with a junior team member.”
It is typical and acceptable that you, as the direct reporting manager, should have veto power, as do some executives. |
Veto Power Direct Supervisor or Manager |
Decision Makers: Must Have Consensus Other Stakeholders Direct Supervisor’s Boss Direct Supervisor |
Contributes Opinion HR Representative Peer |
After the preliminary interview, HR should not be involved in making the decision unless they have a solid understanding of the position. Peers can make an unfair assessment due to perceived competition with a candidate. Additionally, if a peer doesn’t want a candidate to be hired and the direct supervisor does hire the candidate, the peer may hold resentment against that candidate and set the team up for conflict. |
The decision should rest on those who will interact with the candidate on a daily basis and who manage the team or department that the candidate will be joining. |
The decisions being made can include whether or not to move a candidate onto the next phase of the hiring process or a final hiring decision. Deciding decision rights in advance defines accountability for an effective interview process.
Download the Behavioral Interview Question Library
| Input | Output |
|
|
| Materials | Participants |
|
|
Give candidates a warm, genuine greeting. Introduce them to other interviewers present. Offer a drink. Make small talk. |
“There are some real advantages to creating a comfortable climate for the candidate; the obvious respect for the individual, but people really let their guard down.” – HR Director, Financial Services |
Give the candidate an overview of the process, length, and what to expect of the interview. Indicate to the candidate that notes will be taken during the interview. |
If shorter than an hour, you probably aren’t probing enough or even asking the right questions. It also looks bad to candidates if the interview is over quickly. |
Start with the first question in the interview guide and make notes directly on the interview guide (written or typed) for each question. |
Take lots of notes! You think you’ll remember what was said, but you won’t. It also adds transparency and helps with documentation. |
Ask the questions in the order presented for interview consistency. Probe and clarify as needed (see next slide). |
Keep control of the interview by curtailing any irrelevant or long-winded responses. |
After all interview questions are complete, ask candidates if there was anything about their qualifications that was missed that they want to highlight. |
Lets you know they understand the job and gives them the feeling they’ve put everything on the table. |
Ask if the candidate has any questions. Respond to the questions asked. |
Answer candidate questions honestly because fit works both ways. Ensure candidates leave with a better sense of the job, expectations, and organizational culture. |
Review the compensation structure for the position and provide a realistic preview of the job and organization. |
Provide each candidate with a fair chance by maintaining a consistent interview process. |
Tell interviewees what happens next in the process, the expected time frame, and how they will be informed of the outcome. Escort them out and thank them for the interview. |
The subsequent slides provide additional detail on these eight steps to conducting an effective interview.
Like-me effect: An often-unconscious preference for, and unfairly positive evaluation of, a candidate based on shared interests, personalities, and experiences, etc.
Status effect: Overrating candidates based on the prestige of previously held positions, titles, or schools attended.
Recency bias: Placing greater emphasis on interviews held closer to the decision-making date.
Contrast effect: Rating candidates relative to those who precede or follow them during the interview process, rather than against previously determined data.
Solution
Assess candidates by using existing competency-based criteria.
Negative tone: Starting the interview on a negative or stressful note may derail an otherwise promising candidate.
Poor interview management: Letting the candidate digress may leave some questions unanswered and reduce the interview value.
Reliance of first impressions: Basing decisions on first impressions undermines the objectivity of competency-based selection.
Failure to ask probing questions: Accepting general answers without asking follow-up questions reduces the evidentiary value of the interview.
Solution
Follow the structured interview process you designed and practiced.
Do... |
Don’t… |
|---|---|
Take control of the interview by politely interrupting to clarify points or keep the interviewee on topic. Use probing to drill down on responses and ask for clarification. Ask who, what, when, why, and how. Be cognizant of confidentiality issues. Ask for a sample of work from a past position. Focus on knowledge or information gaps from previous interviews that need to be addressed in the interview. Ensure each member of a panel interview speaks in turn and the lead is given due respect to moderate. |
Be mean when probing. Intimidation actually works against you and is stressful for candidates. When you’re friendly, candidates will actually open up more. Interrupt or undermine other panel members. Their comments and questions are just as valid as yours are, and treating others unprofessionally gives a bad impression to the candidate. Ask illegal questions. Questions about things like religion, disability, and marital and family status are off limits. |
Do... |
While listening to responses, also watch out for red and yellow flags. |
|
Listen to how candidates talk about their previous bosses – you want it to be mainly positive. If their discussion of past bosses reflects a strong sense of self-entitlement or a consistent theme of victimization, this could be a theme in their behavior and make them hard to work with. |
Red Flag A concern about something that would keep you from hiring the person. |
Yellow Flag A concern that needs to be addressed, but wouldn’t keep you from hiring the person. |
Pay attention to body language and tone. They can tell you a lot about candidate motivation and interest. |
↓ |
|
Listen to what candidates want to improve. It’s an opportunity to talk about development and advancement opportunities in the organization. |
Not all candidates have red flags, but it is important to keep them in mind to identify potential issues with the candidate before they are hired. | |
Don’t… |
||
Talk too much! You are there to listen. Candidates should do about 80% of the talking so you can adequately evaluate them. Be friendly, but ensure to spend the time allotted assessing, not chatting. If you talk too much, you may end up hiring a weak candidate because you didn’t perceive weaknesses or not hire a strong candidate because you didn’t identify strengths. |
What if you think you sense a red or yellow flag? Following the interview, immediately discuss the situation with others involved in the recruitment process or those familiar with the position, such as HR, another hiring manager, or a current employee in the role. They can help evaluate if it’s truly a matter of concern. |
|
When the interviewer makes a positive impression on a candidate and provides a positive impression of the organization it carries forward after they are hired.
In addition, better candidates can be referred over the course of time due to higher quality networking.
As much as choosing the right candidate is important to you, make sure the right candidate wants to choose you and work for your organization.
Believe everything candidates say. Most candidates embellish and exaggerate to find the answers they think you want. Use probing to drill down to specifics and take them off their game. |
Ask gimmicky questions like “what color is your soul?” Responses to these questions won’t give you any information about the job. Candidates don’t like them either! |
Focus too much on the resume. If the candidate is smart, they’ve tailored it to match the job posting, so of course the person sounds perfect for the job. Read it in advance, highlight specific things you want to ask, then ignore it. |
Oversell the job or organization. Obviously you want to give candidates a positive impression, but don’t go overboard because this could lead to unhappy hires who don’t receive what you sold them. Candidates need to evaluate fit just as much as you. |
Get distracted by a candidate’s qualifications and focus only on their ability to do the job. Just because they are qualified does not mean they have the attitude or personality to fit the job or culture. |
Show emotion at any physical handicap. You can’t discriminate based on physical disability, so protect the organization by not drawing attention to it. Even if you don’t say anything, your facial expression may. |
Bring a bad day or excess baggage into the interview, or be abrupt, rushed, or uninterested in the interview. This is rude behavior and will leave a negative impression with candidates, which could impact your chances of hiring them. |
Submit to first impression bias because you’ll spend the rest of the interview trying to validate your first impression, wasting your time and the candidate’s. Remain as objective as possible and stick to the interview guide to stay focused on the task at hand. |
“To the candidate, if you are meeting person #3 and you’re hearing questions that person #1 and #2 asked, the company doesn’t look too hot or organized.” – President, Recruiting Firm
| Input | Output |
|
|
| Materials | Participants |
|
|
Download the Behavioral Interview Question Library
Strategic Planning
Professional Development
Onboarding should pick up where candidate experience leaves off
Onboarding ≠ Orientation
Onboarding is more than just orientation. Orientation is typically a few days of completing paperwork, reading manuals, and learning about the company’s history, strategic goals, and culture. By contrast, onboarding is three to twelve months dedicated to welcoming, acclimating, guiding, and developing new employees – with the ideal duration reflecting the time to productivity for the role.
A traditional orientation approach provides insufficient focus on the organizational identification, socialization, and job clarity that a new hire requires. This is a missed opportunity to build engagement, drive productivity, and increase organizational commitment. This can result in early disengagement and premature departure.
Over the long term, effective onboarding has a positive impact on revenue and decreases costs.
The benefits of onboarding:
Help new hires feel connected to the organization by clearly articulating the mission, vision, values, and what the company does. Help them understand the business model, the industry, and who their competitors are. Help them feel connected to their new team members by providing opportunities for socialization and a support network. |
Help put new hires on the path to high performance by clearly outlining their role in the organization and how their performance will be evaluated. |
Help new hires receive the experience and training they require to become high performers by helping them build needed competencies. |
We recommend a three-to-twelve-month onboarding program, with the performance management aspect of onboarding extending out to meet the standard organizational performance management cycle.
The length of the onboarding program should align with the average time to productivity for the role(s). Consider the complexity of the role, the industry, and the level of the new hire when determining program length.
For example, call center workers who are selling a straight-forward product may only require a three-month onboarding, while senior leaders may require a year-long program.
Our primary and secondary research identified the following as the most commonly stated reasons why employees leave organizations prematurely. These issues will be addressed throughout the next section.
Acclimate |
Guide |
Develop |
|
|
|
“Onboarding is often seen as an entry-level HR function. It needs to rise in importance because it’s the first impression of the organization and can be much more powerful than we sometimes give it credit for. It should be a culture building and branding program.” – Doris Sims, SPHR, The Succession Consultant, and Author, Creative Onboarding Programs
| Input | Output |
|
|
| Materials | Participants |
|
|
![]() |
Sample challenges |
Potential solutions |
|---|---|---|
Some paperwork cannot be completed digitally (e.g. I-9 form in the US). |
Where possible, complete forms with digital signatures (e.g. DocuSign). Where not possible, begin the process earlier and mail required forms to employees to sign and return, or scan and email for the employee to print and return. |
|
Required compliance training material is not available virtually. |
Seek online training options where possible. Determine the most-critical training needs and prioritize the replication of materials in audio/video format (e.g. recorded lecture) and distribute virtually. |
|
Employees may not have access to their equipment immediately due to shipping or supply issues. |
Delay employee start dates until you can set them up with the proper equipment and access needed to do their job. |
|
New hires can’t get answers to their questions about benefits information and setup. |
Schedule a meeting with an HR representative or benefits vendor to explain how benefits will work and how to navigate employee self-service or other tools and resources related to their benefits. |
One of the biggest challenges for remote new hires is the inability to casually ask questions or have conversations without feeling like they’re interrupting. Until they have a chance to get settled, providing formal opportunities for questions can help address this.
![]() | Sample challenges | Potential solutions |
|---|---|---|
Key company information such as organizational history, charts, or the vision, mission, and values cannot be clearly learned by employees on their own. | Have the new hire’s manager call to walk through the important company information to provide a personal touch and allow the new hire to ask questions and get to know their new manager. | |
Keeping new hires up to date on crisis communications is important, but too much information may overwhelm them or cause unnecessary stress. | Sharing the future of the organization is a critical part of the company information stage of onboarding and the ever-changing nature of the COVID-19 crisis is informing many organizations’ future right now. Be honest but avoid over-sharing plans that may change. | |
New hires can’t get answers to their questions about benefits information and setup. | Schedule a meeting with an HR representative or benefits vendor to explain how benefits will work and how to navigate employee self-service or other tools and resources related to their benefits. |
![]() | Sample challenges | Potential solutions |
|---|---|---|
Team introductions via a team lunch or welcome event are typically done in person. | Provide managers with a calendar of typical socialization events in the first few weeks of onboarding and provide instructions and ideas for how to schedule replacement events over videoconferencing. | |
New hires may not have a point of contact for informal questions or needs if their peers aren’t around them to help. | If it doesn’t already exist, create a virtual buddy program and provide instructions for managers to select a buddy from the new hire’s team. Explain that their role is to field informal questions about the company, team, and anything else and that they should book weekly meetings with the new hire to stay in touch. | |
New hires will not have an opportunity to learn or become a part of the informal decision-making networks at the organization. | Hiring managers should consider key network connections that new hires will need by going through their own internal network and asking other team members for recommendations. | |
New hires will not be able to casually meet people around the office. | Provide the employee with a list of key contacts for them to reach out to and book informal virtual coffee chats to introduce themselves. |
![]() | Sample challenges | Potential solutions |
|---|---|---|
Performance management (PM) processes have been paused given the current crisis. | Communicate to managers that new hires still need to be onboarded to the organization’s performance management process and that goals and feedback need to be introduced and the review process outlined even if it’s not currently happening. | |
Goals and expectations differ or have been reprioritized during the crisis. | Ask managers to explain the current situation at the organization and any temporary changes to goals and expectations as a result of new hires. | |
Remote workers often require more-frequent feedback than is mandated in current PM processes. | Revamp PM processes to include daily or bi-weekly touchpoints for managers to provide feedback and coaching for new hires for at least their first six months. | |
Managers will not be able to monitor new hire work as effectively as usual. | Ensure there is a formal approach for how employees will keep their managers updated on what they're working on and how it's going, for example, daily scrums or task-tracking software. |
For more information on adapting performance management to a virtual environment, see Info-Tech’s Performance Management for Emergency Work-From-Home research.
Categorize the different types of formal and informal training in the onboarding process into the following three categories. For departmental and individual training, speak to managers to understand what is required on a department and role basis:
Organizational |
Departmental |
Individual |
|---|---|---|
For example:
|
For example:
|
For example:
|
In a crisis, not every training can be translated to a virtual environment in the short term. It’s also important to focus on critical learning activities versus the non-critical. Prioritize the training activities by examining the learning outcomes of each and asking:
Lower priority or non-critical activities can be used to fill gaps in onboarding schedules or as extra activities to be completed if the new hire finds themselves with unexpected downtime to fill.
If there is a lack of resources, expertise, or time, outsource digital training to a content provider or through your LMS.
2021 Recruiter Nation Report. Survey Analysis, Jobvite, 2021. Web.
“5 Global Stats Shaping Recruiting Trends.” The Undercover Recruiter, 2022. Web.
Barr, Tavis, Raicho Bojilov, and Lalith Munasinghe. "Referrals and Search Efficiency: Who Learns What and When?" The University of Chicago Press, Journal of Labor Economics, vol. 37, no. 4, Oct. 2019. Web.
“How to grow your team better, faster with an employee referral program.” Betterup, 10 Jan. 2022. Web.
“Employee Value Proposition: How 25 Companies Define Their EVP.” Built In, 2021. Web.
Global Leadership Forecast 2021. Survey Report, DDI World, 2021. Web.
“Connecting Unemployed Youth with Organizations That Need Talent.” Harvard Business Review, 3 November 2016. Web.
Ku, Daniel. “Social Recruiting: Everything You Need To Know for 2022.” PostBeyond, 26 November 2021. Web.
Ladders Staff. “Shedding light on the job search.” Ladders, 20 May 2013. Web.
Merin. “Campus Recruitment – Meaning, Benefits & Challenges.” HR Shelf, 1 February 2022. Web.
Mobile Recruiting. Smart Recruiters, 2020. Accessed March 2022.
Roddy, Seamus. “5 Employee Referral Program Strategies to Hire Top Talent.” Clutch, 22 April 2020. Web.
Sinclair, James. “What The F*dge: That's Your Stranger Recruiting Budget?” LinkedIn, 11 November 2019. Web.
“Ten Employer Examples of EVPs.” Workology, 2022. Web
“The Higher Cost of a Bad Hire.” Robert Half, 15 March 2021. Accessed March 2022.
Trost, Katy. “Hiring with a 90% Success Rate.” Katy Trost, Medium, 8 August 2022. Web.
“Using Social Media for Talent Acquisition.” SHRM, 20 Sept. 2017. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Understand the drivers for your product transformation.
Define the drivers for your transition to product-centric delivery.
1.1 What is driving your organization to become product focused?
List of challenges and drivers
Understand the product transformation journey and differences.
Identify the cultural, behavioral, and leadership changes needed for a successful transformation.
2.1 Define the differences between projects and product delivery
List of differences
Understand why smaller iterations increase value realization and decrease accumulated risk.
Leverage smaller iterations to reduce time to value and accumulated risk to core operations.
3.1 What is business agility?
Common understanding about the value of smaller iterations
Establish an organizational starting definition of products.
Tailor product management to meet the needs and vision of your organization.
4.1 What is a product? Who are your consumers?
4.2 Identify enablers and blockers of product ownership
4.3 Define a set of guiding principles for product management
Product definition
List of enablers and blockers of product ownership
Set of guiding principles for product management
Understand the relationship between product management and product delivery.
Optimize product management to prioritize the right changes for the right people at the right time.
5.1 Discussions
Common understanding
Personalize and commit to supporting product teams.
Embrace leadership and cultural changes needed to empower and support teams.
6.1 Your management culture
6.2 Personal Cultural Stop, Start, and Continue
6.3 Now, Next, Later to support product owners
Your management culture map
Personal Cultural Stop, Start, and Continue list
Now, Next, Later roadmap
To develop a common understanding and foundation for product management so we, as leaders, better understand how to lead product owners, product managers, and their teams.
Learn how enterprise agility can provide lasting value to the organization
Repeat workshops with different companies, operating units, departments, or teams as needed.
We WILL ENGAGE in discussions and activities:
This workshop will NOT be:
Facilitators
Participants
Your Challenge
Common Obstacles
Info-Tech's Approach
Info-Tech's approach will guide you through:




Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.
Input
Output
Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.
Output
Project Delivery | vs | Product Delivery |
|---|---|---|
Point in time | What is changed | |
Method of funding changes | Needs an owner | |
Output
Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.
Project | Product | ||
|---|---|---|---|
Fund Projects | Funding | → | Fund Products or Teams |
Line of Business Sponsor | Prioritization | → | Product Owner |
Makes Specific Changes | Product Management | → | Improve Product Maturity |
Assign People to Work | Work Allocation | → | Assign Work |
Project Manager Manages | Capacity Management | → | Team Manages Capacity |
Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end user value and enterprise alignment.

Regardless of whether you recognize yourself as a "product-based" or "project-based" shop, the same basic principles should apply.
You go through a period or periods of project-like development to build a version of an application or product.
You also have parallel services along with your project development, which encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

Adapted from: Pichler, "What Is Product Management?"
The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.
Corporate security management is a vital aspect in every modern business, regardless of business area or size. At Tymans Group we offer expert security management consulting to help your business set up proper protocols and security programs. More elaborate information about our security management consulting services and solutions can be found below.
You may be experiencing one or more of the following:
Insight
To have a successful information security strategy, take these three factors into account:
Impact and results of our corporate security management approach
Besides the small introduction, subscribers and consulting clients within the corporate security management domain have access to:
Get up to speed
Read up on why you should build your customized corporate information security governance and management system. Review our methodology and understand the four ways we can support you.
Align your security objectives with your business goals
Determine the company's risk tolerance.
Build a practical governance framework for your company
Our best-of-breed security framework makes you perform a gap analysis between where you are and where you want to be (your target state). Once you know that, you can define your goals and duties.
Now that you have built it, manage your governance framework.
There are several essential management activities that we as a security management consulting company suggest you employ.
We are happy to tell you more about our corporate security management solutions and help you set up fitting security objectives. As a security management consulting firm we offer solutions and advice, based on our own extensive experience, which are practical and people-orientated. Discover our services, which include data security management and incident management and book an online appointment with CEO Gert Taeymans to discuss any issues you may be facing regarding risk management or IT governance.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This project will help you define “product” for your organization, define your drivers and goals for moving to product delivery, understand the role of product ownership, lay out the case to your stakeholders, and communicate what comes next for your transition to product.
Build a proposal deck to help make the case to your stakeholders for product-centric delivery.
This workbook is designed to capture the results of the exercises in the Make the Case for Product Delivery Storyboard. Each worksheet corresponds to an exercise in the storyboard. The workbook is also a living artifact that should be updated periodically as the needs of your team and organization change.
Understand the role of product ownership
Make the case to your stakeholders
Appendix: Product delivery strategy communication
Your Challenge
|
Common Obstacles
|
Info-Tech’s Approach
|
Delivering products doesn’t mean you will stop delivering projects! Product-centric delivery is intended to address the misalignment between the long-term delivery of value that organizations demand and the nature of traditional project-focused environments.
Info-Tech’s CIO Business Vision Survey data highlights the importance of IT initiatives in supporting the business in achieving its strategic goals.
However, Info-Tech’s CEO-CIO Alignment Survey (2021; N=58) data indicates that CEOs perceive IT to be poorly aligned to business’ strategic goals.
40% Of CEOs believe that business goals are going unsupported by IT.
34% Of business stakeholders are supporters of their IT departments (n=334).
40% Of CIOs/CEOs are misaligned on the target role for IT.
Great technical solutions are not the primary driver of IT success. Focusing on delivery of digital products that align with organizational goals will produce improved outcomes and will foster an improved relationship between business and IT.
IT![]() |
1 |
Collaboration
IT, business, and customers work together through all stages of the product lifecycle, from market research through the roadmapping and delivery processes and into maintenance and retirement. The goal is to ensure the risks and dependencies are realized before work is committed. |
Stakeholders, Customers, and Business![]() |
2 |
Communication
Prioritize high-value modes of communication to break down existing silos and create common understanding and alignment across functions. This approach increases transparency and visibility across the entire product lifecycle. |
||
3 |
Integration
Explore methods to integrate the workflows, decision making, and toolsets among the business, IT, and customers. The goal is to become more reactive to changes in business and customer expectations and more proactive about market trends. |
Do not expect a universal definition of products.
Every organization and industry has a different definition of what a product is. Organizations structure their people, processes, and technologies according to their definition of the products they manage. Conflicting product definitions between teams increase confusion and misalignment of product roadmaps.
| “A product [is] something (physical or not) that is created through a process and that provides benefits to a market.” (Mike Cohn, Founding Member of Agile Alliance and Scrum Alliance) | “A product is something ... that is created and then made available to customers, usually with a distinct name or order number.” (TechTarget) | “A product is the physical object ... , software or service from which customer gets direct utility plus a number of other factors, services, and perceptions that make the product useful, desirable [and] convenient.” (Mark Curphey) |
Organizations need a common understanding of what a product is and how it pertains to the business.
This understanding needs to be accepted across the organization.
“There is not a lot of guidance in the industry on how to define [products]. This is dangerous because what will happen is that product backlogs will be formed in too many areas. All that does is create dependencies and coordination across teams … and backlogs.” (Chad Beier, “How Do You Define a Product?” Scrum.org)

Phase 1
1.1 Define product
1.2 Define your drivers and goals
1.3 Understand the role of product ownership
1.4 Communicate what comes next
1.5 Make the case to your stakeholders
Make the Case for Product Delivery
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 |
30-60 minutes
Output: Your enterprise/organizational definition of products and services
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts
| “A product [is] something (physical or not) that is created through a process and that provides benefits to a market.” (Mike Cohn, Founding Member of Agile Alliance and Scrum Alliance) | “A product is something ... that is created and then made available to customers, usually with a distinct name or order number.” (TechTarget) | “A product is the physical object ... , software or service from which customer gets direct utility plus a number of other factors, services, and perceptions that make the product useful, desirable [and] convenient.” (Mark Curphey) |
Record the results in the Make the Case for Product-Centric Delivery Workbook.
“A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements.”Info-Tech InsightA proper definition of product recognizes three key facts:
| ![]() |
What isn’t a product:
|
You have a product if the given item...
|
Output: Examples of what is and isn’t a product in your specific context.
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts
What isn’t a product?
|
What is a product?
|
Record the results in the Make the Case for Product Delivery Workbook.

| For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. Product is used for consistency but would apply to services as well.
|
“Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:
|
30-60 minutes
Output: List of differences between project and product delivery
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts
| Theme | Project Delivery (Current) | Product Delivery (Future) |
| Timing | Defined start and end | Does not end until the product is no longer needed |
| Funding | Funding projects | Funding products and teams |
| Prioritization | LoB sponsors | Product owner |
| Capacity Management | Project management | Managed by product team |
Record the results in the Make the Case for Product Delivery Workbook.
| Project | Product | |
| Fund projects | — Funding –› | Fund products or teams |
| Line of business sponsor | — Prioritization –› | Product owner |
| Makes specific changes to a product | —Product management –› | Improves product maturity and support |
| Assignment of people to work | — Work allocation –› | Assignment of work to product teams |
| Project manager manages | — Capacity management –› | Team manages capacity |
![]() |
Projects within products
Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply. The purpose of projects is to deliver the scope of a product release. The shift to product delivery leverages a product roadmap and backlog as the mechanism for defining and managing the scope of the release. Eventually, teams progress to continuous integration/continuous delivery (CI/CD) where they can release on demand or as scheduled, requiring org change management. |
Make the Case for Product Delivery
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 |
30-60 minutes
Output: Organizational drivers to move to product-centric delivery.
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts
Pain Points
|
Root Causes
|
Drivers
|
Record the results in the Make the Case for Product Delivery Workbook.
30 minutes
Output: Goals for product-centric delivery
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts
Pain Points
| Root Causes
| Drivers
| Goals
|
Record the results in the Make the Case for Product Delivery Workbook.
Make the Case for Product Delivery
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 |
![]() Info-Tech InsightPeople treat the assignment of accountability for products (aka product ownership) as optional. Without assigning accountability up front, your transition to product delivery will stall. Accountable individuals will be focused on the core outcome for product delivery, which is the delivery of the right value, at the right time, to the right people. | ![]() |
Business
|
Technical
|
Operations
|
Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).
Recognize that product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their perspective.
“A Product Owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The Product Owner is someone who really 'owns' the product.” (Robbin Schuurman, “Tips for Starting Product Owners”)
| As discussed in Build a Better Product Owner, most product owners operate with an incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization. | ![]() |
||||
|
|||||
Details on product ownership capabilities can be found in the appendix.
60 minutes
Output: Product owner capability mapping
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

Record the results in the Make the Case for Product Delivery Workbook.
Product Owner (Tactical Focus)
|
Product Manager (Strategic Focus)
|
“Product owner” and “product manager” are terms that should be adapted to fit your culture and product hierarchy. These are not management relationships but rather a way to structure related products and services that touch the same end users.
Make the Case for Product Delivery
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 |
Consider some of the techniques you can use to validate your strategy. |
Go to your backlog and prioritize the elements that need to be answered sooner rather than later. Possible areas of focus:
|
|
| Learning Milestones
The completion of a set of artifacts dedicated to validating business opportunities and hypotheses. Possible areas of focus:
![]() |
Sprint Zero (AKA Project-before-the-project)
The completion of a set of key planning activities, typically the first sprint. Possible areas of focus:
![]() |
|
|
(Source: “Tips for Agile product roadmaps & product roadmap examples,” Scrum.org, 2017) |
30-60 minutes
Output: Product transformation critical steps and basic roadmap
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts
|
(Source: “Tips for Agile product roadmaps & product roadmap examples,” Scrum.org, 2017) |
Record the results in the Make the Case for Product Delivery Workbook.

Make the Case for Product Delivery
| Step 1.1 | Step 1.2 | Step 1.3 | Step 1.4 | Step 1.5 |
Stakeholder InfluenceStakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner is able to accomplish. Product teams operate within this network of stakeholders who represent different perspectives within the organization. See the appendix for activities and guidance on how to devise a strategy for managing stakeholders. |
![]() |
30 minutes
Output: Clear understanding of stakeholders, what they need from you, and what you need from them.
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts
| Stakeholder
|
What does solution delivery mean to them?
|
What do you need from them in order to be successful?
|
Record the results in the Make the Case for Product Delivery Workbook.
30 minutes (and up)
Output: A completed presentation to help you make the case for product delivery.
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

Record the results in the Make the Case for Product Delivery Workbook.
Deliver on Your Digital Product Vision
Build Your Agile Acceleration Roadmap
Implement Agile Practices That Work
Implement DevOps Practices That Work
|
Deliver Digital Products at Scale
Extend Agile Practices Beyond IT
Embed Security Into the DevOps Pipeline
Spread Best Practices With an Agile Center of Excellence
|
Application Portfolio Management
Application Portfolio Management (APM) Research Center
Application Portfolio Management for Small Enterprises
Streamline Application Maintenance
Build an Application Rationalization Framework
| Review Your Application Strategy
Application Portfolio Management Foundations
Streamline Application Management
Optimize Applications Release Management
Embrace Business-Managed Applications
|
Value, Delivery Metrics, Estimation
Build a Value Measurement Framework
Select and Use SDLC Metrics Effectively
Application Portfolio Assessment: End User Feedback
Create a Holistic IT Dashboard
Refine Your Estimation Practices With Top-Down Allocations
| Estimate Software Delivery With Confidence
Reduce Time to Consensus With an Accelerated Business Case
Optimize IT Project Intake, Approval, and Prioritization
Enhance PPM Dashboards and Reports
|
Org Design and Performance
Redesign Your IT Organizational Structure
Build a Strategic IT Workforce Plan
Implement a New IT Organizational Structure
|
Build an IT Employee Engagement Program
Set Meaningful Employee Performance Measures
Master Organizational Change Management Practices
|
In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

(Adapted from: Pichler, “What Is Product Management?”)
The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.

| Product managers and product owners have many responsibilities, and a roadmap can be a useful tool to complete those objectives through communication or organization of tasks.
However, not all roadmaps address the correct audience and achieve those objectives. Care must be taken to align the view to the given audience.
|
|
To be successful, product owners need to identify and manage all stakeholders for their products. This step will build a stakeholder map and strategy.
| Step 1.1 | Step 1.2 | Step 1.3 |
| Stakeholder Influence Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner is able to accomplish. Product owners operate within this network of stakeholders who represent different perspectives within the organization. First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders. Without accomplishing these missing pieces, product owners will encounter obstacles, resistance, or unexpected changes. | ![]() |
![]() |
|
||||||
Your stakeholder map defines the influence landscape your product operates in. It is every bit as important as the teams who enhance, support, and operate your product directly.
Use “connectors” to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.
60 minutes
Input: List of product stakeholders
Output: Relationships among stakeholders and influencers
Materials: Whiteboard/flip charts, Markers, Build a Better Product Owner Workbook
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts
Record the results in the Build a Better Product Owner Workbook.
| A stakeholder prioritization map helps product owners categorize their stakeholders by their level or influence and ownership in the product and/or teams.
|
There are four areas in the map, and the stakeholders within each area should be treated differently.
|
30 minutes
Input: Stakeholder map
Output: Categorization of stakeholders and influencers
Materials: Whiteboard/flip charts, Markers, Build a Better Product Owner Workbook
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts
|
![]() |
Level of Influence
|
Level of Interest
How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product? |
Record the results in the Build a Better Product Owner Workbook.

Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by rating the following question: how likely is it that your stakeholder would recommend your product? These parameters are used to prioritize which stakeholders are most important and should receive the focus of your attention. The table to the right indicates how stakeholders are ranked.
30 minutes
Input: Stakeholder matrix, Stakeholder prioritization
Output: Stakeholder and influencer prioritization
Materials: Whiteboard/flip charts, Markers, Build a Better Product Owner Workbook
Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts
| Stakeholder | Category | Level of Support | Prioritization |
| CMO | Spectator | Neutral | Irrelevant |
| CIO | Player | Supporter | Critical |
Record the results in the Build a Better Product Owner Workbook.
![]() Info-Tech InsightEach group of stakeholders draws attention and resources away from critical tasks. By properly identifying your stakeholder groups, the product owner can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers, while ensuring the needs of the Mediators and Players are met. |
|
![]() |
Each capability has three components needed for successful product ownership. Definitions are on the following slides.
Define the skills and activities in each component that are directly related to your product and culture. |
![]() |
![]() |
![]() |
Market Analysis
Business Alignment
Product Roadmap
| Info-Tech InsightData comes from many places and may still not tell the complete story.
“Customers are best heard through many ears.” (Thomas K. Connellan, Inside the Magic Kingdom) |
Soft Skills
Collaboration
Decision Making
| Info-Tech InsightProduct owners cannot be just a proxy for stakeholder decisions. The product owner owns product decisions and management of all stakeholders.
“Everything walks the walk. Everything talks the talk.” (Thomas K. Connellan, Inside the Magic Kingdom) |
Plan
Build
Run
| Info-Tech InsightProduct owners must actively manage the full lifecycle of the product.
“Pay fantastic attention to detail. Reward, recognize, celebrate.” (Thomas K. Connellan, Inside the Magic Kingdom) |
Key Performance Indicators (KPIs)
Financial Management
Business Model
| Info-Tech InsightMost organizations stop with on-time and on-budget. True financial alignment needs to define and manage the full lifecycle P&L.
“The competition is anyone the customer compares you with.” (Thomas K. Connellan, Inside the Magic Kingdom) |
Vision
|
Leadership
|
Product Lifecycle Management
|
Value Realization
|
A, Karen. “20 Mental Models for Product Managers.” Medium, Product Management Insider, 2 Aug. 2018. Web.
Adams, Paul. “Product Teams: How to Build & Structure Product Teams for Growth.” Inside Intercom, 30 Oct. 2019. Web.
Agile Alliance. “Product Owner.” Agile Alliance, n.d. Web.
Banfield, Richard, et al. “On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team.” Pluralsight, 31 Jan. 2018. Web.
Blueprint. “10 Ways Requirements Can Sabotage Your Projects Right From the Start.” Blueprint, 2012. Web.
Breddels, Dajo, and Paul Kuijten. “Product Owner Value Game.” Agile2015 Conference, 2015. Web.
Cagan, Martin. “Behind Every Great Product.” Silicon Valley Product Group, 2005. Web.
Cohn, Mike “What is a product?” Mountain Goat Software, 16 Sept. 2016, Web
Connellan, Thomas K. Inside the Magic Kingdom. Bard Press, 1997. Print.
Curphey, Mark, “Product Definition.” slideshare.net, 25 Feb. 2007. Web
Eringa, Ron. “Evolution of the Product Owner.” RonEringa.com, 12 June 2016. Web.
Fernandes, Thaisa. “Spotify Squad Framework - Part I.” Medium.com, 6 March 2017. Web.
Galen, Robert. “Measuring Product Ownership – What Does ‘Good’ Look Like?” RGalen Consulting, 5 Aug. 2015. Web.
Halisky, Merland, and Luke Lackrone. “The Product Owner’s Universe.” Agile Alliance, Agile2016, 2016. Web.
Kamer, Jurriaan. “How to Build Your Own ‘Spotify Model’.” Medium.com, 9 Feb. 2018. Web.
Kendis Team. “Exploring Key Elements of Spotify’s Agile Scaling Model.” Medium.com, 23 July 2018. Web.
Lindstrom, Lowell. “7 Skills You Need to Be a Great Product Owner.” Scrum Alliance, n.d. Web.
Lukassen, Chris. “The Five Belts Of The Product Owner.” Xebia.com, 20 Sept. 2016. Web.
Management 3.0. “Delegation Poker Product Image.” Management 3.0, n.d. Web.
McCloskey, Heather. “Scaling Product Management: Secrets to Defeating Common Challenges.” ProductPlan, 12 July 2019. Web.
McCloskey, Heather. “When and How to Scale Your Product Team.” UserVoice, 21 Feb. 2017. Web.
Mironov, Rich. “Scaling Up Product Manager/Owner Teams: Rich Mironov's Product Bytes.” Rich Mironov's Product Bytes, Mironov Consulting, 12 April 2014 . Web.
Overeem, Barry. “A Product Owner Self-Assessment.” Barry Overeem, 6 March 2017. Web.
Overeem, Barry. “Retrospective: Using the Team Radar.” Barry Overeem, 27 Feb. 2017. Web.
Pichler, Roman. “How to Scale the Scrum Product Owner.” Roman Pichler, 28 June 2016 . Web.
Pichler, Roman. “Product Management Framework.” Pichler Consulting Limited, 2014. Web.
Pichler, Roman. “Sprint Planning Tips for Product Owners.” LinkedIn, 4 Sept. 2018. Web.
Pichler, Roman. “What Is Product Management?” Pichler Consulting Limited, 26 Nov. 2014. Web.
Radigan, Dan. “Putting the ‘Flow' Back in Workflow With WIP Limits.” Atlassian, n.d. Web.
Schuurman, Robbin. “10 Tips for Product Owners on Agile Product Management.” Scrum.org, 28 Nov. 2017. Web.
Schuurman, Robbin. “10 Tips for Product Owners on (Business) Value.” Scrum.org, 30 Nov. 2017. Web.
Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Scrum.org, 5 Dec. 2017. Web.
Schuurman, Robbin. “10 Tips for Product Owners on the Product Vision.” Scrum.org, 29 Nov. 2017. Web.
Schuurman, Robbin. “Tips for Starting Product Owners.” Scrum.org, 27 Nov. 2017. Web.
Sharma, Rohit. “Scaling Product Teams the Structured Way.” Monetary Musings, 28 Nov. 2016. Web.
Steiner, Anne. “Start to Scale Your Product Management: Multiple Teams Working on Single Product.” Cprime, 6 Aug. 2019. Web.
Shirazi, Reza. “Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong.” Austin VOP #50, 2 Oct. 2018. Web.
“The Standish Group 2015 Chaos Report.” The Standish Group, 2015. Web.
Theus, Andre. “When Should You Scale the Product Management Team?” ProductPlan, 7 May 2019. Web.
Tolonen, Arto. “Scaling Product Management in a Single Product Company.” Smartly.io, 26 Apr. 2018. Web.
Ulrich, Catherine. “The 6 Types of Product Managers. Which One Do You Need?” Medium.com, 19 Dec. 2017. Web.
VersionOne. “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.
Verwijs, Christiaan. “Retrospective: Do The Team Radar.” Medium.com, 10 Feb. 2017. Web.
“How do you define a product?” Scrum.org, 4 April 2017, Web.
“Product Definition.” TechTarget, Sept. 2005. Web
Ambysoft. “2018 IT Project Success Rates Survey Results.” Ambysoft. 2018. Web.
Bastow, Janna. “Creating Agile Product roadmaps Everyone Understands.” ProdPad, 22 Mar. 2017. Accessed Sept. 2018.
Bastow, Janna. “The Product Tree Game: Our Favorite Way To Prioritize Features.” ProdPad, 21 Feb. 2016. Accessed Sept. 2018.
Chernak, Yuri. “Requirements Reuse: The State of the Practice.” 2012, Herzlia, Israel, 2012 IEEE International Conference on Software Science, Technology and Engineering, 12 June 2012. Web.
Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Accessed 20 Nov. 2017.
Harrin, Elizabeth. “Learn What a Project Milestone Is.” The Balance Careers, 10 May 2018. Accessed Sept. 2018.
“How to create a product roadmap.” Roadmunk, n.d. Accessed Sept. 2018.
Johnson, Steve. “How to Master the 3 Horizons of Product Strategy.” Aha!, 24 Sept. 2015. Accessed Sept. 2018.
Johnson, Steve. “The Product Roadmap vs. the Technology Roadmap.” Aha!, 23 June 2016. Accessed Sept. 2018
Juncal, Shaun. “How Should You Set Your Product Roadmap Timeframes?” ProductPlan, n.d. Accessed Sept. 2018.
Leffingwell, Dean. “SAFe 4.0.” Scaled Agile, Inc., 2017. Web.
Maurya, Ash. “What is a Minimum Viable Product (MVP)?” LEANSTACK, 12 June 2017. Accessed Sept. 2018.
Pichler, Roman. “10 Tips for Creating an Agile Product Roadmap.” Roman Pichler, 20 July 2016. Accessed Sept. 2018.
Pichler, Roman. Strategize: Product Strategy and Product Roadmap Practices for the Digital Age. Pichler Consulting, 2016.
“Product Roadmap Contents: What Should You Include?” ProductPlan, n.d. Accessed 20 Nov. 2017.
Saez, Andrea. “Why Your Roadmap Is Not a Release Plan.” ProdPad, 23 Oct. 2015. Accessed Sept. 2018.
Schuurman, Robbin. “Tips for Agile product roadmaps & product roadmap examples.” Scrum.org, 7 Dec. 2017. Accessed Sept. 2018
![]() |
Emily Archer
Emily Archer is a consultant currently working with Fortune 500 clients to ensure the delivery of successful projects, products, and processes. She helps increase the business value returned for organizations’ investments in designing and implementing enterprise content hubs and content operations, custom web applications, digital marketing, and e-commerce platforms. |
![]() |
David Berg
David Berg is a product commercialization expert that has spent the last 20 years of his career delivering product management and business development services across a broad range of industries. Early in his career, David worked with product management and engineering teams to build core network infrastructure products that secure and power the internet we benefit from today. David’s experience also includes working with clean technologies in the area of clean power generation, agritech, and Internet of Things infrastructure. Over the last five years, David has been focused on his latest venture, Strainprint Technologies, a data and analytics company focused on the medical cannabis industry. Strainprint has built the largest longitudinal medical cannabis dataset in the world with the goal to develop an understanding of treatment behavior, interactions, and chemical drivers to guide future product development. |
![]() |
Kathy Borneman
Kathy Borneman is a senior product owner who helps people enjoy their jobs again by engaging others in end-to-end decision making to deliver software and operational solutions that enhance the client experience and allow people to think and act strategically. |
![]() |
Charlie Campbell
Charlie Campbell is an experienced problem solver with the ability to quickly dissect situations and recommend immediate actions to achieve resolution, liaise between technical and functional personnel to bridge the technology and communication gap, and work with diverse teams and resources to reach a common goal. |
![]() |
Yarrow Diamond
Yarrow Diamond is an experienced professional with expertise in enterprise strategy development, project portfolio management, and business process reengineering across financial services, healthcare and insurance, hospitality, and real estate environments. She has a master’s in Enterprise Architecture from Penn State University, LSSMBB, PMP, CSM, ITILv3. |
![]() |
Cari J. Faanes-Blakey, CBAP, PMI-PBA
Cari J. Faanes-Blakey has a history in software development and implementation as a Business Analyst and Project Manager for financial and taxation software vendors. Active in the International Institute of Business Analysis (IIBA), Cari participated on the writing team for the BA Body of Knowledge 3.0 and the certification exam. |
![]() |
Kieran Gobey
Kieran Gobey is an IT professional with 24 years of experience, focused on business, technology, and systems analysis. He has split his career between external and internal customer-facing roles, and this has resulted in a true understanding of what is required to be a Professional Services Consultant. His problem-solving skills and ability to mentor others have resulted in successful software implementations. Kieran’s specialties include deep system troubleshooting and analysis skills, facilitating communications to bring together participants effectively, mentoring, leadership, and organizational skills. |
![]() |
Rupert Kainzbauer
Rupert Kainzbauer is an experienced senior leader with a passion for defining and delivering products that deliver real customer and commercial benefit. Together with a team of highly experienced and motivated product managers, he has successfully led highly complex, multi-stakeholder payments initiatives, from proposition development and solution design through to market delivery. Their domain experience is in building online payment products in high-risk and emerging markets, remittance, prepaid cards, and mobile applications. |
![]() |
Saeed Khan
Saeed Khan has been working in high tech for 30 years in both Canada and the US and has held a number of leadership roles in Product Management over that time. He speaks regularly at conferences and has been writing publicly about technology product management since 2005. Through Transformation Labs, Saeed helps companies accelerate product success by working with product teams to improve their skills, practices, and processes. He is a cofounder of ProductCamp Toronto and currently runs a Meetup group and global Slack community called Product Leaders, the only global community of senior-level product executives. |
![]() |
Hoi Kun Lo
Hoi Kun Lo is an experienced change agent who can be found actively participating within the IIBA and WITI groups in Tampa, FL, and a champion for Agile, architecture, diversity, and inclusion programs at Nielsen. She is currently a Product Owner in the Digital Strategy team within Nielsen Global Watch Technology. |
![]() |
Abhishek Mathur
Abhishek Mathur is a product management leader, an artificial intelligence practitioner, and an educator. He has led product management and engineering teams at Clarifai, IBM, and Kasisto to build a variety of artificial intelligence applications within the space of computer vision, natural language processing, and recommendation systems. Abhishek enjoys having deep conversations about the future of technology and helping aspiring product managers enter and accelerate their careers. |
![]() |
Jeff Meister
Jeff Meister is a technology advisor and product leader. He has more than 20 years of experience building and operating software products and the teams that build them. He has built products across a wide range of industries and has built and led large engineering, design, and product organizations. Jeff most recently served as Senior Director of Product Management at Avanade, where he built and led the product management practice. This involved hiring and leading product managers, defining product management processes, solution shaping and engagement execution, and evangelizing the discipline through pitches, presentations, and speaking engagements. Jeff holds a Bachelor of Applied Science (Electrical Engineering) and a Bachelor of Arts from the University of Waterloo, an MBA from INSEAD (Strategy), and certifications in product management, project management, and design thinking. |
![]() |
Vincent Mirabelli
With over 10 years of experience in both the private and public sectors, Vincent Mirabelli possesses an impressive track record of improving, informing, and transforming business strategy and operations through process improvement, design and re-engineering, and the application of quality to business analysis, project management, and process improvement standards. |
![]() |
Oz Nazili
Oz Nazili is a product leader with a decade of experience in both building products and product teams. Having spent time at funded startups and large enterprises, he thinks often about the most effective way to deliver value to users. His core areas of interest include Lean MVP development and data-driven product growth. |
![]() |
Mark Pearson
Mark Pearson is an executive business leader grounded in the process, data, technology, and operations of software-driven business. He knows the enterprise software landscape and is skilled in product, technology, and operations design and delivery within information technology organizations, outsourcing firms, and software product companies. |
![]() |
Brenda Peshak
Brenda Peshak is skilled in business process, analytical skills, Microsoft Office Suite, communication, and customer relationship management (CRM). She is a strong product management professional with a Master’s focused in Business Leadership (MBL) from William Penn University. |
![]() |
Mike Starkey
Mike Starkey is a Director of Engineering at W.W. Grainger, currently focusing on operating model development, digital architecture, and building enterprise software. Prior to joining W.W. Grainger, Mike held a variety of technology consulting roles throughout the system delivery lifecycle spanning multiple industries such as healthcare, retail, manufacturing, and utilities with Fortune 500 companies. |
![]() |
Anant Tailor
Anant Tailor is a cofounder at Dream Payments where he currently serves as the COO and Head of Product, having responsibility for Product Strategy & Development, Client Delivery, Compliance, and Operations. He has 20+ years of experience building and operating organizations that deliver software products and solutions for consumers and businesses of varying sizes. Prior to founding Dream Payments, Anant was the COO and Director of Client Services at DonRiver Inc, a technology strategy and software consultancy that he helped to build and scale into a global company with 100+ employees operating in seven countries. Anant is a Professional Engineer with a Bachelor’s degree in Electrical Engineering from McMaster University and a certificate in Product Strategy & Management from the Kellogg School of Management at Northwestern University. |
![]() |
Angela Weller
Angela Weller is an experienced Agile business analyst who collaborates with key stakeholders to attain their goals and contributes to the achievement of the company’s strategic objectives to ensure a competitive advantage. She excels when mediating or facilitating teams. |
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Discover where your data resides, what governance helps you do, and what types of data you're classifying. Then build your data and security protection baselines for your retention policy, sensitivity labels, workload containers, and both forced and unforced policies.
Your Challenge
|
Common Obstacles
Data governance has several obstacles that impact a successful launch, especially if governing M365 is not a planned strategy. Below are some of the more common obstacles:
|
Info-Tech’s Approach
|
Data classification is the lynchpin to any effective governance of O/M365 and your objective is to navigate through this easily and effectively and build a robust, secure, and viable governance model. Start your journey by identifying what and where your data is and how much data do you have. You need to understand what sensitive data you have and where it is stored before you can protect or govern it. Ensure there is a high-level leader who is the champion of the governance objectives. Data classification fulfills the governance objectives of risk mitigation, governance and compliance, efficiency and optimization, and analytics.
1Know Your DataDo you know where your critical and sensitive data resides and what is being done with it?Trying to understand where your information is can be a significant project. |
2Protect Your DataDo you have control of your data as it traverses across the organization and externally to partners?You want to protect information wherever it goes through encryption, etc. |
3Prevent Data LossAre you able to detect unsafe activities that prevent sharing of sensitive information?Data loss prevention (DLP) is the practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of sensitive data. |
4Govern Your DataAre you using multiple solutions (or any) to classify, label, and protect sensitive data?Many organizations use more than one solution to protect and govern their data, making it difficult to determine if there are any coverage gaps. |
Deciding on how granular you go into data classification will chiefly be governed by what industry you are in and your regulatory obligations – the more highly regulated your industry, the more classification levels you will be mandated to enforce. The more complexity you introduce into your organization, the more operational overhead both in cost and resources you will have to endure and build.
Microsoft Information Protection (MIP), which is Microsoft’s Data Classification Services, is the key to achieving your governance goals. Without an MVP, data classification will be overwhelming; simplifying is the first step in achieving governance.

(Source: Microsoft, “Microsoft Purview compliance portal”)
Using least-complex sensitivity labels in your classification are your building blocks to compliance and security in your data management schema; they are your foundational steps.
Data governance is a "takes a whole village" kind of effort.
Clarify who is expected to do what with a RACI chart.
| End User | M365 Administrator | Security/ Compliance | Data Owner | |
| Define classification divisions | R | A | ||
| Appy classification label to data – at point of creation | A | R | ||
| Apply classification label to data – legacy items | R | A | ||
| Map classification divisions to relevant policies | R | A | ||
| Define governance objectives | R | A | ||
| Backup | R | A | ||
| Retention | R | A | ||
| Establish minimum baseline | A | R |
What and where your data residesData types that require classification. |
|
| M365 Workload Containers | |||
Email
|
Site Collections, Sites | Sites | Project Databases |
| Contacts | Teams and Group Site Collections, Sites | Libraries and Lists | Sites |
| Metadata | Libraries and Lists | Documents
|
Libraries and Lists |
| Teams Conversations | Documents
|
Metadata | Documents
|
| Teams Chats | Metadata | Permissions
|
Metadata |
Permissions
|
Files Shared via Teams Chats | Permissions
|
|
Knowing where your data resides will ensure you do not miss any applicable data that needs to be classified. These are examples of the workload containers; you may have others.
AIP helps you manage sensitive data prior to migrating to Office 365:
|
|
Azure Information Protection scanner helps discover, classify, label, and protect sensitive information in on-premises file servers. You can run the scanner and get immediate insight into risks with on-premises data. Discover mode helps you identify and report on files containing sensitive data (Microsoft Inside Track and CIAOPS, 2022). Enforce mode automatically classifies, labels, and protects files with sensitive data. |
Any asset deployed to the cloud must have approved data classification. Enforcing this policy is a must to control your data.
Information Governance
|
Records Management
|
| Retention and Deletion
‹——— Connectors for Third-Party Data ———› |
|
| Information governance manages your content lifecycle using solutions to import, store, and classify business-critical data so you can keep what you need and delete what you do not. Backup should not be used as a retention methodology since information governance is managed as a “living entity” and backup is a stored information block that is “suspended in time.” | Records management uses intelligent classification to automate and simplify the retention schedule for regulatory, legal, and business-critical records in your organization. It is for that discrete set of content that needs to be immutable. |
Info-Tech InsightRetention is not backup. Retention means something different: “the content must be available for discovery and legal document production while being able to defend its provenance, chain of custody, and its deletion or destruction” (AvePoint Blog, 2021). |
|
What are retention policies used for? Why you need them as part of your MVP?
Do not confuse retention labels and policies with backup.
Remember: “retention [policies are] auto-applied whereas retention label policies are only applied if the content is tagged with the associated retention label” (AvePoint Blog, 2021).
E-discovery tool retention policies are not turned on automatically.
Retention policies are not a backup tool – when you activate this feature you are unable to delete anyone.
“Data retention policy tools enable a business to:
“It is also important to remember that ‘Retention Label Policies’ do not move a copy of the content to the ‘Preservation Holds’ folder until the content under policy is changed next.” (Source: AvePoint Blog, 2021)
Data classification is a focused term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level. In its most basic form, data classification is a means of protecting your data from unauthorized disclosure, alteration, or destruction based on how sensitive or impactful it is.
Once data is classified, you can then create policies; sensitive data types, trainable classifiers, and sensitivity labels function as inputs to policies. Policies define behaviors, like if there will be a default label, if labeling is mandatory, what locations the label will be applied to, and under what conditions. A policy is created when you configure Microsoft 365 to publish or automatically apply sensitive information types, trainable classifiers, or labels.
Sensitivity label policies show one or more labels to Office apps (like Outlook and Word), SharePoint sites, and Office 365 groups. Once published, users can apply the labels to protect their content.
Data loss prevention (DLP) policies help identify and protect your organization's sensitive info (Microsoft Docs, April 2022). For example, you can set up policies to help make sure information in email and documents is not shared with the wrong people. DLP policies can use sensitive information types and retention labels to identify content containing information that might need protection.
Retention policies and retention label policies help you keep what you want and get rid of what you do not. They also play a significant role in records management.
Internal Personal, Employment, and Job Performance Data
|
Confidential Information
|
Internal Data
|
Public Data
|
| Public | Private | |
| Privacy |
|
|
| Allowed | Not Allowed | |
| External guest policy |
|
|
What users will see when they create or label a Team/Group/Site

(Source: Microsoft, “Microsoft Purview compliance portal”)
| Data Protection Baseline
“Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline" (Microsoft Docs, June 2022). This baseline assessment has a set of controls for key regulations and standards for data protection and general data governance. This baseline draws elements primarily from NIST CSF (National Institute of Standards and Technology Cybersecurity Framework) and ISO (International Organization for Standardization) as well as from FedRAMP (Federal Risk and Authorization Management Program) and GDPR (General Data Protection Regulation of the European Union). |
Security Baseline
The final stage in M365 governance is security. You need to implement a governance policy that clearly defines storage locations for certain types of data and who has permission to access it. You need to record and track who accesses content and how they share it externally. “Part of your process should involve monitoring unusual external sharing to ensure staff only share documents that they are allowed to” (Rencore, 2021). |
Security MFA or SSO to access from anywhere, any device Banned password list BYOD sync with corporate network |
Users Sign out inactive users automatically Enable guest users External sharing Block client forwarding rules |
Resources Account lockout threshold OneDrive SharePoint |
Controls Sensitivity labels, retention labels and policies, DLP Mobile application management policy |
Sensitivity Profiles: Public, Internal, Confidential; Subcategory: Highly Confidential
| Sensitivity | Public | External Collaboration | Internal | Highly Confidential |
| Description | Data that is specifically prepared for public consumption | Not approved for public consumption, but OK for external collaboration | External collaboration highly discouraged and must be justified | Data of the highest sensitivity: avoid oversharing, internal collaboration only |
| Label details |
|
|
|
|
| Teams or Site details | Public Team or Site open discovery, guests are allowed | Private Team or Site members are invited, guests are allowed | Private Team or Site members are invited, guests are not allowed | |
| DLP | None | Warn | Block | |
Please Note: Global/Compliance Admins go to the 365 Groups platform, the compliance center (Purview), and Teams services (Source: Microsoft Documentation, “Microsoft Purview compliance documentation”)
| PRIMARY ACTIVITIES |
Define Your Governance
The objective of the MVP is reducing barriers to establishing an initial governance position, and then enabling rapid progression of the solution to address a variety of tangible risks, including DLP, data retention, legal holds, and labeling. Decide on your classification labels early. |
CATEGORIZATION
CLASSIFICATION |
MVP | ||||
| Data Discovery and Management
AIP (Azure Information Protection) scanner helps discover, classify, label, and protect sensitive information in on-premises file servers. You can run the scanner and get immediate insight into risks with on-premises data. |
|||||||
| Baseline Setup
Building baseline profiles will be a part of your MVP. You will understand what type of information you are addressing and label it accordingly. Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline. |
|||||||
| Default M365 settings
Microsoft provides a default assessment in Compliance Manager for the Microsoft 365 data protection baseline. This baseline assessment has a set of controls for key regulations and standards for data protection and general data governance. |
|||||||
| SUPPORT ACTIVITIES |
Retention Policy
Retention policy is auto-applied. Decide whether to retain content, delete content, or retain and then delete the content. |
Sensitivity Labels
Automatically enforce policies on groups through labels; classify groups. |
Workload Containers
M365: SharePoint, Teams, OneDrive, and Exchange, where your data is stored for labels and policies. |
Unforced Policies
Written policies that are not enforceable by controls in Compliance Manager such as acceptable use policy. |
Forced Policies
Restrict sharing controls to outside organizations. Enforce prefix or suffix to group or team names. |
||
| PRIMARY ACTIVITIES | Define Your Governance
| CATEGORIZATION
CLASSIFICATION | MVP | ||||
| Data Discovery and Management
| |||||||
| Baseline Setup
| |||||||
| Default M365 settings
| |||||||
| SUPPORT ACTIVITIES | Retention Policy
| Sensitivity Labels
| Workload Containers
| Unforced Policies
| Forced Policies
| ||
Office 365 is as difficult to wrangle as it is valuable. Leverage best practices to produce governance outcomes aligned with your goals.
Map your organizational goals to the administration features available in the Office 365 console. Your governance should reflect your requirements.
Jumping into an Office 365 migration project without careful thought of the risks of a cloud migration will lead to project halt and interruption. Intentionally plan in order to expose risk and to develop project foresight for a smooth migration.
Remote work calls for leveraging your Office 365 license to use Microsoft Teams – but IT is unsure about best practices for governance and permissions. Moreover, IT has few resources to help train end users with Teams best practicesIT Governance, Risk & Compliance
Several blueprints are available on a broader topic of governance, from Make Your IT Governance Adaptable to Improve IT Governance to Drive Business Results and Build an IT Risk Management Program.
“Best practices for sharing files and folders with unauthenticated users.” Microsoft Build, 28 April 2022. Accessed 2 April 2022.
“Build and manage assessments in Compliance Manager.” Microsoft Docs, 15 June 2022. Web.
“Building a modern workplace with Microsoft 365.” Microsoft Inside Track, n.d. Web.
Crane, Robert. “June 2020 Microsoft 365 Need to Know Webinar.” CIAOPS, SlideShare, 26 June 2020. Web.
“Data Classification: Overview, Types, and Examples.” Simplilearn, 27 Dec. 2021. Accessed 11 April 2022.
“Data loss prevention in Exchange Online.” Microsoft Docs, 19 April 2022. Web.
Davies, Nahla. “5 Common Data Governance Challenges (and How to Overcome Them).” Dataversity. 25 October 2021. Accessed 5 April 2022.
“Default labels and policies to protect your data.” Microsoft Build, April 2022. Accessed 3 April 2022.
M., Peter. "Guide: The difference between Microsoft Backup and Retention." AvePoint Blog, 9 Oct. 2021. Accessed 4 April 2022.
Meyer, Guillaume. “Sensitivity Labels: What They Are, Why You Need Them, and How to Apply Them.” nBold, 6 October 2021. Accessed 2 April 2022.
“Microsoft 365 guidance for security & compliance.” Microsoft, 27 April 2022. Accessed 28 April 2022.
“Microsoft Purview compliance portal.” Microsoft, 19 April 2022. Accessed 22 April 2022.
“Microsoft Purview compliance documentation.” Microsoft, n.d. Accessed 22 April 2022.
“Microsoft Trust Center: Products and services that run on trust.” Microsoft, 2022. Accessed 3 April 2022.
“Protect your sensitive data with Microsoft Purview.” Microsoft Build, April 2022. Accessed 3 April 2022.
Zimmergren, Tobias. “4 steps to successful cloud governance in Office 365.” Rencore, 9 Sept. 2021. Accessed 5 April 2022.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Complete Phase 1 to outline your DR site requirements, review any industry or organizational constraints on your DR strategy, and zero in on relevant DR models.
Complete Phase 2 to explore possibilities of deployment models, conduct a TCO comparison analysis, and select the best-fit model.
Complete Phase 3 to assess outsourcing best practices, address implementation considerations, and build an executive presentation for business stakeholders.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Identify potential DR models
Take a funneled approach and avoid getting lost among all of the DR models available
1.1 Define DR site requirements
1.2 Document industry and organizational constraints
1.3 Identify potential DR models
Determine the type of site, replication, and risk mitigation initiatives required
Rule out unfit models
DR Decision Tree
Application Assessment Tool for Cloud DR
Explore relevant DR models
Develop supporting evidence for the various options
2.1 Explore pros and cons of potential solutions
2.2 Understand the use case for DRaaS
2.3 Review DR model diagrams
Qualitative analysis on candidate models
Evaluate the need for DRaaS
DR diagrams for candidate models
Determine best cost models
Save money by selecting the most cost effective option to meet your DR requirements
3.1 Gather hardware requirements for production site
3.2 Define capacity requirements for DR
3.3 Compare cost across various models
Populate the production summary tab in TCO tool
Understand how much hardware will need to be on standby and how much will be procured at the time of disaster
Find the most cost effective method
Build support from business stakeholders by having a clear and defendable proposal for DR
Effective and ready DR deployment model
4.1 Address implementation considerations for network, capacity, and day-to-day operations
4.2 Build presentation for business stakeholders
Define implementation projects necessary for deployment and appoint staff to execute them
PowerPoint presentation to summarize findings from the course of the project
Security, risk, and trust models play into how networks are designed and deployed. If these models are not considered during network design, band-aids and workarounds will be deployed to achieve the needed goals, potentially bypassing network controls.
The cloud “gold rush” has made it attractive for many enterprises to migrate services off the traditional network and into the cloud. These services are now outside of the traditional network and associated controls. This shifts the split of east-west vs. north-south traffic patterns, as well as extending the network to encompass services outside of enterprise IT’s locus of control.
Where users access enterprise data or services and from which devices dictate the connectivity needed. With the increasing shift of work that the business is completing remotely, not all devices and data paths will be under the control of IT. This shift does not allow IT to abdicate from the responsibility to provide a secure network.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint will help you:
Dispense with detailed analysis and customizations to present a quick snapshot of the road ahead.
Connectivity and security are tightly coupled
Security, risk, and trust models play into how networks are designed and deployed. If these models are not considered during network design, band-aids and workarounds will be deployed to achieve the needed goals, potentially bypassing network controls.
Many services are no longer within the network
The cloud “gold rush” has made it attractive for many enterprises to migrate services off the traditional network and into the cloud. These services are now outside of the traditional network and associated controls. This shifts the split of east-west vs. north-south traffic patterns, as well as extending the network to encompass services outside of enterprise IT’s locus of control.
Users are demanding an anywhere, any device access model
Where users access enterprise data or services and from which devices dictate the connectivity needed. With the increasing shift of work that the business is completing remotely, not all devices and data paths will be under the control of IT. This shift does not allow IT to abdicate from the responsibility to provide a secure network.
The enterprise network of 2020 and beyond is changing:
The above statements are all accurate for enterprise networks, though each potentially to differing levels depending on the business being supported by the network. Depending on how affected the network in question currently is and will be in the near future, there are different common network archetypes that are best able to address these concerns while delivering business value at an appropriate price point.
Understand what the business needs are and where users and resources are located.
Trust is a spectrum and tied tightly to security.
How will the network be deployed?
What tools are in the market to help achieve design principles?
Mission
Never ignore the basics. Start with revisiting the mission and vision of the business to address relevant needs.
Users
Identify where users will be accessing services from. Remote vs. “on net” is a design consideration now more than ever.
Resources
Identify required resources and their locations, on net vs. cloud.
Controls
Identify required controls in order to define control points and solutions.
Trust is a spectrum
Implicit
Trust everything within the network. Security is perimeter based and designed to stop external actors from entering the large trusted zone.
Controlled
Multiple zones of trust within the network. Segmentation is a standard practice to separate areas of higher and lower trust.
Zero
Verify trust. The network is set up to recognize and support the principle of least privilege where only required access is supported.
Archetypes are a good guide
Traditional
Services are provided from within the traditional network boundaries and security is provided at the network edge.
Hybrid
Services are provided both externally and from within the traditional network boundaries, and security is primarily at the network edge.
Inverted
Services are provided primarily externally, and security is cloud centric.
Abstract
A traditional network is one in which there are clear boundaries defined by a security perimeter. Trust can be applied within the network boundaries as appropriate, and traffic is generally routed through internally deployed control points that may be centralized. Traditional networks commonly include large firewalls and other “big iron” security and control devices.
Network Design Tenets
Control
In the traditional network, it is assumed that all required control points can be adequately deployed across hardware/software that is “on prem” and under the control of central IT.
Info-Tech Insight
With increased cloud services provided to end users, this network is now more commonly used in data centers or OT networks.
Abstract
A hybrid network is one that combines elements of a traditional network with cloud resources. As some of these resources are not fully under the control of IT and may be completely “offnet” or loosely coupled to the on-premises network, the security boundaries and control points are less likely to be centralized. Hybrid networks allow the flexibility and speed of cloud deployment without leaving behind traditional network constructs. This generally makes them expensive to secure and maintain.
Network Design Tenets
Control
The hallmark of a hybrid network is the blending of public and private resources. This blending tends to necessitate both public and private points of control that may not be homogenous.
Info-Tech Insight
With multiple control points to address, take care in simplifying designs while addressing all concerns to ease operational load.
Abstract
An inverted perimeter network is one in which security and control points cover the entire workflow, on or off net, from the consumer of services through to the services themselves with zero trust. Since the control plane is designed to encompass the workflow in a secure manner, much of the underlying connectivity can be abstracted. In an extreme version of this deployment, IT would abstract end-user access, and any cloud-based or on-premises resources would be securely published through the control plane with context-aware precision access.
Network Design Tenets
Control
An inverted network abstracts the lower-layer connectivity away and focuses on implementing a cloud-based zero trust control plane.
Info-Tech Insight
This model is extremely attractive for organizations that consume primarily cloud services and have a large remote work force.
“It is essential to have good tools, but it is also essential that the tools should be used in the right way.” — Wallace D. Wattles
Simplified branch office connectivity
Archetype Value: Traditional Networks
SD-WAN is generally not a way to slash spending by lowering WAN circuit costs. Though it is traditionally deployed across lower cost access, to minimize risk and realize the most benefits from the platform many organizations install multiple circuits with greater bandwidths at each endpoint when replacing the more costly traditional circuits. Though this maximizes the value of the technology investment, it will result in the end cost being similar to the traditional cost plus or minus a small percentage.
SD-WAN is a subset of software-defined networking (SDN) designed specifically to deploy a secure, centrally managed, connectivity agnostic, overlay network connecting multiple office locations. This technology can be used to replace, work in concert with, or augment more traditional costly connectivity such as MPLS or private point to point (PtP) circuits. In addition to the secure overlay, SD-WAN usually also enables policy-based, intelligent controls, based on traffic and circuit intelligence.
You have multiple endpoint locations connected by expensive lower bandwidth traditional circuits. Your target is to increase visibility and control while controlling costs if and where possible. Ease of centralized management and the ability to more rapidly turn up new locations are attractive.
Inline policy enforcement placed between users and cloud services
Archetype Value: Hybrid Networks
CASBs do not provide network protection; they are designed to provide compliance and enforcement of rules. Though CASBs are designed to give visibility and control into cloud traffic, they have limits to the data that they generally ingest and utilize. A CASB does not gather or report on cloud usage details, licencing information, financial costing, or whether the cloud resource usage is aligned with the deployment purpose.
A CASB is designed to establish security controls beyond a company’s environment. It is commonly deployed to augment traditional solutions to extend visibility and control into the cloud. To protect assets in the cloud, CASBs are designed to provide central policy control and apply services primarily in the areas of visibility, data security, threat protection, and compliance.
You a mixture of on-premises and cloud assets. In moving assets out to the cloud, you have lost the traditional controls that were implemented in the data center. You now need to have visibility and apply controls to the usage of these cloud assets.
Convergence of security and service access in the cloud
Archetype Value: Inverted Networks
Though the service will consist of many service offerings, SASE is not multiple services strung together. To present the value proposed by this platform, all functionality proposed must be provided by a single platform under a “single pane of glass.” SASE is not a mature and well-established service. The market is still solidifying, and the full-service definition remains somewhat fluid.
SASE exists at the intersection of network-as-a-service and network-security-as-a-service. It is a superset of many network and security cloud offerings such as CASB, secure web gateway, SD-WAN, and WAN optimization. Any services offered by a SASE provider will be cloud hosted, presented in a single stack, and controlled through a single pane of glass.
Your network is inverting, and services are provided primarily as cloud assets. In a full realization of this deployment’s value, you would abstract how and where users gain initial network access yet remain in control of the communications and data flow.
Activity: Network assessment in an hour
Review your design options with security and compliance in mind. Infrastructure is no longer a standalone entity and now tightly integrates with software-defined networks and security solutions.
Learn about the Enterprise Network Roadmap Technology Assessment Tool.
This workbook provides a high-level analysis of a technology’s readiness for adoption based on your organization’s needs.
Complete the Enterprise Network Roadmap Technology Assessment Tool.
Effectively Acquire Infrastructure Services
Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.
Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery
There are very few IT infrastructure components you should be housing internally – outsource everything else.
Build Your Infrastructure Roadmap
Move beyond alignment: Put yourself in the driver’s seat for true business value.
Drive Successful Sourcing Outcomes With a Robust RFP Process
Leverage your vendor sourcing process to get better results.
Scott Young, Principal Research Advisor, Info-Tech Research Group
Scott Young is a Director of Infrastructure Research at Info-Tech Research Group. Scott has worked in the technology field for over 17 years, with a strong focus on telecommunications and enterprise infrastructure architecture. He brings extensive practical experience in these areas of specialization, including IP networks, server hardware and OS, storage, and virtualization.
Troy Cheeseman, Practice Lead, Info-Tech Research Group
Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.
Ahlgren, Bengt. “Design considerations for a network of information.” ACM Digital Library, 21 Dec. 2008.
Cox Business. “Digital transformation is here. Is your business ready to upgrade your mobile work equation?” BizJournals, 1 April 2022. Accessed April 2022.
Elmore, Ed. “Benefits of integrating security and networking with SASE.” Tech Radar, 1 April 2022. Web.
Greenfield, Dave. “From SD-WAN to SASE: How the WAN Evolution is Progressing.” Cato Networks, 19 May 2020. Web
Korolov, Maria. “What is SASE? A cloud service that marries SD-WAN with security.” Network World, 7 Sept. 2020. Web.
Korzeniowski, Paul, “CASB tools evolve to meet broader set of cloud security needs.” TechTarget, 26 July 2019. Accessed March 2022.
Cost optimization is misunderstood and inadequately tackled. IT departments face:
Cost optimization is not just about reducing costs. In fact, you should aim to achieve three objectives:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This blueprint will help you understand your IT cost optimization mandate, identify your journey, assess your IT spend across four levers, develop your IT cost optimization roadmap, and craft a related communication strategy.
This tool guides an IT department in planning and prioritization activities to build an effective IT cost optimization strategy. The outputs include visual charts and a 12-month roadmap to showcase the implementation timelines and potential cost savings.
This presentation template uses sample data from "Acme Corp" to demonstrate an IT cost optimization strategy following a proactive journey. Use this template to document your final IT cost optimization strategy outputs, including the adopted journey, IT cost optimization goals, related key initiatives, potential cost savings, timelines, and 12-month roadmap.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Determine your organization’s current context and its cost optimization objectives, IT’s corresponding cost optimization journey, and goals.
A business-aligned set of specific IT cost optimization goals.
1.1 Understand your organization’s cost optimization objectives and how this impacts IT.
1.2 Review potential cost optimization target areas based on your ITFM Benchmarking Report.
1.3 Identify factors constraining cost optimization options.
1.4 Set concrete IT cost optimization goals.
1.5 Identify inputs required for decision making.
IT cost optimization journey and guiding principles for making corresponding decisions
Create a longlist of potential cost optimization initiatives focused on two cost optimization levers: assets and vendors.
A comprehensive list of potential asset- and vendor-focused initiatives including cost savings estimates.
2.1 Identify a longlist of possible initiatives around asset lifecycle management, investment deferral, repurposing, etc., and vendor contract renegotiation, cancelation, etc.
2.2 Estimate the cost savings of cost optimization initiatives.
Longlist of potential vendor management and asset optimization IT cost optimization initiatives
Create a longlist of potential cost optimization initiatives focused on two cost optimization levers: project portfolio and workforce.
A comprehensive list of potential initiatives focused on project portfolio and workforce including cost savings estimates.
3.1 Identify a longlist of possible initiatives around project priorities, project backlog reduction, project intake restructuring, etc., and workforce productivity, skills, redeployment, etc.
3.2 Estimate the cost savings of cost optimization initiatives.
Longlist of possible cost optimization initiatives and their potential cost savings for project portfolio and workforce levers.
Develop a visual IT cost optimization roadmap.
A prioritized, business-aligned IT cost optimization roadmap
4.1 Assess feasibility of each initiative (effort and risk profile) given cost optimization goals.
4.2 Prioritize cost optimization initiatives to create a final shortlist.
4.3 Fine-tune key information about your final cost optimization initiatives and develop a cost optimization roadmap for proposal.
Prioritized list of key cost optimization initiatives, descriptions, estimated impact, and roadmap.
Develop a communication plan and executive presentation.
A boardroom-ready set of communication materials for gaining buy-in and support for your IT cost optimization roadmap.
5.1 Outline components of a communication plan, including approvers, stakeholders, and governance and management mechanisms to be used.
5.2 Create an executive presentation.
5.3 Set up review time for workshop deliverables and post-workshop activities.
IT cost optimization communication plan and presentation strategy.
IT Cost Optimization Executive Presentation
Whether the industry is in an economic downturn, or your business is facing headwinds in the market, pressure to reduce spending across organizations is inevitable. When it comes to the IT organization, it is often handled as a onetime event. Cost optimization is an industry standard term, but it usually translates into cost cutting. How do you manage this challenge given the day-to-day demands placed on IT? Do you apply cost reduction equally across the IT landscape, or do you apply reductions using a targeted approach? How do you balance the business demands regarding innovation with keeping the lights on? What is the best path forward?
While the situation isn't unique, all too often the IT organization response is too shortsighted.
By using the Info-Tech methodology and tools, you will be able to develop an IT cost optimization roadmap based on your specific circumstances and timeline.
A well-thought-out strategy should help you achieve three objectives:
This blueprint will guide you to understand your mandate, identify your cost optimization journey (reactive, proactive, or strategic), and assess your IT spend across four levers (assets, vendors, project portfolio, and workforce).
Finally, keep in mind that cost optimization is not a project to be completed, but an ongoing process to be exercised.
Bilal Alberto Saab
Research Director, IT Financial Management
Info-Tech Research Group
| Cost optimization is misunderstood and inadequately tackled | Common obstacles | Follow Info-Tech's approach to develop a 12-month cost optimization roadmap |
|
|
Develop an IT cost optimization strategy based on your specific circumstances and timeline. Info-Tech's methodology helps you maintain sustainable cost optimization across IT by focusing on four levers:
|
Info-Tech Insight
Cost optimization is not just about reducing costs. In fact, you should aim to achieve three objectives: (1) reduce your unwarranted IT spending, (2) optimize your cost-to-value, and (3) sustain your cost optimization.
When crisis hits, does IT's hard-won gains around being seen as a partner to the business suddenly disappear and IT becomes just a cost center all over again?
In times of economic slowdown or downturn, the key challenge of IT leaders is to optimize costs without jeopardizing their strategic and innovative contribution.
How can IT optimize costs to achieve a corporate impact, but not cut so deep that the organization can't take advantage of opportunities to recover and thrive?
Know how you will strategically optimize IT costs before you are forced to cut cost aggressively in a reactive fashion.
Change your mindset ...
An Info-Tech survey of IT staff reveals that while most agree that cost optimization is an important IT process, nearly 20% fewer of them agree that it's being managed well.
Info-Tech IT Management & Governance Diagnostic, 2022.
A starting point for cost optimization improvement is adjusting your frame of mind. Know that it's not just about making difficult cuts - in reality, it's a creative pursuit that's about thriving in all circumstances, not just surviving.
Sustain an optimal cost-to-value ratio across four levers:
Cost optimization is not just about reducing costs
In fact, you should aim to achieve three objectives:
(1) reduce your unwarranted IT spending, (2) optimize your cost-to-value, and (3) sustain your cost optimization.
Reduce unwarranted IT spending
Stop the bleeding or go for quick wins
Start by reducing waste and bad spending habits while clearly communicating your intentions to your stakeholders – get buy-in.
Optimize cost-to-value
Value means tradeoffs
Pursue value but know that it will lead you to make tradeoffs between cost, performance, and risk.
Sustain cost optimization
Think about tomorrow: reduce, reuse, recalibrate, and repeat
Standardize and automate your cost optimization processes around a proper governance framework. Cost optimization is not a onetime exercise.
|
Phase 1: Understand Your Mandate & Objectives Know where you stand and where you're going. Understand your cost optimization mandate within the context of your organization's situation and direction. |
Phase 2: Outline Your Initiatives Evaluate many, pick a few. Think of all possible cost optimization initiatives across the four optimization levers (Assets, Vendors, Project Portfolio, and Workforce), but only keep the ones that best help you fulfill your goals. |
Phase 3: Develop Your Roadmap Keep one eye on today and the other on tomorrow. Prioritize cost optimization initiatives that would help you achieve your near-term objectives first, but don't forget about the medium and long term. |
Phase 4: Communicate and Execute Communicate and collaborate - you are not a one-person show. Reach out to other business units where necessary. Your success relies on getting buy-in from various stakeholders, especially when cost optimization initiatives impact them in one way or another. |
IT Cost Optimization Roadmap Samples and Templates
Templates including an abbreviated executive presentation and a final communication presentation based on a 12-month cost optimization roadmap.
IT Cost Optimization Workbook
A workbook generating a 12-month cost optimization roadmap.
This blueprint will guide you to set cost optimization goals across one to three main objectives, depending on your identified journey (reactive, proactive, or strategic):
In phase 1 of this blueprint, we will help you establish your goals to satisfy your organization's needs.
In phase 3, we will help you develop a game plan and a roadmap for achieving those metrics.
Once you implement your 12-month roadmap, start tracking the metrics below over the next fiscal year (FY) to assess the effectiveness of undertaken measures.
| Cost Optimization Objective | Key Success Metric |
| Reduce unwarranted IT spending | Decrease IT cost in identified key areas |
| Optimize cost-to-value | Decrease IT cost per IT employee |
| Sustain cost optimization | Decrease IT cost-to-organization revenue |
| DIY Toolkit "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." |
Guided Implementation "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." |
Workshop "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place. |
Consulting "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project." |
Diagnostics and consistent frameworks are used throughout all four options.
| Phase 1 | Phase 2 | Phase 3 | Phase 4 | |
|---|---|---|---|---|
Call #1:
|
Call #2:
Review potential cost optimization initiatives for assets and vendors levers. Call #3: Assess cost optimization initiatives' cost and feasibility - for assets and vendors levers. |
Call #4:
Review potential cost optimization initiatives for project portfolio and workforce levers. Call #5: Assess cost optimization initiatives' cost and feasibility - for project portfolio and workforce levers. |
Call #6:
|
Call #7:
|
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI will include multiple calls over the course of one to two months.
| Session 1 | Session 2 | Session 3 | Session 4 | Session 5 | |
|---|---|---|---|---|---|
| Activities | Understand Your Mandate and Objectives | Outline Initiatives for Assets and Vendors | Outline Initiatives for Projects and Workforce | Develop an IT Cost Optimization Roadmap | Communicate and Execute |
| 1.1 Understand your organization's cost optimization objectives and how this impacts IT. 1.2 Review potential cost optimization target areas based on your IT financial management benchmarking report. 1.3 Identify factors constraining cost optimization options. 1.4 Set concrete IT cost optimization goals. 1.5 Identify inputs required for decision making. |
2.1 Identify a longlist of possible initiatives around:
|
3.1 Identify a longlist of possible initiatives around:
|
4.1 Assess the feasibility of each initiative (effort and risk profile) given cost optimization goals. 4.2 Prioritize cost optimization initiatives to create a final shortlist. 4.3 Fine-tune key information about your final cost optimization initiatives and develop a cost optimization roadmap for proposal. |
5.1 Outline components of a communication plan, including approvers, stakeholders, and governance and management mechanisms to be used. 5.2 Create an executive presentation. 5.3 Set up review time for workshop deliverables and post-workshop activities. |
|
| Output |
|
|
|
|
|
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Phase 1
Understand Your Mandate and Objectives
Phase 2
Outline Your Cost Optimization Initiatives
Phase 3
Develop Your IT Cost Optimization Roadmap
Phase 4
Communicate and Execute
This phase will walk you through the following activities:
This phase involves the following participants:
60 minutes
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
See the next three slides for guidelines and the journey assessment questions and template.
| Journey | Reactive | Proactive | Strategic |
|---|---|---|---|
| Description |
|
|
|
| Main Focus |
|
|
|
| Business Objectives | Business Strategy |
|---|---|
|
|
| IT Objectives | IT Strategy and Mandate |
|
|
| Journey | |
| Agreed-upon journey: reactive, proactive, or strategic. | |
| Business Objectives | Business Strategy |
|---|---|
|
|
| IT Objectives | IT Strategy and Mandate |
|
|
| Journey | |
| Agreed-upon journey: proactive. | |
60-90 minutes
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Potential Initiative | Source | Source Contact | Notes |
|---|---|---|---|
| Reduce application maintenance cost | Internal Benchmarking Report | CIO | Based on current year report |
| Rationalize software applications | Info-Tech IT Benchmarking Report | CIO | Based on current year report |
| Migrate key business applications to the cloud | Latest iteration of the IT strategy | CIO | New IT strategy will be in development concurrent with cost optimization strategy development |
| Align job roles to the current IT structure | IT org. chart and salaries | HR, CIO | Based on information of the current year and will likely change in a few months (beginning of a new year) |
| Renegotiate the top five vendor contracts up for renewal this year | List of IT vendors | Procurement office, CIO, IT infrastructure director, IT applications director, IT services manager | Based on a list consolidated last week |
The path to IT financial management maturity starts with knowing exactly where your money is going. To streamline this effort, Info-Tech offers an IT Spend & Staffing Benchmarking service that provides full transparency into where your money is going without any heavy lifting on your part.
This unique service features:
If you'd like Info-Tech to pave the way to IT spend transparency, contact your account manager for more information - we're happy to talk anytime.
30 minutes
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
See the next slides for additional guidance and a constraints assessment template.
| Constraints | Organizational | Legal/Regulatory | Other |
|---|---|---|---|
| What | An organizational constraint is any work condition that hinders an employee's performance - be it physical, emotional, or otherwise. | A legal or regulatory constraint is any law, rule, standard, or regulation - be it industry specific or otherwise - limiting the ability of any stakeholder to get the most out of a certain activity, initiative, or project. | Other types of constraints affecting business units. |
| Who | Collaborate with your IT leaders and business partners to identify all major constraints that would affect cost optimization initiatives. | ||
| How | Discussions and information sessions to distinguish between negotiable and nonnegotiable constraints that would thwart cost optimization efforts:
|
||
| Challenge | Degree to which you can influence certain outcomes within a set time frame:
|
||
We define a constraint as a restriction controlling the behavior of any of your stakeholders, hence preventing a desired outcome.
In our context, constraints will determine your playing field: the boundaries of your cost optimization scope.
| Nonnegotiable constraints | ||
|---|---|---|
| Organizational | Legal/Regulatory | IT/Other |
| Prioritization of sales/customer service activities | SEC compliance/reporting mandates | Production unit incident response service levels |
| [Constraint] | [Constraint] | [Constraint] |
| [Constraint] | [Constraint] | [Constraint] |
| [Constraint] | [Constraint] | [Constraint] |
| Negotiable constraints | ||
| Organizational | Legal/Regulatory | IT/Other |
| Core business operations process design | Vendor contracts up for near-term renewal | Current capital project commitments |
| [Constraint] | [Constraint] | [Constraint] |
| [Constraint] | [Constraint] | [Constraint] |
| [Constraint] | [Constraint] | [Constraint] |
60-90 minutes
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to document your goals based on your journey:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B | Dropdown | Select the appropriate journey: Reactive, Proactive, or Strategic. |
| C | Dropdown | Select the appropriate cost optimization objective: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, Sustain Cost Optimization. |
| D | Formula | Automatic calculation, no entry required. Reduce Unwarranted IT Spending goal is the first priority, followed by Optimize Cost-to-Value, and Sustain Cost Optimization goals, respectively. |
| E | Text | Enter the overarching goal related to each objective. |
Complete the following fields for each goal depending on your journey in the Excel Workbook as per guidelines:
Download the IT Cost Optimization Workbook
Refer to the example and guidelines below on how to break down your goals per quarter and track your progress:
| Column ID | Input Type | Guidelines |
|---|---|---|
| F, G, H, I | Text | Enter the target per quarter: It could be a percentage, dollar amount, or description of the breakdown, depending on the cost optimization goal and objective. |
Complete the following fields for each goal depending on your journey in the Excel Workbook as per guidelines:
Download the IT Cost Optimization Workbook
60-90 minutes
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Documents | Benchmarking | IT Strategy | Other Information Sources |
|---|---|---|---|
| What |
|
|
|
| Who | Collaborate with your IT leaders and business partners to:
|
||
| How | Discussions and information sessions to analyze and deep dive on raw findings. | ||
| Challenge | Time to compile and analyze reports without affecting day-to-day operations:
|
||
Phase 1
Understand Your Mandate and Objectives
Phase 2
Outline Your Cost Optimization Initiatives
Phase 3
Develop Your IT Cost Optimization Roadmap
Phase 4
Communicate and Execute
This phase will walk you through the following activities:
This phase involves the following participants:
| Levers | ASSETS | VENDORS | PROJECT PORTFOLI | WORKFORCE |
|---|---|---|---|---|
| What |
|
|
|
|
| Who | Collaborate with your IT leaders and business partners to:
|
|||
| How | You will decide on the best course of action depending on your journey. | |||
| Levers | ASSETS | VENDORS | PROJECT PORTFOLI | WORKFORCE |
|---|---|---|---|---|
| Challenge |
|
|
|
|
| Solution |
|
|
|
|
| Related Info-Tech Research | Develop an IT Asset Management Strategy | Jump-start Your Vendor Management Initiative | Develop a Project Portfolio Management Strategy | Build a Strategic IT Workforce Plan |
8 hours
Now that you have identified your journey and understood your constraints:
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
In terms of aggressiveness and objectives.
Cost optimization initiatives pertaining to a reactive journey are characterized by aggressive cost reduction.
On the other hand, cost optimization initiatives within a strategic journey can vary in aggressiveness across objectives.
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Journey | Reactive, Proactive, or Strategic | Proactive or Strategic | Strategic |
|---|---|---|---|
| Initiatives |
|
|
|
| No initiatives for the reactive journey. | No initiatives for the reactive or proactive journeys. | ||
| Objective | Reduce Unwarranted IT Spending | Optimize Cost-to-Value | Sustain Cost Optimization |
Refer to the example and guidelines below on how to input your asset optimization initiatives and related objectives:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B | Formula | Automatic calculation, no entry required. The ID will update once there's an input in column E. |
| C | Dropdown | Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce. |
| D | Dropdown | Select an initiative focus from the dropdown list - this will help you think of initiatives. |
| E | Text | Enter your initiative. |
| F | Text | Write a brief description per initiative, providing a cost optimization rationale. |
| G | Dropdown | Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure). |
| H | Dropdown | Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization. |
List your initiatives in the provided Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Journey | Reactive, Proactive, or Strategic | Proactive or Strategic | Strategic |
|---|---|---|---|
| Initiatives |
|
|
|
| No initiatives for the reactive journey. | No initiatives for the reactive or proactive journeys. | ||
| Objective | Reduce Unwarranted IT Spending | Optimize Cost-to-Value | Sustain Cost Optimization |
Refer to the example and guidelines below on how to input your vendor optimization initiatives and related objectives:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B | Formula | Automatic calculation, no entry required. The ID will update once there's an input in column E. |
| C | Dropdown | Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce. |
| D | Dropdown | Select an initiative focus from the dropdown list - this will help you think of initiatives. |
| E | Text | Enter your initiative. |
| F | Text | Write a brief description per initiative, providing a cost optimization rationale. |
| G | Dropdown | Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure). |
| H | Dropdown | Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization. |
List your initiatives in the provided Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Journey | Reactive, Proactive, or Strategic | Proactive or Strategic | Strategic |
|---|---|---|---|
| Initiatives |
|
|
|
| No initiatives for the reactive journey. | No initiatives for the reactive or proactive journeys. | ||
| Objective | Reduce Unwarranted IT Spending | Optimize Cost-to-Value | Sustain Cost Optimization |
Refer to the example and guidelines below on how to input your project portfolio optimization initiatives and related objectives:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B | Formula | Automatic calculation, no entry required. The ID will update once there's an input in column E. |
| C | Dropdown | Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce. |
| D | Dropdown | Select an initiative focus from the dropdown list - this will help you think of initiatives. |
| E | Text | Enter your initiative. |
| F | Text | Write a brief description per initiative, providing a cost optimization rationale. |
| G | Dropdown | Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure). |
| H | Dropdown | Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization. |
List your initiatives in the provided Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
| Journey | Reactive, Proactive, or Strategic | Proactive or Strategic | Strategic |
|---|---|---|---|
| Initiatives |
|
|
|
| No initiatives for the reactive journey. | No initiatives for the reactive or proactive journeys. | ||
| Objective | Reduce Unwarranted IT Spending | Optimize Cost-to-Value | Sustain Cost Optimization |
Refer to the example and guidelines below on how to input your workforce optimization initiatives and related objectives:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B | Formula | Automatic calculation, no entry required. The ID will update once there's an input in column E. |
| C | Dropdown | Select an optimization lever: Assets, Vendors, Project Portfolio, or Workforce. |
| D | Dropdown | Select an initiative focus from the dropdown list - this will help you think of initiatives. |
| E | Text | Enter your initiative. |
| F | Text | Write a brief description per initiative, providing a cost optimization rationale. |
| G | Dropdown | Select the cost type per initiative: OpEx (operating expenditure) or CapEx (capital expenditure). |
| H | Dropdown | Select 1 of 3 objectives for each initiative: Reduce Unwarranted IT Spending, Optimize Cost-to-Value, or Sustain Cost Optimization. |
List your initiatives in the provided Excel Workbook as per guidelines:
8 hours
Now that you have identified your initiatives:
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete cost estimates for each asset optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| I | Dropdown | Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative. |
| J, K | Whole Number | Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative. |
| L | Formula | Automatic calculation, no entry required. The difference between current cost and expected cost. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete cost estimates for each vendor optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| I | Dropdown | Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative. |
| J, K | Whole Number | Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative. |
| L | Formula | Automatic calculation, no entry required. The difference between current cost and expected cost. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete cost estimates for each project portfolio optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| I | Dropdown | Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative. |
| J, K | Whole Number | Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative. |
| L | Formula | Automatic calculation, no entry required. The difference between current cost and expected cost. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
2 hours
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete cost estimates for each workforce optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| I | Dropdown | Select if the implementation cost is considered within your budget or not. If not, the initiative will be flagged to be reviewed, and no further entry is required; move to the next initiative. Implementation cost represents your cost for planning, executing, and monitoring the related initiative. |
| J, K | Whole Number | Input a dollar amount. Current cost represents the yearly cost including implementing the initiative, while the expected cost represents the yearly cost after implementing the initiative. |
| L | Formula | Automatic calculation, no entry required. The difference between current cost and expected cost. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
Phase 1
Understand Your Mandate and Objectives
Phase 2
Outline Your Cost Optimization Initiatives
Phase 3
Develop Your IT Cost Optimization Roadmap
Phase 4
Communicate and Execute
This phase will walk you through the following activities:
This phase involves the following participants:
First, take a moment to consider if you missed anything. Too often, only the cost cutting elements of the cost optimization equation get attention. Remember that cost optimization also includes making smart investments. Sometimes adding and expanding is better for the business than removing or contracting.
Feasibility
Eliminate initiatives from the longlist of potential initiatives that cannot be achieved given the cost optimization goals you determined at the beginning of this exercise.
Priority
Rank order the remaining initiatives according to their ability to contribute to goal attainment and dependency relationships with external constraints and one another.
Action Plan
Create an overarching visual roadmap that shows how you intend to achieve your cost optimization goals over the short, medium, and long-term.
4 hours
Now that you have identified your initiatives across the four levers and understood the business impacts:
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to define your feasibility variables for standardization purposes. You can adopt a different definition per optimization lever (Assets, Vendors, Project Portfolio, and Workforce), or maintain the same one across initiatives, depending on what makes sense for your organization:
| Column ID | Input Type | Guidelines |
|---|---|---|
| B, G | Formula | Automatic calculation, no entry required. The ID will populate automatically. |
| C, H | Text | No entry required. Three variables identified: High, Medium, Low. |
| D, E | Whole Number | Review and input the range of each effort required variable, based on the number of dedicated full-time employees needed to implement an initiative, as it works best for your organization. |
| I, J | Whole Number | Review and input the range of each likelihood of failure variable, based on the probability of failure of an initiative, as it works best for your organization. This example should work for most organizations. |
Define your feasibility variables in the Excel Workbook as per guidelines:
Refer to the example and guidelines below on how to complete feasibility estimates for each asset optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| M | Dropdown | Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability. |
| N | Dropdown | Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative. |
| O | Dropdown | Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey). |
| P | Dropdown | Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not. |
| Q | Text | Write a brief description per initiative, providing an impact rationale and identifying the approver where possible. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete feasibility estimates for each vendor optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| M | Dropdown | Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability. |
| N | Dropdown | Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative. |
| O | Dropdown | Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey). |
| P | Dropdown | Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not. |
| Q | Text | Write a brief description per initiative, providing an impact rationale and identifying the approver where possible. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete feasibility estimates for each project portfolio optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| M | Dropdown | Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability. |
| N | Dropdown | Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative. |
| O | Dropdown | Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey). |
| P | Dropdown | Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not. |
| Q | Text | Write a brief description per initiative, providing an impact rationale and identifying the approver where possible. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how to complete feasibility estimates for each workforce optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| M | Dropdown | Select the effort required estimate based on your defined variables. Effort required represents the number of dedicated employees needed to plan, execute, and monitor the underlying initiative, based on the level of maturity and readiness; consider complexity, scope, and resource availability. |
| N | Dropdown | Select the likelihood of failure estimate based on your defined variables. Likelihood of failure represents the probability of failure of the underlying initiative. |
| O | Dropdown | Select the impact on performance estimate related to the implementation of the underlying initiative. Consider the impact on IT and on business (including business recovery if on a reactive journey). |
| P | Dropdown | Select the appropriate approval right related to the underlying initiative. Determine if the initiative's approval falls within your accountability or not. |
| Q | Text | Write a brief description per initiative, providing an impact rationale and identifying the approver where possible. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
4 hours
Now that you have your cost and feasibility for each cost optimization initiative:
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each asset optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:
| Column ID | Input Type | Guidelines |
|---|---|---|
| R | Formula | Hidden automatic calculation, no entry required. Rank of estimate cost savings (per year) in ascending order (higher cost savings implies a higher rank). |
| S | Formula | Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score. |
| T | Formula | Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget. |
| U, V, W | Formula | Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1. |
| X | Formula | Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P). |
| Y | Formula | Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-value (column H). |
| Z | Formula | Hidden automatic calculation, no entry required. Preliminary priority assessment based on the Define Priority Threshold worksheet (hidden, see next slide). |
Review the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the priority score and priority level:
Refer to the example and guidelines below on how to complete timeline estimates for each asset optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| AA, AC | Dropdown | Select the quarter(s) in which you plan to begin and complete your initiative. |
| AB, AD | Dropdown | Select the year(s) in which you plan to begin and complete your initiative. |
| AE | Dropdown | Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD. |
| AF | Formula | Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L). |
| AG | Dropdown | Select if cost savings after the implementation of the underlying initiative will be permanent or temporary. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the example and guidelines below on how to assign the final priority for each asset optimization initiative, and include it in your 12-month roadmap:
| Column ID | Row ID | Input Type | Guidelines |
|---|---|---|---|
| AH | - | Dropdown | Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG). |
| AI | - | Dropdown | Select whether you want to include the initiative in your 12-month roadmap (Yes or No). |
| AK, AL | 5 | Formula | Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected. |
| AK, AL | 6 | Formula | Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected) |
| AK, AL | 7 | Formula | Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected) |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each vendor optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:
| Column ID | Input Type | Guidelines | |
|---|---|---|---|
| R | Formula | Hidden automatic calculation, no entry required. Rank of estimate cost savings (per year) in ascending order (higher cost savings implies a higher rank). | |
| S | Formula | Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score. | |
| T | Formula | Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget. | |
| U, V, W | Formula | Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1. | |
| X | Formula | Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P). | |
| Y | Formula | Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-Value (column H). | |
| Z | Formula | Hidden automatic calculation, no entry required. Preliminary priority assessment based on the Define Priority Threshold worksheet (hidden, see next slide). |
Review the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the Priority Score and Priority Level:
Refer to the example and guidelines below on how to complete timeline estimates for each vendor optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| AA, AC | Dropdown | Select the quarter(s) in which you plan to begin and complete your initiative. |
| AB, AD | Dropdown | Select the year(s) in which you plan to begin and complete your initiative. |
| AE | Dropdown | Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD. |
| AF | Formula | Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L). |
| AG | Dropdown | Select if cost savings after the implementation of the underlying initiative will be Permanent or Temporary. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the example and guidelines below on how to assign the final priority for each vendor optimization initiative, and include it in your 12-month roadmap:
| Column ID | Row ID | Input Type | Guidelines |
|---|---|---|---|
| AH | - | Dropdown | Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG). |
| AI | - | Dropdown | Select whether you want to include the initiative in your 12-month roadmap (Yes or No). |
| AK, AL | 5 | Formula | Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected. |
| AK, AL | 6 | Formula | Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected) |
| AK, AL | 7 | Formula | Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected) |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each project portfolio optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:
| Column ID | Input Type | Guidelines |
|---|---|---|
| R | Formula | Hidden automatic calculation, no entry required. Rank of Estimate Cost Savings (per year) in ascending order (higher cost savings implies a higher rank). |
| S | Formula | Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score. |
| T | Formula | Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget. |
| U, V, W | Formula | Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1. |
| X | Formula | Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P). |
| Y | Formula | Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-Value (column H). |
| Z | Formula | Hidden automatic calculation, no entry required. Preliminary Priority Assessment based on the Define Priority Threshold worksheet (hidden, see next slide). |
Review the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the Priority Score and Priority Level:
Refer to the example and guidelines below on how to complete timeline estimates for each project portfolio optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| AA, AC | Dropdown | Select the quarter(s) in which you plan to begin and complete your initiative. |
| AB, AD | Dropdown | Select the year(s) in which you plan to begin and complete your initiative. |
| AE | Dropdown | Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD. |
| AF | Formula | Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L). |
| AG | Dropdown | Select if cost savings after the implementation of the underlying initiative will be Permanent or Temporary. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the example and guidelines below on how to assign the final priority for each project portfolio optimization initiative and include it in your 12-month roadmap:
| Column ID | Row ID | Input Type | Guidelines |
|---|---|---|---|
| AH | - | Dropdown | Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG). |
| AI | - | Dropdown | Select whether you want to include the initiative in your 12-month roadmap (Yes or No). |
| AK, AL | 5 | Formula | Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected. |
| AK, AL | 6 | Formula | Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected) |
| AK, AL | 7 | Formula | Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected) |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example and guidelines below on how the preliminary priority assessment is assigned, for each workforce optimization initiative, noting that columns Q to X are hidden automatic calculations and should not be touched:
| Column ID | Input Type | Guidelines |
|---|---|---|
| R | Formula | Hidden automatic calculation, no entry required. Rank of Estimate Cost Savings (per year) in ascending order (higher cost savings implies a higher rank). |
| S | Formula | Hidden automatic calculation, no entry required. Cost Savings Score on a scale of 1 to 3, where the top third in Cost Savings Rank are assigned a score of 1, the bottom third a score of 3, and in between a score of 2, noting that negative cost savings would imply a -1 score. |
| T | Formula | Hidden automatic calculation, no entry required. Cost Score adds 1 to the Cost Savings Score if the underlying initiative is within the budget. |
| U, V, W | Formula | Hidden automatic calculation, no entry required. A score on a scale of 1 to 3 based on input of columns M, N, and O, where Low or Positive Impact is assigned a score of 3, Medium or No Impact a score of 2, and High or Negative Impact a score of 1. |
| X | Formula | Hidden automatic calculation, no entry required. The rounding of the average of columns U, V, and W, adding 1 to the result if the initiative's approval falls within your accountability (column P). |
| Y | Formula | Hidden automatic calculation, no entry required. The sum of columns T and X, adding 3 for Reduce Unwarranted IT Spending, and 1 to Optimize Cost-to-Value (column H). |
| Z | Formula | Hidden automatic calculation, no entry required. Preliminary Priority Assessment based on the Define Priority Threshold worksheet (hidden, see next slide). |
Review the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the screenshot of the Define Priority Threshold worksheet below to understand the rationale behind the Priority Score and Priority Level:
Refer to the example and guidelines below on how to complete timeline estimates for each workforce optimization initiative:
| Column ID | Input Type | Guidelines |
|---|---|---|
| AA, AC | Dropdown | Select the quarter(s) in which you plan to begin and complete your initiative. |
| AB, AD | Dropdown | Select the year(s) in which you plan to begin and complete your initiative. |
| AE | Dropdown | Select the number of remaining quarters, in the current fiscal year, after you complete the initiative (0 to 4); based on columns AA to AD. |
| AF | Formula | Automatic calculation, no entry required. Estimate of cost savings in the current fiscal year, based on the remaining quarters after implementation. The entry in column AE is divided by 4, and the result is multiplied by the related estimated cost savings per year (entry in column L). |
| AG | Dropdown | Select if cost savings after the implementation of the underlying initiative will be Permanent or Temporary. |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
Refer to the example and guidelines below on how to assign the final priority for each workforce optimization initiative, and include it in your 12-month roadmap:
| Column ID | Row ID | Input Type | Guidelines |
|---|---|---|---|
| AH | - | Dropdown | Select your final priority decision after reviewing the preliminary priority assessment (column Z) and timeline estimates (columns AA to AG). |
| AI | - | Dropdown | Select whether you want to include the initiative in your 12-month roadmap (Yes or No). |
| AK, AL | 5 | Formula | Automatic calculation, no entry required. The total number of initiatives you decided to include in your 12-month roadmap; based on column AI when Yes is selected. |
| AK, AL | 6 | Formula | Automatic calculation, no entry required. Total estimated cost savings per year after the initiative's completion; based on column L when included in the 12-month roadmap (column AI when Yes is selected) |
| AK, AL | 7 | Formula | Automatic calculation, no entry required. Total estimated cost savings in the current fiscal year; based on column AF when included in the 12-month roadmap (column AI when Yes is selected) |
Complete the following fields for each initiative in the Excel Workbook as per guidelines:
1 hour
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Refer to the example below on charts depicting different views of estimated cost savings per year across the four optimization levers (Assets, Vendors, Project Portfolio, and Workforce) that could help you in your assessment and decision making.
From the Excel Workbook, after completing your potential initiatives and filling all related entries in the Outline Initiatives tab:
Refer to the example below depicting different roadmap output that could help you in presentations, assessment, and decision making.
From the Excel Workbook:
Download the IT Cost Optimization Workbook
Phase 1
Understand Your Mandate and Objectives
Phase 2
Outline Your Cost Optimization Initiatives
Phase 3
Develop Your IT Cost Optimization Roadmap
Phase 4
Communicate and Execute
This phase will walk you through the following activities:
This phase involves the following participants:
Build Your IT Cost Optimization Roadmap
45 to 60 minutes
Download the IT Cost Optimization Workbook
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Your communication strategy has two major components ...
Your communication strategy will need to ...
You will also develop more detailed operational and project plans for each initiative. IT will use these plans to manage and track the execution of individual initiatives when the time comes.
| Component | Purpose | Context | Key Messages | Intended Outcomes |
|---|---|---|---|---|
| Definition | Description of the topic and why you're communicating with this specific audience right now. | Background information about the broader situation and how you got to where you are today. | The main points you want your target audience to hear/read, absorb, and remember. | What you hope you and your audience will get at the end of the communication or effort. |
| Our Language |
|
|
|
|
| Stakeholder/Approver | Initiatives | Impact | Format | Time frame | Messenger |
|---|---|---|---|---|---|
| CEO |
|
Indefinitely delays current strategic projects | Monthly meeting discussion | Last Wednesday of every month starting Oct. 26, FY1 | CIO, IT data analytics project lead, IT VR project lead |
| IT Steering Committee |
|
Nearly all of these initiatives are enterprise-wide or affect multiple departments. Varying direct and indirect impacts will need to be independently communicated for each initiative if approved by the ITS. |
Formal presentation at quarterly ITS meetings Monthly progress updates via email bulletin |
Approval presentation: Oct. 31, FY1 Quarterly updates: Jan. 31, Apr. 28, and Jul. 28, FY2 |
CIO, IT service director, IT infrastructure director, IT data analytics project lead |
| VP of Sales |
|
Delays new sales tool efficiency improvement. | Meeting discussion | Nov. FY1 | CIO, IT Salesforce view redesign project lead |
| [Name/Title/Group] |
|
[Impact statement] | [Format] | [Date/Period] | [Name/Title] |
| [Name/Title/Group] |
|
[Impact statement] | [Format] | [Date/Period] | [Name/Title] |
| [Name/Title/Group] |
|
[Impact statement] | [Format] | [Date/Period] | [Name/Title] |
45-60 minutes
Download IT Cost Optimization Roadmap Samples and Templates
| Input | Output |
|---|---|
|
|
| Materials | Participants |
|
|
Throughout this blueprint, you have:
What's next?
Communicate with your stakeholders, then follow your internal project policies and procedures to get the necessary approvals as required. Once obtained, you can start the execution and implementation of your IT cost optimization strategy.
If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.
Contact your account representative for more information.
workshops@infotech.com
1-888-670-8889
Jennifer Perrier
Principal Research Director, IT Financial Management
Info-Tech Research Group
Jack Hakimian
Senior Vice President, Research Development
Info-Tech Research Group
Graham Price
Senior Executive Counselor, Executive Services
Info-Tech Research Group
Travis Duncan
Research Director, Project & Portfolio Management
Info-Tech Research Group
Dave Kish
Practice Lead, IT Financial Management
Info-Tech Research Group
Baird Miller, PhD
Senior Executive Advisor, Executive Services
Info-Tech Research Group
Monica Braun
Research Director, IT Financial Management
Info-Tech Research Group
Sandi Conrad
Principal Advisory Director, Infrastructure & Operations
Info-Tech Research Group
Phil Bode
Principal Advisory Director, Vendor Management
Info-Tech Research Group
Donna Glidden
Advisory Director, Vendor Management
Info-Tech Research Group
Barry Cousins
Distinguished Analyst & Research Fellow
Info-Tech Research Group
Andrew Sharp
Research Director, Infrastructure & Operations Practice
Info-Tech Research Group
Frank Sewell
Advisory Director, Vendor Management
Info-Tech Research Group
Achieve IT Spend & Staffing Transparency
Most CIOs, CFOs, and business function leaders don't enjoy a shared vocabulary when it comes to talking about technology spend. As a result, truly meaningful conversations about where and how to spend technology funds in support of business goals are rare. Enable these important conversations by transparently mapping your IT spend data against four key stakeholder views.
Reduce Shadow IT With a Service Request Catalog
As the business gets more innovative to solve its problems, IT finds itself in reactive mode, dealing with software bloat, managing surprise SaaS renewals, and having to integrate products that they didn't know were purchased. To solve this, IT needs to focus on service and visibility to counter Shadow IT.
"A Short Guide to Structured Cost Reduction." National Audit Office, 18 June 2010. Web.
"IT Cost Savings: A Guide to Application Rationalization." LeanIX, 2021. Web.
Jouravlev, Roman. "Service Financial Management: ITIL 4 Practice Guide." Axelos, 30 April 2020. Web.
Leinwand, Paul, and Vinay Couto. "How to Cut Costs More Strategically." Harvard Business Review, March 2017. Web.
"Role & Influence of the Technology Decision-Maker 2022." Foundry, 2022. Web.
"State of the CIO 2022." CIO, 2022. Web.
"The Definitive Guide to IT Cost Optimization." LeanIX, n.d. Web.
"Understand the Principles of Cost Optimization." Google Cloud, n.d. Web.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create strategic alignment between the CoE and the organization’s goals, objectives, and vision.
Build an engagement plan based on a standardized adoption model to ensure your CoE service offerings are accessible and consistent across the organization.
Operate the CoE to provide service offerings to Agile teams, identify improvements to optimize the function of your Agile teams, and effectively manage and communicate change.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Create strategic alignment between the CoE and the organization’s goals, objectives, and vision.
Understand how your key stakeholders will impact the longevity of your CoE.
Determine your CoE structure and staff.
Top-down alignment with strategic aims of the organization.
A set of high-level use cases to form the CoE’s service offerings around.
Visualization of key stakeholders, with their current and desired power and involvement documented.
1.1 Identify and prioritize organizational business objectives.
1.2 Form use cases for the points of alignment between your Agile Center of Excellence (ACE) and business objectives.
1.3 Prioritize your ACE stakeholders.
Prioritized business objectives
Business-aligned use cases to form CoE’s service offerings
Stakeholder map of key influencers
Document the functional expectations of the Agile teams.
Refine your business-aligned use cases with your collected data to achieve both business and functional alignment.
Create a capability map that visualizes and prioritizes your key service offerings.
Understanding of some of the identified concerns, pain points, and potential opportunities from your stakeholders.
Refined use cases that define the service offerings the CoE provides to its customers.
Prioritization for the creation of service offerings with a capability map.
2.1 Classified pains and opportunities.
2.2 Refine your use cases to identify your ACE functions and services.
2.3 Visualize your ACE functions and service offerings with a capability map.
Classified pains and opportunities
Refined use cases based on pains and opportunities identified during ACE requirements gathering
ACE Capability Map
Align service offerings with an Agile adoption model so that teams have a structured way to build their skills.
Standardize the way your organization will interact with the Center of Excellence to ensure consistency in best practices.
Mechanisms put in place for continual improvement and personal development for your Agile teams.
Interaction with the CoE is standardized via engagement plans to ensure consistency in best practices and predictability for resourcing purposes.
3.1 Further categorize your use cases within the Agile adoption model.
3.2 Create an engagement plan for each level of adoption.
Adoption-aligned service offerings
Role-based engagement plans
Develop a set of metrics for the CoE to monitor business-aligned outcomes with.
The foundations of continuous improvement are established with a robust set of Agile metrics.
4.1 Define metrics that align with your Agile business objectives.
4.2 Define target ACE performance metrics.
4.3 Define Agile adoption metrics.
4.4 Assess the interaction and communication points of your Agile team.
4.5 Create a communication plan for change.
Business objective-aligned metrics
CoE performance metrics
Agile adoption metrics
Assessment of organizational design
CoE communication plan
"Inconsistent processes and practices used across Agile teams is frequently cited as a challenge to adopting and scaling Agile within organizations. (VersionOne’s 13th Annual State of Agile Report [N=1,319]) Creating an Agile Center of Excellence (ACE) is a popular way to try to impose structure and improve performance. However, simply establishing an ACE does not guarantee you will be successful with Agile. When setting up an ACE you must: Define ACE services based on identified stakeholder needs. Staff the ACE with respected, “hands on” people, who deliver identifiable value to your Agile teams. Continuously evolve ACE service offerings to maximize stakeholder satisfaction and value delivered."
Alex Ciraco, Research Director, Applications Practice Info-Tech Research Group
Implement Agile Practices That Work
Begin your Agile transformation with a comprehensive readiness assessment and a pilot project to adopt Agile development practices and behaviors that fit.
YOU ARE HERE
Spread Best Practices with an Agile Center of Excellence
Form an ACE to support Agile development at all levels of the organization with thought leadership, strategic development support & process innovation.
Enable Organization-Wide Collaboration by Scaling Agile
Extend the benefits of your Agile pilot project into your organization by strategically scaling Agile initiatives that will meet stakeholders’ needs.
Transition to Product Delivery Introduce product-centric delivery practices to drive greater benefits and better delivery outcomes.
1.1 Determine the vision of your ACE
1.2 Define the service offerings of your ACE
2.1 Define an adoption plan for Agile teams
2.2 Create an ACE engagement plan
2.3 Define metrics to measure success
3.1 Optimize the success of your ACE
3.2 Plan change to enhance your Agile initiatives
3.3 Conduct ongoing retrospectives
Remodel the stages of your lifecycle to standardize your definition of a successful product.
Build a Strong Foundation for Quality
Instill quality assurance practices and principles in each stage of your software development lifecycle.
Implement DevOps Practices That Work
Fix, deploy, and support applications quicker though development and operations collaboration.
NOTE: Organizational change is hard and prone to failure. Determine your organization’s level of readiness for Agile transformation (and recommended actions) by completing Info-Tech’s Agile Transformation Readiness Tool.
An ACE amplifies good practices that have been successfully employed within your organization, effectively allowing you to extend the benefits obtained from your Agile pilot(s) to a wider audience.
From the viewpoint of the business, members of the ACE provide expertise and insights to the entire organization in order to facilitate Agile transformation and ensure standard application of Agile good practices.
From the viewpoint of your Agile teams, it provides a community of individuals that share experiences and lessons learned, propagate new ideas, and raise questions or concerns so that delivering business value is always top of mind.
Some organizations prefer Communities of Practice (CoP) to Centers of Excellence (CoE). CoPs are different from CoEs:
“A CoP is an affiliation of people who share a common practice and who have a desire to further the practice itself … and of course to share knowledge, refine best practices, and introduce standards. CoPs are defined by their domain of interest, but the membership is a social structure comprised of volunteer practitioners”
– Wenger, E., R. A. McDermott, et al. (2002) Cultivating communities of practice: A guide to managing knowledge, Harvard Business Press.
“CoPs differ from a CoE mainly in that they tend to have no geographical boundaries, they hold no hierarchical power within a firm, and they definitely can never have structure determined by the company. However, one of the most obvious and telling differences lies in the stated motive of members – CoPs exist because they have active practitioner members who are passionate about a specific practice, and the goals of a CoP are to refine and improve their chosen domain of practice – and the members provide discretionary effort that is not paid for by the employer”
– Matthew Loxton (June 1, 2011) CoP vs CoE – What’s the difference, and Why Should You Care?, Wordpress.com
List based on reported impediments from VersionOne’s 13th Annual State of Agile Report (N=1,319)
Provide services designed to inject evolving good practices into workflows and remove impediments or roadblocks from your Agile team’s ability to deliver value.
Maintain alignment with corporate objectives without impeding business agility in the long term. The ACE functions as an interface layer so that changing expectations can be adapted without negatively impacting Agile teams.
Avoid the risk of innovation and subject-matter expertise being lost or siloed by facilitating knowledge transfer and fostering a continuous learning environment.
Set baselines, monitor metrics, and run retrospectives to help govern process improvements and ensure that Agile teams are delivering expected benefits.
Instill Agile thinking and behavior into the organization. The ACE must encourage innovation and be an effective agent for change.
Being Prescriptive
Doing Agile
Being Agile
“(‘Doing Agile’ is) just some rituals but without significant change to support the real Agile approach as end-to-end, business integration, value focus, and team empowerment.” - Arie van Bennekum
Simply establishing a Center of Excellence for any discipline does not guarantee its success:
The 2019 State of DevOps Report found that organizations which had established DevOps CoEs underperformed compared to organizations which adopted other approaches for driving DevOps transformation. (Accelerate State of DevOps Report 2019 [N=~1,000])
Still, Agile Centers of Excellence can and do successfully drive Agile adoption in organizations. So what sets the successful examples apart from the others? Here’s what some have to say:
“The ACE must be staffed with qualified people with delivery experience! … [It is] effectively a consulting practice, that can evolve and continuously improve its services … These services are collectively about ‘enablement’ as an output, more than pure training … and above all, the ability to empirically measure the progress” – Paul Blaney, TD Bank
“When leaders haven’t themselves understood and adopted Agile approaches, they may try to scale up Agile the way they have attacked other change initiatives: through top-down plans and directives. The track record is better when they behave like an Agile team. That means viewing various parts of the organization as their customers.” – HBR, “Agile at Scale”
“the Agile CoE… is truly meant to be measured by the success of all the other groups, not their own…[it] is meant to be serving the teams and helping them improve, not by telling them what to do, but rather by listening, understanding and helping them adapt.” - Bart Gerardi, PMI
“The CoE must also avoid becoming static, as it’s crucial the team can adjust as quickly as business and customer needs change, and evolve the technology as necessary to remain competitive.” – Forbes, “RPA CoE (what you need to know)”
"The best CoEs are formed from thought leaders and change agents within the CoE domain. They are the process and team innovators who will influence your CoE roadmap and success. Select individuals who feel passionate about Agile." – Hans Eckman, InfoTech
Simply establishing an Agile Center of Excellence does not guarantee its success. When setting up your ACE, optimize its impact on the organization by doing the following 3 things:
Create strategic alignment between the CoE and the organization’s goals, objectives, and vision. This alignment translates into the CoE mandate intended to enhance the way Agile will enable teams to meet business objectives.
Build an engagement plan based on a standardized adoption model to ensure your CoE service offerings are accessible and consistent across the organization. Create and consolidate key performance indicators to measure the CoEs utility and whether or not the expected value is being translated to tangible results.
Operate the CoE to provide service offerings to Agile teams, identify improvements to optimize the function of your Agile teams, and effectively manage and communicate change so that teams can grow within the Agile adoption model and optimize value delivery both within your Agile environment and across functions.
Use Info-Tech’s Practice Adoption Journey model to establish your ACE. Building social capital (stakeholders’ trust in your ability to deliver positive outcomes) incrementally is vital to ensure that everyone is aligned to new mindsets and culture as your Agile practices scale.
Begin to document your development workflow or value chain, implement a tracking system for KPIs, and start gathering metrics and reporting them transparently to the appropriate stakeholders.
Use collected metrics and retrospectives to stabilize team performance by reducing areas of variability in your workflow and increasing the consistency at which targets are met.
Use information to support changes and adopt appropriate practices to make incremental improvements to the existing environment.
Drive behavioral and cultural changes that will empower teams to be accountable for their own success and learning.
Use your built-up trust and support practice innovation, driving the definition and adoption of new practices.
Business justification to continue to fund a Center of Excellence can be a challenge, especially with traditional thinking and rigid stakeholders. Hit the ground running and show value to your key influencers through business alignment and metrics that will ensure that the ACE is worth continuous investment.
The pace of change in customer expectations, competitive landscapes, and business strategy is continuously increasing. It is critical to develop a method to facilitate ongoing alignment to shifting business and development expectations seamlessly and ensure that your Agile teams are able to deliver expected business value.

Monitor your metrics to ensure desired benefits are being realized. The ACE is responsible for ensuring that expected Agile benefits are achievable and on track. Monitor against your defined baselines to create transparency and accountability for desired outcomes.
Run retrospectives to drive improvements and fixes into Agile projects and processes. Metrics falling short of expectations must be diagnosed and their root causes found, and fixes need to be communicated and injected back into the larger organization.
Define metrics and set targets that align with the goals of the ACE. These metrics represent the ACEs expected value to the organization and must be measured against on a regular basis to demonstrate value to your key stakeholders.
Culture clash between Agile teams and larger organization
Agile leverages empowered teams, meritocracy, and broad collaboration for success, but typical organizations are siloed and hierarchical with top down decision making. There needs to be a plan to enable a smooth transition from the current state towards the Agile target state.
Persistence of tribal knowledge
Agile relies on easy and open knowledge sharing, but organizational knowledge can sit in siloes. Employees may also try to protect their expertise for job security. It is important to foster knowledge sharing to ensure that critical know-how is accessible and doesn’t leave the organization with the individual.
Rigid management structures
Rigidity in how managers operate (performance reviews, human resource management, etc.) can result in cultural rejection of Agile. People need to be assessed on how they enable their teams rather than as individual contributors. This can help ensure that they are given sufficient opportunities to succeed. More support and less strict governance is key.
Breakdown due to distributed teams
When face-to-face interactions are challenging, ensure that you invest in the right communication technologies and remove cultural and process impediments to facilitate organization-wide collaboration. Alternative approaches like using documentation or email will not provide the same experience and value as a face-to-face conversation.
Industry - Government
Source - Cathy Novak, Agile Government Leadership
“The Agile CoE in the State of Maine is completely focused on the discipline of the methodology. Every person who works with Agile, or wants to work with Agile, belongs to the CoE. Every member of the CoE tells the same story, approaches the methodology the same way, and uses the same tools. The CoE also functions as an Agile research lab, experimenting with different standards and tools.
The usual tools of project management – mission, goals, roles, and a high-level definition of done – can be found in Maine’s Agile CoE. For story mapping, teams use sticky notes on a large wall or whiteboard. Demonstrating progress this way provides for positive team dynamics and a psychological bang. The State of Maine uses a project management framework that serves as its single source of truth. Everyone knows what’s going on at all times and understands the purpose of what they are doing. The Agile team is continually looking for components that can be reused across other agencies and programs.”
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| 1. Strategically align the Center of Excellence | 2. Standardize the CoEs service offerings | 3. Operate the Center of Excellence | |
|---|---|---|---|
| Best-Practice Toolkit | 1.1 Determine the vision of your ACE. 1.2 Define the service offerings of your ACE. |
2.1 Define an adoption plan for your Agile teams. 2.2 Create an ACE engagement plan. 2.3 Define metrics to measure success. |
3.1 Optimize the success of your ACE. 3.2 Plan change to enhance your Agile initiatives. 3.3 Conduct ongoing retrospectives of your ACE. |
| Guided Implementations |
|
|
|
| Onsite Workshop | Module 1: Strategically align the ACE | Module 2: Standardize the offerings of the ACE | Module 3: Prepare for organizational change |
| Phase 1 Outcome: Create strategic alignment between the CoE and organizational goals. | Phase 2 Outcome: Build engagement plans and key performance indicators based on a standardized Agile adoption plan. |
Phase 3 Outcome: Operate the CoEs monitoring function, identify improvements, and manage the change needed to continuously improve. |
Contact your account representative or email Workshops@InfoTech.com for more information.
| Workshop Module 1 | Workshop Module 2 | Workshop Module 3 | Workshop Module 4 | |
|---|---|---|---|---|
| Activities | Determine vision of CoE 1.1 Identify and prioritize organizational business objectives. 1.2 Form use cases for the points of alignment between your ACE and business objectives. 1.3 Prioritize your ACE stakeholders. |
Define service offerings of CoE 2.1 Form a solution matrix to organize your pain points and opportunities. 2.2 Refine your use cases to identify your ACE functions and services. 2.3 Visualize your ACE functions and service offerings with a capability map. |
Define engagement plans 3.1 Further categorize your use cases within the Agile adoption model. 3.2 Create an engagement plan for each level of adoption. |
Define metrics and plan communications 4.1 Define metrics that align with your Agile business objectives. 4.2 Define target ACE performance metrics. 4.3 Define Agile adoption metrics. 4.4 Assess the interaction and communication points of your Agile team. 4.5 Create a communication plan for change. |
| Deliverables |
|
|
|
|
The first step to creating a high-functioning ACE is to create alignment and consensus amongst your key stakeholders regarding its purpose. Engage in a set of activities to drill down into the organization’s goals and objectives in order to create a set of high-level use cases that will evolve into the service offerings of the ACE.
Create strategic alignment between the CoE and the organization’s goals, objectives, and vision. This alignment translates into the CoE mandate intended to enhance the way Agile will enable teams to meet business objectives.
Build an engagement plan based on a standardized adoption model to ensure your CoE service offerings are accessible and consistent across the organization. Create and consolidate key performance indicators to measure the CoEs utility and whether or not the expected value is being translated to tangible results.
Operate the CoE to provide service offerings to Agile teams, identify improvements to optimize the function of your Agile teams, and effectively manage and communicate change so that teams can grow within the Agile adoption model and optimize value delivery both within your Agile environment and across functions.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 1
Start with an analyst kick off call:
Then complete these activities…
1.1.1 Optional: Baseline your ACE maturity.
1.1.2 Identify and prioritize organizational business objectives.
1.1.3 Form use cases for the points of alignment between your ACE and business objectives.
1.1.4 Prioritize your ACE stakeholders.
1.1.5 Select a centralized or decentralized model for your ACE.
1.1.6 Staff your ACE strategically.
Start with an analyst kick off call:
Then complete these activities…
1.2.1 Form the Center of Excellence.
1.2.2 Gather and document your existing Agile practices for the CoE.
1.2.3 Interview stakeholders to align ACE requirements with functional expectations.
1.2.4 Form a solution matrix to organize your pain points and opportunities.
1.2.5 Refine your use cases to identify your ACE functions and services.
1.2.6 Visualize your ACE functions and service offerings with a capability map.
Phase 1 Results & Insights:
1.2 Define the service offerings of your ACE
2.1 Define an adoption plan for your Agile teams
2.2 Create an ACE engagement plan
2.3 Define metrics to measure success
3.1 Optimize the success of your ACE
3.2 Plan change to enhance your Agile initiatives
3.3 Conduct ongoing retrospectives of your ACE
1.1.1 Optional: Baseline your ACE maturity.
1.1.2 Identify and prioritize organizational business objectives.
1.1.3 Form use cases for the points of alignment between your ACE and business objectives.
1.1.4 Prioritize your ACE stakeholders.
1.1.5 Select a centralized or decentralized model for your ACE.
1.1.6 Staff your ACE strategically.
If you already have established an ACE, use Info-Tech’s CoE Maturity Diagnostic Tool to baseline its current maturity level (this will act as a baseline for comparison after you complete this Blueprint). Assessing your ACEs maturity lets you know where you currently are, and where to look for improvements.
Document results in the ACE Communications Deck.
INFO-TECH DELIVERABLE

Download the CoE Maturity Diagnostic Tool.
| Stakeholder | Role | Why they are essential players |
|---|---|---|
| CIO/ Head of IT | Program sponsor: Champion and set the tone for the Agile program. Critical in gaining and maintaining buy-in and momentum for the spread of Agile service offerings. | The head of IT has insight and influence to drive buy-in from executive stakeholders and ensure the long-term viability of the ACE. |
| Applications Director | Program executor: Responsible for the formation of the CoE and will ensure the viability of the initial CoE objectives, use cases, and service offerings. | Having a coordinator who is responsible for collating performance data, tracking results, and building data-driven action plans is essential to ensuring continuous success. |
| Agile Subject-Matter Experts | Program contributor: Provide information on the viability of Agile practices and help build capabilities on existing best practices. | Agile’s success relies on adoption. Leverage the insights of people who have implemented and evangelized Agile within your organization to build on top of a working foundation. |
| Functional Group Experts | Program contributor: Provide information on the functional group’s typical processes and how Agile can achieve expected benefits. | Agile’s primary function is to drive value to the business – it needs to align with the expected capabilities of existing functional groups in order to enhance them for the better. |
Business justification to continue to fund a Center of Excellence can be a challenge, especially with traditional thinking and rigid stakeholders. Hit the ground running and show value to your key influencers through business alignment and metrics that will ensure that the ACE is worth continuous investment.
The pace of change in customer expectations, competitive landscapes, and business strategy is continuously increasing. It is critical to develop a method to facilitate ongoing alignment to shifting business and development expectations seamlessly and ensure that your Agile teams are able to deliver expected business value.
1.1.2 2 Hours
While there is tremendous pressure to align IT functions and the business due to the accelerating pace of change and technology innovation, you need to be aware that there are limitations in achieving this goal. Keep these challenges at the top of mind as you bring together your stakeholders to position the service offerings of your ACE. It is beneficial to make your stakeholders self-aware of these biases as well, so they come to the table with an open mind and are willing to find common ground.
There are a plethora of moving pieces within an organization and total alignment is not a plausible outcome.
The aim of a group should not be to achieve total alignment, but rather reframe and consider ways to ensure that stakeholders are content with the ways they interact and that misalignment does not occur due to transparency or communication issues.
While it may seem like the business is one unified body, the reality is that the business can include individuals or groups (CEO, CFO, IT, etc.) with conflicting priorities. While there are shared business goals, these entities may all have competing visions of how to achieve them. Alignment means compromise and agreement more than it means accommodating all competing views.
There is a political component to alignment, and sometimes individual aspirations can impede collective gain.
While the business side may be concerned with cost, those on the IT side of things can be concerned with taking on career-defining projects to bolster their own credentials. This conflict can lead to serious breakdowns in alignment.
Industry Food Services
Source Scott Ambler and Associates, Case Study
Being in an industry with high competition, Panera Bread needed to improve its ability to quickly deliver desired features to end customers and adapt to changing business demands from high internal growth.
Panera Bread engaged in an Agile transformation through a mixture of Agile coaching and workshops, absorbing best practices from these engagements to drive Agile delivery frameworks across the enterprise.
Adopting Agile delivery practices resulted in increased frequency of solution delivery, improving the relationship between IT and the business. Business satisfaction increased both with the development process and the outcomes from delivery.
The transparency that was needed to achieve alignment to rapidly changing business needs resulted in improved communication and broad-scale reduced risk for the organization.
"Agile delivery changed perception entirely by building a level of transparency and accountability into not just our software development projects, but also in our everyday working relationships with our business stakeholders. The credibility gains this has provided our IT team has been immeasurable and immediate."
– Mike Nettles, VP IT Process and Architecture, Panera Bread

Input arrows represent functional group needs, feedback from Agile teams, and collaboration with other CoEs and CoPs
Output arrows represent the services the CoE delivers and the benefits realized across the organization.
Governance & Metrics involves enabling success through the management of the ACEs resources and services, and ensuring that organizational structures evolve in concert with Agile growth and maturity. Your focus should be on governing, measuring, implementing, and empowering improvements.
Effective governance will function to ensure the long-term effectiveness and viability of your ACE. Changes and improvements will happen continuously and you need a way to decide which to adopt as best practices.
"Organizations have lengthy policies and procedures (e.g. code deployment, systems design, how requirements are gathered in a traditional setting) that need to be addressed when starting to implement an Agile Center of Excellence. Legacy ideas that end up having legacy policy are the ones that are going to create bottlenecks, waste resources, and disrupt your progress." – Doug Birgfeld, Senior Partner, Agile Wave
Services refers to the ability to deliver resourcing, guidance, and assistance across all Agile teams. By creating a set of shared services, you enable broad access to specialized resources, knowledge, and insights that will effectively scale to more teams and departments as Agile matures in your organization.
A Services model:
Technology refers to a broad range of supporting tools to enable employees to complete their day-to-day tasks and effectively report on their outcomes. The key to technological support is to strike the right balance between flexibility and control based on your organization's internal and external constraints (policy, equipment, people, regulatory, etc.).
"We sometimes forget the obvious truth that technology provides no value of its own; it is the application of technology to business opportunities that produces return on investment." – Robert McDowell, Author, In Search of Business Value
Staff is all about empowerment. The ACE should support and facilitate the sharing of ideas and knowledge sharing. Create processes and spaces where people are encouraged to come together, learn from, and share with each other. This setting will bring up new ideas to enhance productivity and efficiency in day-to-day activities while maintaining alignment with business objectives.
"An Agile CoE is legitimized by its ability to create a space where people can come together, share, and learn from one another. By empowering teams to grow by themselves and then re-connect with each other you allow the creativity of your employees to flow back into the CoE." – Anonymous, Founder, Agile consultancy group
A use case tells a story about how a system will be used to achieve a goal from the perspective of a user of that system. The people or other systems that interact with the use case are called “actors.” Use cases describe what a system must be able to do, not how it will do it.
Use cases are used to guide design by allowing you to highlight the intended function of a service provided by the Center of Excellence while maintaining a business focus. Jumping too quickly to a solution without fully understanding user and business needs leads to the loss of stakeholder buy-in and the Centers of Excellence rejection by teams.
Hypothesized ACE user needs →Use Case←Business objective
1.1.3 2 Hours
| AGILE CENTER OF EXCELLENCE FUNCTIONS: | |||||||
|---|---|---|---|---|---|---|---|
| Guiding | Learning | Tooling | Supporting | Governing | Monitoring | ||
| BUSINESS OBJECTIVES | Reduce time-to-market of product releases | ||||||
| Reduce product delivery costs | |||||||
| Effectively integrate teams from a merger | |||||||
1.1.3 2 Hours

Your goal should be to keep these as high level and generally applicable as possible as they provide an initial framework to further develop your service offerings. Begin to talk about the ways in which the ACE can support the realization of your business objectives and what those interactions may look like to customers of the ACE.
Avoid the rifts in stakeholder representation by ensuring you involve the relevant parties. Without representation and buy-in from all interested parties, your ACE may omit and fail to meet long-term organizational goals.
By ensuring every group receives representation, your service offerings will speak for the broad organization and in turn meet the needs of the organization as a whole.
Organization
1.1.4 1 Hour
1.1.4 1 Hour

An ACE can be organized differently depending on your organization’s specific needs and culture.
The SAFe Model:©
“For smaller enterprises, a single centralized [ACE] can balance speed with economies of scale. However, in larger enterprises—typically those with more than 500 – 1,000 practitioners—it’s useful to consider employing either a decentralized model or a hub-and-spoke model.”

© Scaled Agile, Inc.
The Spotify Model:
Spotify avoids using an ACE and instead spreads agile practices using Squads, Tribes, Chapters, Guilds, etc.
It can be a challenging model to adopt because it is constantly changing, and must be fundamentally supported by your organization’s culture. (Linders, Ben. “Don't Copy the Spotify Model.” InfoQ.com. 6 Oct. 2016.)
Detailed analysis of The Spotify Model is out of scope for this Blueprint.

1.1.5 30 minutes
| Centralized ACE | Decentralized ACE | ||||
|---|---|---|---|---|---|
| Pros | Cons | Pros | Cons | ||
| Centralize Vs De-centralize Considerations | Prioritized Business Objectives |
|
|
||
| ACE Use Cases |
|
|
|||
| Organization Size |
|
|
|||
| Organization Structure |
|
|
|||
| Organization Culture |
|
|
|||
SELECTED MODEL: Centralized ACE
1.1.6 1 Hour
| Candidate: Jane Doe | ||
|---|---|---|
| Rating Criteria | Criteria Weighting | Candidate's Score (1-5) |
| Candidate has strong theoretical knowledge of Agile. | 8% | 4 |
| Candidate has strong hands on experience with Agile. | 18% | 5 |
| Candidate has strong hands on experience with Agile. | 10% | 4 |
| Candidate is highly respected by the Agile teams. | 18% | 5 |
| Candidate is seen as a thought leader in the organization. | 18% | 5 |
| Candidate is seen as a change agent in the organization. | 18% | 5 |
| Candidate has strong desire to be member of ACE staff. | 10% | 3 |
| Total Weighted Score | 4.6 | |
1.1 Determine the vision of your ACE
1.2 Define the service offerings of your ACE
2.1 Define an adoption plan for your Agile teams
2.2 Create an ACE engagement plan
2.3 Define metrics to measure success
3.1 Optimize the success of your ACE
3.2 Plan change to enhance your Agile initiatives
3.3 Conduct ongoing retrospectives of your ACE
1.2.1 Form the Center of Excellence.
1.2.2 Gather and document your existing Agile practices for the CoE.
1.2.3 Interview stakeholders to align ACE requirements with functional expectations.
1.2.4 Form a solution matrix to organize your pain points and opportunities.
1.2.5 Refine your use cases to identify your ACE functions and services.
1.2.6 Visualize your ACE functions and service offerings with a capability map.
By operating within a group of your key players, you can legitimize your Center of Excellence by propagating the needs and interests of those who interface and evangelize the CoE within the larger organization.
The group of key stakeholders will extend the business alignment you achieved earlier by refining your service offerings to meet the needs of the ACEs customers. Multiple representations at the table will generate a wide arrangement of valuable insights and perspectives.
While holistic representation is necessary, ensure that the list is not too comprehensive and will not lead to progress roadblocks. The goal is to ensure that all factors relevant to the organization are represented; too many conflicting opinions may create an obstruction moving forward.
ACE
Choose the ACE funding model which is most aligned to your current system based on the scenarios provided below. Both models will offer the necessary support to ensure the success of your Agile program going forward.
| Funding Model | Funding Scenario I | Funding Scenario II |
|---|---|---|
| Funded by the CIO | Funded by the CIO office and a stated item within the general IT budget. | Charged back to supported functional groups with all costs allocated to each functional group’s budget. |
| Funded by the PMO | Charged back to supported functional groups with all costs allocated to each functional group’s budget. | Charged back to supported functional groups with all costs allocated to each functional group’s budget. |
Your funding model may add additional key influencers into the mix. After you choose your funding model, ensure that you review your stakeholder map and add anyone who will have a direct impact in the viability and stability of your ACE.
An Agile Center of Excellence is unique in the way you must govern the actions of its customers. Enable “flexible governance” to ensure that Agile teams have the ability to locally optimize and innovate while still operating within expected boundaries.
ACE Governing Body
↑ Agile Team → ACE ← Agile Team ↑
The governing body can be the existing executive or standing committees, or a newly formed committee involving your key ACE influencers and stakeholders.
Flexible governance means that your ACE set boundaries based on your cultural, regulatory, and compliance requirements, and your governance group monitors your Agile teams’ adherence to these boundaries.
There is no right answer to how your Center of Excellence should be resourced. Consider your existing organizational structure and culture, the quality of relationships between functional groups, and the typical budgetary factors that would weigh on choosing between a virtual and dedicated CoE structure.
| COE | Advantages | Disadvantages |
|---|---|---|
| Virtual |
|
|
| Dedicated |
|
|


1.2.1 1 Hour
Document results in the ACE Communications Deck.
The synergy between Agile and CoE relies on its ability to build on existing best practices. Agile cannot grow without a solid foundation. ACE gives you the way to disseminate these practices and facilitate knowledge transfer from a centralized sharing environment. As part of defining your service offerings, engage with stakeholders across the organization to evaluate what is already documented so that it can be accommodated in the ACE.
Info-Tech Insight
When considering existing practices, it is important to evaluate the level of adherence to these practices. If they have been efficiently utilized, injecting them into ACE becomes an obvious decision. If they have been underutilized, however, it is important to understand why this occurred and discuss how you can drive higher adherence.
The success of your Center of Excellence relies on the ability to build sound best practices within your organization’s context. Use your previous lessons learned and growing pains as shared knowledge of past Agile implementations within the ACE.
Draw on the experiences of your initial pilot where you learned how to adapt the Agile manifesto and practices to your specific context. These lessons will help onboard new teams to Agile since they will likely experience some of the same challenges.
Documents for review include:
Draw on previous scaling Agile experiences to help understand how to interface, facilitate, and orchestrate cross-functional teams and stakeholders for large and complex projects. These lessons will help your ACE teams develop collaboration and problem-solving techniques involving roles with different priorities and lines of thinking.
Documents for review include:
1.2.2 Variable time commitment based on current documentation state
| Name | Type | Adherence Level | CoE Best Fit | Source | |
|---|---|---|---|---|---|
| 1 | Tailored Scrum process | Process | High | Shared Services | Internal Wiki |
| 2 | |||||
| 3 |
1.2.3 30-60 Minutes per interview
Interview Stakeholders (from both Agile teams and functional areas) on their needs from the ACE. Ensure you capture both pain points and opportunities. Capture these as either Common Agile needs or Functional needs. Document using the tables below:
| Common Agile Needs | |
|---|---|
| Common Agile Needs |
|
| Functional Needs | Ent Arch Needs |
|---|---|
|
PMO Needs
Operations Needs
1.2.4 Half day
| Governance | Shared Services | Technology | People | |
|---|---|---|---|---|
| Pain Points | ||||
| Opportunities |
Document results in the ACE Communications Deck.
1.2.5 1 Hour
Document results in the ACE Communications Deck.
1.2.6 1 Hour
Document results in the ACE Communications Deck.
Policy Management (Medium Potential)
Change Management (High Potential)
Risk Management (High Potential)
Stakeholder Management (High Potential)
Metrics/Feedback Monitoring (High Potential)
Engagement Planning (High Potential)
Knowledge Management (High Potential)
Subject-Matter Expertise (High Potential)
Agile Team Evaluation (High Potential)
Operations Support (High Potential)
Onboarding (Medium Potential)
Coaching (High Potential)
Learning Facilitation (High Potential)
Internal Certification Program (Low Potential)
Communications Training (Medium Potential)
Vendor Management (Medium Potential)
Application Support (Low Potential)
Tooling Standards (High Potential)
1.1 Determine the vision of your ACE
1.2 Define the service offerings of your ACE
2.1 Define an adoption plan for your Agile teams
2.2 Create an ACE engagement plan
2.3 Define metrics to measure success
Our analyst team will help you organize and prioritize your business objectives for the year in order to ensure that the service offerings the ACE offers are delivering consistent business value.
Our analyst team will help you turn your prioritized business objectives into a set of high-level use cases that will provide the foundation for defining user-aligned services.
Our analysts will walk you through an exercise of mapping and prioritizing your Centers of Excellence stakeholders based on impact and power within so you can ensure appropriate presentation of interests within the organization.
Our analyst team will help you solidify the direction of your Center of Excellence by overlaying your identified needs, pain points, and potential opportunities in a matrix guided by Info-Tech’s CoE operating model.
Our analyst team will help you further refine your business-aligned use cases with the functional expectations from your Agile teams and stakeholders, ensuring the ACEs long-term utility.
Our analysts will walk you through creating your Agile Centers of Excellence capability map and help you to prioritize which service offerings are critical to the success of your Agile teams in meeting their objectives.
Now that you have aligned the CoE to the business and functional expectations, you need to ensure its service offerings are consistently accessible. To effectively ensure accessibility and delegation of shared services in an efficient way, the CoE needs to have a consistent framework to deliver its services.
Create strategic alignment between the CoE and the organization’s goals, objectives, and vision. This alignment translates into the CoE mandate intended to enhance the way Agile will enable teams to meet business objectives.
Build an engagement plan based on a standardized adoption model to ensure your CoE service offerings are accessible and consistent across the organization. Create and consolidate key performance indicators to measure the CoEs utility and whether or not the expected value is being translated to tangible results.
Operate the CoE to provide service offerings to Agile teams, identify improvements to optimize the function of your Agile teams, and effectively manage and communicate change so that teams can grow within the Agile adoption model and optimize value delivery both within your Agile environment and across functions.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): 2
Start with an analyst kick off call:
Then complete these activities…
2.1.1 Further categorize your use cases within the Agile adoption model.
Start with an analyst kick off call:
Then complete these activities…
2.2.1 Create an engagement plan for each level of adoption.
Finalize phase deliverable:
Then complete these activities…
2.3.1 Collect existing team-level metrics.
2.3.2 Define metrics that align with your Agile business objectives.
2.3.3 Define target ACE performance metrics.
2.3.4 Define Agile adoption metrics.
2.3.5 Consolidate metrics for stakeholder impact.
2.3.6 Use Info-Tech’s ACE Benefits Tracking Tool to monitor, evaluate, refine, and ensure continued business value.
1.1 Determine the vision of your ACE
1.2 Define the service offerings of your ACE
2.1 Define an adoption plan for your Agile teams
2.2 Create an ACE engagement plan
2.3 Define metrics to measure success
3.1 Optimize the success of your ACE
3.2 Plan change to enhance your Agile initiatives
3.3 Conduct ongoing retrospectives of your ACE
2.1.1 Further categorize your use cases within the Agile adoption model.
Culture clash between ACE and larger organization
It is important to carefully consider the compatibility between the current organizational culture and Agile moving forward. Agile compels empowered teams, meritocracy, and broad collaboration for success; while typical organizational structures are siloed and hierarchical and decisions are delegated from the top down.
This is not to say that the culture of the ACE has to match the larger organizational culture; part of the overarching aim of the ACE is to evolve the current organizational culture for the better. The point is to ensure you enable a smooth transition with sufficient management support and a team of Agile champions.
The changing role of middle management
Very similar to the culture clash challenge, cultural rigidity in how middle managers operate (performance review, human resource management, etc.) can cause cultural rejection. They need to become enablers for high performance and give their teams the sufficient tools, skills, and opportunities to succeed and excel.
Based on a global survey of Agile practitioners (N=1,319)*:
52% Organizational culture at odds with agile values
44% Inadequate management support and sponsorship
48% General organization resistance to change
*Respondents were able to make multiple selections
(13th Annual State of Agile Report, VersionOne, 2019)
The reality of cultural incompatibility between Agile and traditional organization structures necessitates a structured adoption plan. Systematically build competency so teams can consistently achieve project success and solidify trust in your teams’ ability to meet business needs with Agile.
By incrementally gaining the trust of management as you build up your Agile capabilities, you enable a smooth cultural transition to an environment where teams are empowered, adapt quickly to changing needs, and are trusted to innovate and make successes out of their failures.
Optimized value delivery occurs when there is a direct relationship between competency and trust. There will be unrealized value when competency or trust outweigh the other. That value loss increases as either dimension of adoption continues to grow faster than the other.

Agile adoption at its core, is about building social capital. Your level of trust with key influencers increases as you continuously enhance your capabilities, enabling the necessary cultural changes away from traditional organizational structures.
Begin to document your development workflow or value chain, implement a tracking system for KPIs, and start gathering metrics and reporting them transparently to the appropriate stakeholders.
Use collected metrics and retrospectives to stabilize team performance by reducing areas of variability in your workflow and increasing the consistency at which targets are met.
Use information to support changes and adopt appropriate practices to make incremental improvements to the existing environment.
Drive behavioral and cultural changes that will empower teams to be accountable for their own success and learning.
Use your built-up trust and support practice innovation, driving the definition and adoption of new practices.
Team Organization
Considers the degree to which teams are able to self-organize based on internal organizational structures (hierarchy vs. meritocracy) and inter-team capabilities.
Team Coordination
Considers the degree to which teams can coordinate, both within and across functions.
Business Alignment
Considers the degree to which teams can understand and/or map to business objectives.
Coaching
Considers what kind of coaching/training is offered and how accessible the training is.
Empowerment
Considers the degree to which teams are able and capable to address project, process, and technical challenges without significant burden from process controls and bureaucracy.
Failure Tolerance
Considers the degree to which stakeholders are risk tolerant and if teams are capable of turning failures into learning outcomes.
These key attributes function as qualities or characteristics that, when improved, will successively increase the degree to which the business trusts your Agile teams’ ability to meet their objectives.
Systematically improving these attributes as you graduate levels of the adoption model allows the business to acclimatize to the increased capability the Agile team is offering, and the risk of culture clash with the larger organization decreases.
Start to consider at what level of adoption each of your service offerings become useful. This will allow you to standardize the way your Agile teams interact with the CoE.
2.1.1 1.5 Hours
The same service offering could be offered at different levels of adoption. In these cases, you will need to re-visit the use case and differentiate how the service (if at all) will be delivered at different levels of adoption.
2.1.1 1.5 Hours
| Service Offerings | |
|---|---|
| Level 5: Innovate | |
| Level 4: Empower | |
| Level 3: Collaborate | Coaching -- Communications Training |
| Level 2: Iterate | Tooling Standards |
| Level 1: Conceptualize |
Learning Facilitation
Draw on the service offerings identified in activity 1.2.4
1.1 Determine the vision of your ACE
1.2 Define the service offerings of your ACE
2.1 Define an adoption plan for your Agile teams
2.2 Create an ACE engagement plan
2.3 Define metrics to measure success
3.1 Optimize the success of your ACE
3.2 Plan change to enhance your Agile initiatives
3.3 Conduct ongoing retrospectives of your ACE
2.2.1 Create an engagement plan for each level of adoption.
A Center of Excellence aligned with your service offerings is only valuable if your CoEs customers can effectively access those services. At this stage, you have invested in ensuring that your CoE aligns to your business objectives and that your service offerings align to its customers. Now you need to ensure that these services are accessible in the day-to-day operation of your Agile teams.
Use backwards induction from your delivery method to the service offering. This is an effective method to determine the optimal engagement action for the CoE, as it considers the end customer as the driver for best action for every possible situation.
Info-Tech Insight
Your engagement process should be largely informed by your ACE users. Teams have constraints as well as in-the-trenches concerns and issues. If your service offerings don’t account for these, it can lead to rejection of the culture you are trying to inspire.
A primary function of your ACE is to transfer knowledge to Agile teams to increase their capability to achieve desired outcomes.
While this can take the form of coaching, training sessions, libraries, and wikis, a critical component of ACE is creating interactions where individuals from Agile teams can come together and share their knowledge.
Ideas come from different experiences. By creating communities of practice (CoP) around topics that the ACE is tasked with supporting (e.g. Agile business analysts), you foster social learning and decrease the likelihood that change will result in some sort of cultural rejection.
Consider whether creating CoPs would be beneficial in your organization’s context.
"Communities of practice are a practical way to frame the task of managing knowledge. They provide a concrete organizational infrastructure for realizing the dream of a learning organization." – Etienne Wenger, Digital Habitats: Stewarding technology for communities
Top-down support is critical to validate the CoE to its customers and ensure they feel compelled to engage with its services. Relevancy is a real concern for the long-term viability of a CoE and championing its use from a position of authority will legitimize its function and deter its fading from relevancy of day-to-day use for Agile teams.
Although you are aligning your engagement processes to the customers of your Agile Center of Excellence, you still need your key influencers to champion its lasting organizational relevancy. Don’t let your employees think the ACE is just a coordinating body or a committee that is convenient but non-essential – make sure they know that it drives their own personal growth and makes everyone better as a collective.
"Even if a CoE is positioned to meet a real organizational need, without some measure of top-down support, it faces an uphill battle to remain relevant and avoid becoming simply one more committee in the eyes of the wider organization. Support from the highest levels of the organization help fight the tendency of the larger organization to view the CoE as a committee with no teeth and tip the scales toward relevancy for the CoE." – Joe Shepley, VP and Practice Lead, Doculabs
Info-Tech Insight
Stimulate top-down support with internal certifications. This allows your employees to gain accreditation while at the same time encouraging top-down support and creating a compliance check for the continual delivery and acknowledgement of your evolving best practices.
For your employees to continuously improve, so must the Center of Excellence. Ensure the ACE has the appropriate mechanisms to absorb and disseminate best practices that emerge from knowledge transfer facilitation events.
While facilitating knowledge transfer is key, it is even more important that the Center of Excellence can take localized adaptations from Agile teams and standardize them as best practices when well received. If an individual were to leave without sharing their knowledge, the CoE and the larger organization will lose that knowledge and potential innovation opportunities.
To organically grow your ACE and be cost effective, you want your teams to continuously improve and to share that knowledge. As individual team members develop and climb the adoption model, they should participate as coaches and champions for less experienced groups so that their knowledge is reaching the widest audience possible.
Industry Digital Media
Source Henrik Kniberg & Anders Ivarsson, 2012
Spotify has continuously introduced innovative techniques to facilitate learning and ensure that that knowledge gets injected back into the organization. Some examples are the following:

"As an example of guild work, we recently had a ‘Web Guild Unconference,’ an open space event where all web developers at Spotify gathered up in Stockholm to discuss challenges and solutions within their field."
2.2.1 30 Minutes per role
Document results in the ACE Communications Deck.
2.2.1 30 Minutes per role
| Role: Developer | |||||
|---|---|---|---|---|---|
| Level 1 | Level 2 | Level 3 | Level 4 | Level 5 | |
| Service Offering |
|
|
|
|
|
| Engagement Process |
|
|
|
|
|
2.2.1 30 Minutes per role
| Role: Tester | |||||
|---|---|---|---|---|---|
| Level 1 | Level 2 | Level 3 | Level 4 | Level 5 | |
| Service Offering |
|
|
|
|
|
| Engagement Process |
|
|
|
|
|
2.2.1 30 Minutes per role
| Role: Product Owner | |||||
|---|---|---|---|---|---|
| Level 1 | Level 2 | Level 3 | Level 4 | Level 5 | |
| Service Offering |
|
|
|
|
|
| Engagement Process |
|
|
|
|
|
1.1 Determine the vision of your ACE
1.2 Define the service offerings of your ACE
2.1 Define an adoption plan for your Agile teams
2.2 Create an ACE engagement plan
2.3 Define metrics to measure success
3.1 Optimize the success of your ACE
3.2 Plan change to enhance your Agile initiatives
3.3 Conduct ongoing retrospectives of your ACE
2.3.1 Define existing team-level metrics.
2.3.2 Define metrics that align with your Agile business objectives.
2.3.3 Define target ACE performance metrics.
2.3.4 Define Agile adoption metrics.
2.3.5 Consolidate your metrics for stakeholder impact.
2.3.6 Use Info-Tech’s ACE Benefits Tracking Tool to monitor, evaluate, refine, and ensure continued business value.
Quantify measures that demonstrate the effectiveness of your ACE by establishing distinct metrics for each of your service offerings. This will ensure that you have full transparency over the outputs of your CoE and that your service offerings maintain relevance and are utilized.
Specific
Measureable
Achievable
Realistic
Time-bound
Follow the SMART framework when developing metrics for each service offering.
Adhering to this methodology is a key component of the lean management methodology. This framework will help you avoid establishing general metrics that aren’t relevant.
"It’s not about telling people what they are doing wrong. It’s about constantly steering everyone on the team in the direction of success, and never letting any individual compromise the progress of the team toward success." – Mary Poppendieck, qtd. in “Questioning Servant Leadership”
For important advice on how to avoid the many risks associated with metrics, refer to Info-Tech’s Select and Use SDLC Metrics Effectively.
There will be a degree of overlap between the metrics from your business objectives, service offerings, and existing Agile teams. This is a positive thing. If a metric can speak to multiple benefits it is that much more powerful in commuting successes to your key stakeholders.
Existing metrics
Business objective metrics
Service offering metrics
Agile adoption metrics
Finding points of overlap means that you have multiple stakeholders with a vested interest in the positive trend of a specific metric. These consolidated metrics will be fundamental for your CoE as they will help build consensus through communicating the success of the ACE in a common language for a diverse audience.
2.3.1 1 Hour
| Team Objective | Expected Benefits | Metrics |
|---|---|---|
| Improve productivity |
|
|
| Increase team morale and motivation |
|
|
| Improve transparency with business decisions |
|
|
2.3.2 1 Hour
| Business Objectives | Expected Benefits | Metrics |
|---|---|---|
| Decrease time-to-market of product releases |
|
|
| Decrease time-to-market of product releases |
|
|
2.3.3 1 Hour
| Service Offering | Expected Benefits | Metrics |
|---|---|---|
| Knowledge management |
|
|
| Tooling standards |
|
|
2.3.4 1 Hour
| Adoption attributes | Expected Benefits | Metrics |
|---|---|---|
| Team organization |
|
|
| Team coordination |
|
|
| Business alignment |
|
|
| Coaching |
|
|
| Empowerment |
|
|
| Failure tolerance |
|
|
2.3.5 30 Minutes
2.3.6 1 Hour
The CoE governance team can use this tool to take ownership of the project’s benefits, track progress, and act on any necessary changes to address gaps. In the long term, it can be used to identify whether the team is ahead, on track, or lagging in terms of benefits realization.
INFO-TECH DELIVERABLE
Download the ACE Benefits Tracking Tool.
2.1 Define an adoption plan for your Agile teams
2.2 Create an ACE engagement plan
2.3 Define metrics to measure success
↓
3.1 Optimize the success of your ACE
3.2 Plan change to enhance your Agile initiatives
3.3 Conduct ongoing retrospectives of your ACE
Our analyst team will help you categorize the Centers of Excellence service offerings within Info-Tech’s Agile adoption model to help standardize the way your organization engages with the Center of Excellence.
Our analyst team will help you structure engagement plans for each role within your Agile environment to provide a standardized pathway to personal development and consistency in practice.
Our analysts will walk you through defining a set of metrics that align with your Agile business objectives identified in Phase 1 of the blueprint so the CoEs monitoring function can ensure ongoing alignment during operation.
Our analysts will walk you through defining a set of metrics that monitors how successful the ACE has been at providing its services so that business and IT stakeholders can ensure the effectiveness of the ACE.
Our analyst team will help you through defining a set of metrics that aligns with your organization’s fit of the Agile adoption model in order to provide a mechanism to track the progress of Agile teams maturing in capability and organizational trust.
The final step is to engage in monitoring of your metrics program to identify areas for improvement. Using metrics as a driver for operating your ACE will allow you to identify and effectively manage needed change, as well as provide you with the data necessary to promote outcomes to your stakeholders to ensure the long-term viability of the ACE within your organization.
Create strategic alignment between the CoE and the organization’s goals, objectives, and vision. This alignment translates into the CoE mandate intended to enhance the way Agile will enable teams to meet business objectives.
Build an engagement plan based on a standardized adoption model to ensure your CoE service offerings are accessible and consistent across the organization. Create and consolidate key performance indicators to measure the CoEs utility and whether or not the expected value is being translated to tangible results.
Operate the CoE to provide service offerings to Agile teams, identify improvements to optimize the function of your Agile teams, and effectively manage and communicate change so that teams can grow within the Agile adoption model and optimize value delivery both within your Agile environment and across functions.
Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.
Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.
Proposed Time to Completion (in weeks): Variable depending on communication plan
Start with an analyst kick off call:
Then complete these activities…
3.1.1 Use Info-Tech’s ACE Satisfaction Survey to help establish your baseline.
3.1.2 Use Info-Tech’s CoE Maturity Diagnostic Tool to measure the maturity level of your ACE.
3.1.3 Prioritize ACE actions by monitoring your metrics.
Start with an analyst kick off call:
Then complete these activities…
3.2.1 Assess the interaction and communication points of your Agile teams.
3.2.2 Determine the root cause of each metric falling short of expectations.
3.2.3 Brainstorm solutions to identified issues.
3.2.4 Review your metrics program.
3.2.5 Create a communication plan for change.
Finalize phase deliverable:
Then complete these activities…
3.3.1 Use the outputs from your metrics tracking tool to communicate progress.
3.3.2 Summarize adjustments in areas where the ACE fell short.
3.3.3 Review the effectiveness of your service offerings.
3.3.4 Evaluate your ACE Maturity.
3.3.5 Use Info-Tech’s ACE Communications Deck to deliver your outcomes to the key stakeholders.
Phase 3 Results & Insights:
Inject improvements into your Agile environment with operational excellence. Plan changes and communicate them effectively, monitor outcomes on a regular basis, and keep stakeholders in the loop to ensure that their interests are being looked after to ensure long-term viability of the CoE.
1.1 Determine the vision of your ACE
1.2 Define the service offerings of your ACE
2.1 Define an adoption plan for your Agile teams
2.2 Create an ACE engagement plan
2.3 Define metrics to measure success
3.1 Optimize the success of your ACE
3.2 Plan change to enhance your Agile initiatives
3.3 Conduct ongoing retrospectives of your ACE
3.1.1 Use Info-Tech’s ACE Satisfaction Survey to help establish your baseline.
3.1.2 Use Info-Tech’s CoE Maturity Diagnostic Tool to measure the maturity level of your ACE.
3.1.3 Prioritize ACE actions by monitoring your metrics.
Establish your collection process to ensure that the CoE has the necessary resources to collect metrics and monitor progress, that there is alignment on what data sources are to be used when collecting data, and that you know which stakeholder is interested in the outcomes of that metric.
Establishing the baseline performance of the ACE allows you to have a reasonable understanding of the impact it is having on meeting business objectives. Use user satisfaction surveys, stakeholder interviews, and any current metrics to establish a concept of how you are performing now. Setting new metrics can be a difficult task so it is important to collect as much current data as possible. After the metrics have been established and monitored for a period of time, you can revisit the targets you have set to ensure they are realistic and usable.
Without a baseline, you cannot effectively:
Info-Tech Insight
Invest the needed time to baseline your activities. These data points are critical to diagnose successes and failures of the CoE moving forward, and you will need them to be able to refine your service offerings as business conditions or user expectations change. While it may seem like something you can breeze past, the investment is critical.
What to do:
Benefits:
Challenges:
What to do:
Benefits:
Challenges:
What to do:
Benefits:
Challenges:
3.1.1 Baseline satisfaction survey
Conduct a user satisfaction survey prior to setting your baseline for your ACE. This will include high-level questions addressing your overall Agile environment and questions addressing teams’ current satisfaction with their processes and technology.
INFO-TECH DELIVERABLE
Download the ACE Satisfaction Survey.
3.1.2 CoE maturity assessment
Assessing your ACEs maturity lets you know where they currently are and what to track to get them to the next step. This will help ensure your ACE is following good practices and has the appropriate mechanisms in place to serve your stakeholders.
Document results in the ACE Communications Deck.
INFO-TECH DELIVERABLE
Download the CoE Maturity Diagnostic Tool.
3.1.3 Variable time commitment
1.1 Determine the vision of your ACE
1.2 Define the service offerings of your ACE
2.1 Define an adoption plan for your Agile teams
2.2 Create an ACE engagement plan
2.3 Define metrics to measure success
3.1 Optimize the success of your ACE
3.2 Plan change to enhance your Agile initiatives
3.3 Conduct ongoing retrospectives of your ACE
3.2.1 Assess the interaction and communication points of your Agile teams.
3.2.2 Determine the root cause of each metric falling short of expectations.
3.2.3 Brainstorm solutions to identified issues
3.2.4 Review your metrics program.
3.2.5 Create a communication plan for change.
As Agile spreads, be cognizant of your cultural tolerance to change and its ability to deliver on such change. Change will happen more frequently and continuously, and there may be conceptual (change tolerance) or capability (delivery tolerance) roadblocks along the way that will need to be addressed.
The Agile adoption model will help to graduate both the tolerance to change and tolerance to deliver over time. As your level of competency to deliver change increases, organizational tolerance to change, especially amongst management, will increase as well. Remember that optimized value delivery comes from this careful balance of aptitude and trust.
Tolerance to change refers to the conceptual capacity of your people to consume and adopt change. Change tolerance may become a barrier to success because teams might be too engrained with current structures and processes and find any changes too disruptive and uncomfortable.
Tolerance to deliver refers to the capability to deliver on expected change. While teams may be tolerant, they may not have the necessary capacity, skills, or resources to deliver the necessary changes successfully. The ACE can help solve this problem with training and coaching, or possibly by obtaining outside help where necessary.
As the ACE absorbs best practices and identifies areas for improvement, a change management process should be established to address the implementation and sustainability of change without introducing significant disruptions and costs.
To manage a continuously changing environment, your ACE will need to align and coordinate with organizational change management processes. This process should be capable of evaluating and incorporating multiple change initiatives continuously.
Desired changes will need to be validated, and localized adaptations will need to be disseminated to the larger organization, and current state policy and procedures will need to be amended as the adoption of Agile spreads and capabilities increase.
The goal here is to have the ACE governance group identify and interface with parties relevant to successfully implementing any specific change.
Strategy and Leadership: Optimize Change Management
Optimize your stakeholder management process to identify, prioritize, and effectively manage key stakeholders.
Changes to the services, structure, or engagement model of your ACE can be triggered from various sources in your organization. You will see that proposed changes may be requested with the best intentions; however, the potential impacts they may have to other areas of the organization can be significant. Consult all sources of ACE change requests to obtain a consensus that your change requests will not deteriorate the ACEs performance and use.
Note: Each source of ACE change requests may require a different change management process to evaluate and implement the change.
3.2.1 1.5 Hours
| Agile Team n | ||
|---|---|---|
| Group | Type of Interaction | Potential challenges |
| Operations |
|
|
| PMO |
|
|
3.2.2 30 Minutes per metric
3.2.3 30 Minutes per metric
| SOLUTION CATEGORY | ||||
|---|---|---|---|---|
| People | Process | Technology | ||
| ISSUES | Poor face-to-face communication | |||
| Lack of best-practice documentation | ||||
Strategically managing change is an essential component to ensure that the ACE achieves its desired function. If the change that comes with adopting Agile best practices is going to impact other functions and change their expected workflows, ensure they are well prepared and the benefits for said changes are clearly communicated to them.
Necessary change may be identified proactively (dependency assessments, system integrity, SME indicates need, etc.) or reactively (through retrospectives, discussions, completing root-cause analyses, etc.), but both types need to be handled the same way – through proper planning and communication with the affected parties.
Understand the points where other groups will be affected by the adoption of Agile practices and recognize the potential challenges they may face. Plan changes to accommodate interactions between these groups without roadblocks or impediments.
Structure a communication plan based on your identified challenges and proposed changes so that groups are well prepared to make the necessary adjustments to accommodate Agile workflows.
Consider the possible limitations that will exist from environmental complexities when measuring your Agile teams. Dependencies and legacy policies and procedures that pose a bottleneck to desired outcomes will need to be changed before teams can be measured justifiably. Take the time to ensure the metrics you crafted earlier are plausible in your current environment and there is not a need for transitional metrics.
Specific
Measureable
Achievable
Realistic
Time-bound
Info-Tech Insight
Use metrics as diagnostics, not as motivation. Teams will find ways to meet metrics they are measured by making sacrifices and taking unneeded risk to do so. To avoid dysfunction in your monitoring, use metrics as analytical tools to inform decision making, not as a yardstick for judgement.
3.2.4 Variable time commitment
Industry Government
Source Navin Vembar, Agile Government Leadership
The GSA is tasked with completed management of the Integrated Award Environment (IAE).
The IAE staff had to find a way to break down the problem of modernization into manageable chunks that would demonstrate progress, but also had to be sure to capture a wide variety of user needs with the ability to respond to those needs throughout development.
Had to work out the logistics of executing Agile change within the GSA, an agency that relies heavily on telework. In the case of modernization, they had a product owner in Florida while the development team was spread across the metro Washington, DC area.
Agile provided the ability to build incremental successes that allowed teams successful releases and built enthusiasm around the potential of adopting Agile practices offered.
Communication is key to avoid surprises and lost productivity created by the implementation of changes.
User groups and the business need to be given sufficient notice of an impending change. Be concise, be comprehensive, and ensure that the message is reaching the right audience so that no one is blindsided and unable to deliver what is needed. This will allow them to make appropriate plans to accept the change, minimizing the impact of the change on productivity.
Communicating change
(Cornelius & Associates, The Qualities of Leadership: Leading Change)
3.2.5 1.5 Hours
Note: It is important to establish a feedback mechanism to ensure that the communication has been effective in communicating the change to the intended audiences. This can be incorporated into your ACE satisfaction surveys.
| Audience | Messenger | Format | Timing | Message |
|---|---|---|---|---|
| Operations | Development team |
|
Build ready for release | |
| Key stakeholders | CIO | Meeting |
|
Updates on outcomes from past two sprint cycles |
1.1 Determine the vision of your ACE
1.2 Define the service offerings of your ACE
2.1 Define an adoption plan for your Agile teams
2.2 Create an ACE engagement plan
2.3 Define metrics to measure success
3.1 Optimize the success of your ACE
3.2 Plan change to enhance your Agile initiatives
3.3 Conduct ongoing retrospectives of your ACE
3.3.1 Use the outputs from your metrics tracking tool to communicate progress.
3.3.2 Summarize adjustments in areas where the ACE fell short.
3.3.3 Re-conduct satisfaction surveys and compare against your baseline.
3.3.4 Use Info-Tech’s CoE Maturity Diagnostic Tool to baseline current practices
3.3.5 Use Info-Tech’s ACE Communications Deck to deliver your outcomes to the key stakeholders.
After functioning for a period of time, it is imperative to review the function of your ACE to ensure its continual alignment and see in what ways it can improve.
At the end of the year, take the time to deliberately review and discuss:
The overlying purpose of your ACE is to effectively align your Agile teams with corporate objectives. This means that there have to be communicable benefits that point to the effort and resources invested being valuable to the organization. Re-visit your prioritized stakeholder list and get ready to show them the impact the ACE has had on business outcomes.
Communication with stakeholders is the primary method of building and developing a lasting relationship. Correct messaging can build bridges and tear down barriers, as well as soften opposition and bolster support.
This section will help you to prepare an effective communication piece that summarizes the metrics stakeholders are interested in, as well as some success stories or benefits that are not communicable through metrics to provide extra context to ongoing successes of the ACE.
Strategy and Leadership: Manage Stakeholder Relations
Optimize your stakeholder management process to identify, prioritize, and effectively manage key stakeholders.
Those who fund the ACE have a large influence on the long-term success of your ACE. If you have not yet involved your stakeholders, you need to re-visit your organizational funding model for the ACE and ensure that your key stakeholders include the key decision makers for your funding. While they may have varying levels of interest and desires for granularity of data reporting, they need to at least be informed on a high level and kept as champions of the ACE so that there are no roadblocks to the long-term viability of this program.
Keep this in mind as the ACE begins to demonstrate success, as it is not uncommon to have additional members added to your funding model as your service scales, especially in the chargeback models.
As new key influencers are included, the ACEs governing group must ensure that collective interests may align and that more priorities don’t lead to derailment.

3.3.1 1 Hour
Use the ACE Benefits Tracking Tool to track the progress of your Agile environment to monitor whether or not the ACE is having a positive impact on the business’ ability to meet its objectives. The outputs will allow you to communicate incremental benefits that have been realized and point towards positive trends that will ensure the long-term buy-in of your key influencers.
For communication purposes, use this tool to:
![]()

Part of communicating the effectiveness of your ACE is to demonstrate that it is able to remedy projects and processes when they fall short of expectations and brainstorm solutions that effectively address these challenges. Take the opportunity to summarize where results were not as expected, and the ways in which the ACE used its influence or services to drive a positive outcome from a problem diagnosis. Stakeholders do not want a sugar-coated story – they want to see tangible results based on real scenarios.
Summarizing failures will demonstrate to key influencers that:
3.3.2 15 Minutes per metric
| Name of metric that fell short | |
|---|---|
| Baseline measurement | 65% of users satisfied with ACE services. |
| Goal measurement | 80% of users satisfied with ACE services. |
| Actual measurement | 70% of users satisfied with ACE services. |
| Results of root-cause analysis | Onboarding was not extensive enough; teams were unaware of some of the services offered, rendering them unsatisfied. |
| Proposed solution | Revamp onboarding process to include capability map of service offered. |
| Summary of success | TBD |
3.3.3 Re-conduct satisfaction surveys and compare against your baseline
This satisfaction survey will give you a template to follow to monitor the effectiveness of your ACEs defined service offerings. The goal is to understand what worked, and what did not, so you can add, retract, or modify service offerings where necessary.
INFO-TECH DELIVERABLE
Download the ACE Satisfaction Survey.
3.3.4 ACE Maturity Assessment
Assess your ACEs maturity by using Info-Tech’s CoE Maturity Diagnostic Tool. Assessing your ACEs maturity lets you know where you currently are, and where to look for improvements. Note that your optimal Maturity Level will depend on organizational specifics (e.g. a small organization with a handful of Agile Teams can be less mature than a large organization with hundreds of Agile Teams).
Document results in the ACE Communications Deck.
INFO-TECH DELIVERABLE
Download the CoE Maturity Diagnostic Tool.
3.3.5 Structure communications to each of your key stakeholders
The ACE Communications Deck will give you a template to follow to effectively communicate with your stakeholders and ensure the long-term viability of your Agile Center of Excellence. Fill in the slides as instructed and provide each stakeholder with a targeted view of the successes of the ACE.
INFO-TECH DELIVERABLE
Download the ACE Communications Deck.
Paul has been an Agile practitioner since the manifesto emerged some 20 years ago, applying and refining his views through real life experience at several organizations from startups to large enterprises. He has recently completed the successful build out of the inaugural Agile Delivery Centre of Excellence at TD bank in Toronto.
John Munro is the President of Scrum Masters Inc., a software optimization professional services firm using Agile, Scrum, and Lean to help North American firms “up skill” their software delivery people and processes. Scrum Masters’ unique, highly collaborative “Master Mind” consulting model leverages Agile/Lean experts on a biweekly basis to solve clients’ technical and process challenges.
Doug has been a leader in building great teams, Agile project management, and business process innovation for over 20 years. As Senior Partner and Chief Evangelist at Agile Wave, his mission is to educate and to learn from all those who care about effective government delivery, nationally.
Implement Agile Practices That Work
Agile is a cultural shift. Don't just do Agile, be Agile.
Enable Organization-Wide Collaboration by Scaling Agile
Execute a disciplined approach to rolling out Agile methods in the organization.
Improve Application Development Throughput
Drive down your delivery time by eliminating development inefficiencies and bottlenecks while maintaining high quality.
Implement DevOps Practices That Work
Accelerate software deployment through Dev and Ops collaboration.
Maximize the Benefits from Enterprise Applications with a Center of Excellence
Optimize your organization’s enterprise application capabilities with a refined and scalable methodology.
Drive Efficiency and Agility with a Fit-for-Purpose Quality Management Program
Be proactive; it costs exponentially more to fix a problem the longer it goes unnoticed.
Optimize the Change Management Process
Right-size your change management process.
Improve Requirements Gathering
Back to basics: great products are built on great requirements.
Ambler, Scott. “Agile Requirements Change Management.” Agile Modeling. Scott Amber + Associates, 2014. Web. 12 Apr. 2016.
Ambler, Scott. “Center of Excellence (CoEs).” Disciplined Agile 2.0: A Process Decision Framework for Enterprise I.T. Scott Amber + Associates. Web. 01 Apr. 2016.
Ambler, Scott. “Transforming From Traditional to Disciplined Agile Delivery.” Case Study: Disciplined Agile Delivery Adoption. Scott Amber + Associates, 2013. Web.
Beers, Rick. “IT – Business Alignment Why We Stumble and the Path Forward.” Oracle Corporation, July 2013. Web.
Cornelius & Associates. “The Qualities of Leadership: Leading Change.” Cornelius & Associates, n.d. Web.
Craig, William et al. “Generalized Criteria and Evaluation Method for Center of Excellence: A Preliminary Report.” Carnegie Mellon University Research Showcase @ CMU – Software Engineering Institute. Dec. 2009. Web. 20 Apr. 2016.
Forsgren, Dr. Nicole et al (2019), Accelerate: State of DevOps 2019, Google, https://services.google.com/fh/files/misc/state-of-devops-2019.pdf
Gerardi, Bart (2017), Agile Centers of Excellence, PMI Projectmanagement.com, https://www.projectmanagement.com/articles/405819/Agile-Centers-of-Excellence
Gerardi, Bart (2017), Champions of Agile Adoption, PMI Projectmanagement.com, https://www.projectmanagement.com/articles/418151/Champions-of-Agile-Adoption
Gerardi, Bart (2017), The Roles of an Agile COE, PMI Projectmanagement.com, https://www.projectmanagement.com/articles/413346/The-Roles-of-an-Agile-COE
Hohl, P. et al. “Back to the future: origins and directions of the ‘Agile Manifesto’ – views of the originators.” Journal of Software Engineering Research and Development, vol. 6, no. 15, 2018. https://link.springer.com/article/10.1186/s40411-0...
Kaltenecker, Sigi and Hundermark, Peter. “What Are Self-Organising Teams?” InfoQ. 18 July 2014. Web. 14 Apr. 2016.
Kniberg, Henrik and Anderson Ivarsson. “Scaling Agile @ Spotify with Tribes, Squads, Chapters & Guilds.” Oct. 2012. Web. 30 Apr. 2016.
Kumar, Alok et al. “Enterprise Agile Adoption: Challenges and Considerations.” Scrum Alliance. 30 Oct. 2014. Web. 30 May 2016.
Levison, Mark. “Questioning Servant Leadership.” InfoQ, 4 Sept. 2008. Web. https://www.infoq.com/news/2008/09/servant_leadership/
Linders, Ben. “Don't Copy the Spotify Model.” InfoQ.com. 6 Oct. 2016.
Loxton, Matthew (June 1, 2011), CoP vs CoE – What’s the difference, and Why Should You Care?, Wordpress.com
McDowell, Robert, and Bill Simon. In Search of Business Value: Ensuring a Return on Your Technology Investment. SelectBooks, 2010
Novak, Cathy. “Case Study: Agile Government and the State of Maine.” Agile Government Leadership, n.d. Web.
Pal, Nirmal and Daniel Pantaleo. “Services are the Language and Building Blocks of an Agile Enterprise.” The Agile Enterprise: Reinventing your Organization for Success in an On-Demand World. 6 Dec. 2015. Springer Science & Business Media.
Rigby, Darrell K. et al (2018), Agile at Scale, Harvard Business Review, https://hbr.org/2018/05/agile-at-scale
Scaledagileframework.com, Create a Lean-Agile Center of Excellence, Scaled Agile, Inc, https://www.scaledagileframework.com/lace/
Shepley, Joe. “8 reasons COEs fail (Part 2).” Agile Ramblings, 22 Feb. 2010. https://joeshepley.com/2010/02/22/8-reasons-coes-fail-part-2/
Stafford, Jan. “How upper management misconceptions foster Agile failures.” TechTarget. Web. 07 Mar. 2016.
Taulli, Tom (2020), RPA Center Of Excellence (CoE): What You Need To Know For Success, Forbes.com, https://www.forbes.com/sites/tomtaulli/2020/01/25/rpa-center-of-excellence-coe-what-you-need-to-know-for-success/#24364620287a
Telang, Mukta. “The CMMI Agile Adoption Model.” ScrumAlliance. 29 May 2015. Web. 15 Apr. 2016.
VersionOne. “13th Annual State of Agile Report.” VersionOne. 2019. Web.
Vembar, Navin. “Case Study: Agile Government and the General Services Administration (Integrated Award Environment).” Agile Government Leadership, n.d. Web.
Wenger, E., R. A. McDermott, et al. (2002), Cultivating communities of practice: A guide to managing knowledge, Harvard Business Press.
Wenger, E., White, N., Smith, J.D. Digital Habitats; Stewarding Technology for Communities. Cpsquare (2009).
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Create your minimum viable business architecture.
If there are a handful of capabilities that your business needs to focus on right now, what are they?
Identify business opportunities.
Enrich your capability model.
There is a direct correlation between service delivery dissatisfaction and increases in shadow IT. Whether the goal is to reduce shadow IT or gain control, improved customer service and fast delivery are key to making lasting changes.
Our blueprint will help you design a service that draws the business to use it. If it is easier for them to buy from IT than it is to find their own supplier, they will use IT.
A heavy focus on customer service, design optimization, and automation will provide a means for the business to get what they need, when they need it, and provide visibility to IT and security to protect organizational interests.
This blueprint will help you:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this blueprint to create a service request management program that provides immediate value.
Use this template to define what information is needed to vet and onboard applications into the IT environment.
Use this library of workflows as a starting point for creating and fulfilling requests for applications and equipment in a service catalog.
Use this template as a starting point to create an application portfolio and request catalog.
Use this template to create a presentation and communications plan for launching the new service and service request catalog.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Collaborate with the business to determine service model.
Collaborate with IT teams to build non-standard assessment process.
Designed a service for service requests, including new product intake.
1.1 Identify challenges and obstacles.
1.2 Complete customer journey map.
1.3 Design process for nonstandard assessments.
Nonstandard process.
Design the service request catalog management process.
Ensure the catalog is kept current and is integrated with IT service catalog if applicable.
2.1 Determine what will be listed in the catalog.
2.2 Determine process to build and maintain the catalog, including roles, responsibilities, and workflows.
2.3 Define success and determine metrics.
Catalog scope.
Catalog design and maintenance plan.
Defined success metrics
Determine catalog contents and how requests will be fulfilled.
Catalog framework and service level agreements will be defined.
Create communications documents.
3.1 Determine how catalog items will be displayed.
3.2 Complete application categories for catalog.
3.3 Create deployment categories and SLAs.
3.4 Design catalog forms and deployment workflows.
3.5 Create roadmap.
3.6 Create communications plan.
Catalog workflows and SLAs.
Roadmap.
Communications deck.
Create an applications portfolio.
Prepare to populate the catalog.
Portfolio and catalog contents created.
4.1 Using existing application inventory, add applications to portfolio and categorize.
4.2 Determine which applications should be in the catalog.
4.3 Determine which applications are packaged and can be easily deployed.
Application Portfolio.
List of catalog items.
In July 2022, Ivanti conducted a study on the state of the digital employee experience, surveying 10,000 office workers, IT professionals, and C-suite executives. Results of this study indicated that 49% of employees are frustrated by their tools, and 26% of employees were considering quitting their jobs due to unsuitable tech. 42% spent their own money to gain technology to improve their productivity. Despite this, only 21% of IT leaders prioritized user experience when selecting new tools.
Any organization’s workers are expected to be productive and contribute to operational improvements or customer experience. Yet those workers don’t always have the tools needed to do the job. One option is to give the business greater control, allowing them to choose and acquire the solutions that will make them more productive. Info-Tech's blueprint Embrace Business-Managed Applications takes you down this path.
However, if the business doesn’t want to manage applications, but just wants have access to better ones, IT is positioned to provide services for application and equipment sourcing that will improve the employee experience while ensuring applications and equipment are fully managed by the asset, service, and security teams.
Improving the request management and deployment practice can give the business what they need without forcing them to manage license agreements, renewals, and warranties.
Sandi Conrad
ITIL Managing Professional
Principal Research Director, IT Infrastructure & Operations,
Info-Tech Research Group
Shadow IT: The IT team is regularly surprised to discover new products within the organization, often when following up on help desk tickets or requests for renewals from business users or vendors.
Renewal management: The contracts and asset teams need to be aware of upcoming renewals and have adequate time to review renewals.
Over-purchasing and over-spending: Contracts may be renewed without a clear picture of utilization, potentially renewing unused applications. Applications or equipment may be purchased at retail price where corporate, government, or educational discounts exist.
To increase the visibility of the IT environment, IT needs to transform the request management process to create a service that makes it easier for the business to access the tools they need rather than seeking them outside of the organization.
|
609
|
40%
|
— Source: Zylo, SaaS Trends for IT Leaders, 2022
Delays: The business may not be getting the applications they need from IT to do their jobs or must wait too long to get the applications approved.
Denials: Without IT’s support, the business is finding alternative options, including SaaS applications, as they can be bought and used without IT’s input or knowledge.
Threats: Applications that have not been vetted by security or installed without their knowledge may present additional threats to the organization.
Access: Self-serve isn’t mature enough to support an applications catalog.
8: average number of applications entering the organization every 30 days
— Source: Zylo, SaaS Trends for Procurement, 2022
|
1. Design the service Collaborate with the business Identify the challenges and obstacles Gain consensus on priorities Design the service |
2. Design the catalog Determine catalog scope Create a process to build and maintain the catalog Define metrics for the request management process |
3. Build the catalog Determine descriptions for catalog items Create definitions for license types, workflows, and SLAs Create application portfolio Design catalog forms and workflows |
4. Market the service Create a roadmap Determine messaging Build a communications plan |
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
|
Communications Presentation
|
Application Portfolio
|
Visio Library
|
Nonstandard Request Assessment
|
Create a request management process and service catalog to improve delivery of technology to the business
Innovation is about people, not ideas or processes. Innovation does not require a formal process, a dedicated innovation team, or a large budget; the most important success factor for innovation is culture. Companies that facilitate innovative behaviors like growth mindset, collaboration, and taking smart risks are most likely to see the benefits of innovation.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
This storyboard includes three phases and nine activities that will help you define your purpose, align your people, and build your practice.
Use this template in conjunction with the activities in the main storyboard to create and communicate your innovation program. This template uses sample data from a fictional retailer, Acme Corp, to illustrate an ideal innovation program summary.
This job description can be used to hire your Chief Innovation Officer. There are many other job descriptions available on the Info-Tech website and referenced within the storyboard.
Use this framework to facilitate an ideation session with members of the business. Instructions for how to customize the information and facilitate each section is included within the deck.
This spreadsheet provides an analytical and transparent method to prioritize initiatives based on weighted criteria relevant to your business.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Define your innovation ambitions.
Gain a better understanding of why you are innovating and what your organization will gain from an innovation program.
1.1 Understand your innovation mandate.
1.2 Define your innovation ambitions.
1.3 Determine value proposition & metrics.
Complete the "Our purpose" section of the Innovation Program Template
Complete "Vision and guiding principles" section
Complete "Scope and value proposition" section
Success metrics
Build a culture, operating model, and team that support innovation.
Develop a plan to address culture gaps and identify and implement your operating model.
2.1 Foster a culture of innovation.
2.2 Define your operating model.
Complete "Building an innovative culture" section
Complete "Operating model" section
Create the capability to facilitate innovation.
Create a resourcing plan and prioritization templates to make your innovation program successful.
3.1 Build core innovation capabilities.
3.2 Develop prioritization criteria.
Team structure and resourcing requirements
Prioritization spreadsheet template
Finalize your program and complete the final deliverable.
Walk away with a complete plan for your innovation program.
4.1 Define your methodology to pilot projects.
4.2 Conduct a program retrospective.
Complete "Operating model" section in the template
Notable wins and goals
Many organizations stumble when implementing innovation programs. Innovation is challenging to get right, and even more challenging to sustain over the long term.
One of the common stumbling blocks we see comes from organizations focusing more on the ideas and the process than on the culture and the people needed to make innovation a way of life. However, the most successful innovators are the ones which have adopted a culture of innovation and reinforce innovative behaviors across their organization. Organizational cultures which promote growth mindset, trust, collaboration, learning, and a willingness to fail are much more likely to produce successful innovators.
This research is not just about culture, but culture is the starting point for innovation. My hope is that organizations will go beyond the processes and methodologies laid out here and use this research to dramatically improve their organization's performance.
Kim Osborne Rodriguez
Research Director, CIO Advisory
Info-Tech Research Group
As a leader in your organization, you need to:
In the past, you might have experienced one or more of the following:
This blueprint will help you:
There is no single right way to approach innovation. Begin with an understanding of your innovation ambitions, your existing culture, and the resources available to you, then adopt the innovation operating model that is best suited to your situation.
Note: This research is written for the individual who is leading the development of the innovation. This role is referred to as the Chief Innovation Officer (CINO) throughout this research but could be the CIO, CTO, IT director, or another business leader.
|
75% |
Three-quarters of companies say innovation is a top-three priority. |
|---|---|
|
30% |
But only 30% of executives say their organizations are doing it well. |
Based on a survey of 270 business leaders.
Source: Harvard Business Review, 2018
The most common challenges business leaders experience relate to people and culture. Success is based on people, not ideas.
Politics, turf wars, and a lack of alignment: territorial departments, competition for resources, and unclear roles are holding back the innovation efforts of 55% of respondents.
FIX IT
Senior leadership needs to be clear on the innovation goals and how business units are expected to contribute to them.
Cultural issues: many large companies have a culture that rewards operational excellence and disincentivizes risk. A history of failed innovation attempts may result in significant resistance to new change efforts.
FIX IT
Cultural change takes time. Ensure you are rewarding collaboration and risk-taking, and hire people with fresh new perspectives.
Inability to act on signals crucial to the future of the business: only 18% of respondents indicated their organization was unaware of disruptions, but 42% said they struggled with acting on leading indicators of change.
FIX IT
Build the ability to quickly run pilots or partner with startups and incubators to test out new ideas without lengthy review and approval processes.
Source: Harvard Business Review, 2018

1 Source: Boston Consulting Group, 2021
2 Source: Boston Consulting Group, 2019
3 Source: Harvard Business Review, 2018
Innovators are defined as companies that were listed on Fast Company World's 50 Most Innovative Companies for 2+ years.
A 25-year study by Business Development Canada and Statistics Canada showed that innovation was more important to business success than management, human resources, marketing, or finance.
INDUSTRY: Healthcare
SOURCE: Interview
This Info-Tech member is a nonprofit, community-based mental health organization located in the US. It serves about 25,000 patients per year in community, school, and clinic settings.
This organization takes its innovation culture very seriously and has developed methodologies to assess individual and team innovation readiness as well as innovation types, which it uses to determine everyone's role in the innovation process. These assessments look at knowledge of and trust in the organization, its innovation profile, and its openness to change. Innovation enthusiasts are involved early in the process when it's important to dream big, while more pragmatic perspectives are incorporated later to improve the final solution.
The organization has developed many innovative approaches to delivering healthcare. Notably, they have reimagined patient scheduling and reduced wait times to the extent that some patients can be seen the same day. They are also working to improve access to mental health care despite a shortage of professionals.
|
1. Define Your Purpose |
2. Align Your People |
3. Build Your Practice |
|
|---|---|---|---|
|
Phase Steps |
|
|
|
|
Phase Outcomes |
Understand where the mandate for innovation comes from, and what the drivers are for pursuing innovation. Define what innovation means to your organization, and set the vision, mission, and guiding principles. Articulate the value proposition and key metrics for measuring success. |
Understand what it takes to build an innovative culture, and what types of innovation structure are most suited to your innovation goals. Define an innovation methodology and build your core innovation capabilities and team. |
Gather ideas and understand how to assess and prioritize initiatives based on standardized metrics. Develop criteria for tracking and measuring the success of pilot projects and conduct a program retrospective. |
Innovation Operating Model
The operating model describes how the innovation program delivers value to the organization, including how the program is structured, the steps from idea generation to enterprise launch, and the methodologies used.
Examples: Innovation Hub, Grassroots Innovation.
Innovation Methodology
Methodologies describe the ways the operating model is carried out, and the approaches used in the innovation practice.
Examples: Design Thinking, Weighted Criteria Scoring
Chief Innovation Officer
This research is written for the person or team leading the innovation program – this might be a CINO, CIO, or other leader in the organization.
Innovation Team
The innovation team may vary depending on the operating model, but generally consists of the individuals involved in facilitating innovation across the organization. This may be, but does not have to be, a dedicated innovation department.
Innovation Program
The program for generating ideas, running pilot projects, and building a business case to implement across the enterprise.
Pilot Project
A way of testing and validating a specific concept in the real world through a minimum viable product or small-scale implementation. The pilot projects are part of the overall pilot program.
Innovation is about people, not ideas or processes
Innovation does not require a formal process, a dedicated innovation team, or a large budget; the most important success factor for innovation is culture. Companies that facilitate innovative behaviors like growth mindset, collaboration, and the ability to take smart risk are most likely to see the benefits of innovation.
Very few are doing innovation well
Only 30% of companies consider themselves innovative, and there's a good reason: innovation involves unknowns, risk, and failure – three situations that people and organizations typically do their best to avoid. Counter this by removing the barriers to innovation.
Culture is the greatest barrier to innovation
In a survey of 270 business leaders, the top three most common obstacles were politics, turf wars, and alignment; culture issues; and inability to act on signals crucial to the business (Harvard Business Review, 2018). If you don't have a supportive culture, your ability to innovate will be significantly reduced.
Innovation is a means to an end
It is not the end itself. Don't get caught up in innovation for the sake of innovation – make sure you are getting the benefits from your investments. Measurable success factors are critical for maintaining the long-term success of your innovation engine.
Tackle wicked problems
Innovative approaches are better at solving complex problems than traditional practices. Organizations that prioritize innovation during a crisis tend to outperform their peers by over 30% and improve their market position (McKinsey, 2020).
Innovate or die
Innovation is critical to business growth. A 25-year study showed that innovation was more important to business success than management, human resources, marketing, or finance (Statistics Canada, 2006).
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
Sample Job Descriptions and Organization Charts
Determine the skills, knowledge, and structure you need to make innovation happen.
Facilitate an ideation session with your staff to identify areas for innovation.
Initiative Prioritization Workbook
Evaluate ideas to identify those which are most likely to provide value.
Communicate how you plan to innovate with a report summarizing the outputs from this research.
US businesses spend over half a trillion dollars on innovation annually. What are they getting for it?
(1) based on BCG's 50 Most Innovative Companies 2022
30% | The most innovative companies outperform the market by 30%. |
“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”
“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”
“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”
“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
| Phase 0 | Phase 1 | Phase 2 | Phase 3 | Finish |
|---|---|---|---|---|
|
Call #1: Scope requirements, objectives, and your specific challenges. |
Call #2: Understand your mandate. Call #3: Innovation vision, guiding principles, value proposition, and scope. |
Call #4: Foster a culture of innovation. (Activity 2.1) Call #5: Define your methodology. (Activity 2.2) Call #6: Build core innovation capabilities. (Activity 2.3) |
Call #7: Build your ideation and pilot programs. (Activities 3.1 and 3.2) Call #8: Identify success metrics and notable wins. (Activity 3.3) |
Call #9: Summarize results and plan next steps. |
A GI is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
A typical GI is 8 to 12 calls over the course of three to six months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
| Session 1 | Session 2 | Session 3 | Session 4 |
Wrap Up |
|
|---|---|---|---|---|---|
|
Activities |
Define Your Ambitions |
Align Your People |
Develop Your Capabilities |
Build Your Program |
Next Steps and |
|
|
|
|
|
|
|
Deliverables |
|
|
|
|
|
Purpose |
People |
Practice |
|---|---|---|
|
|
|
This phase will walk you through the following activities:
This phase involves the following participants:
INDUSTRY: Transportation
SOURCE: Interview
ArcBest
ArcBest is a multibillion-dollar shipping and logistics company which leverages innovative technologies to provide reliable and integrated services to its customers.
An Innovative Culture Starts at the Top
ArcBest's innovative culture has buy-in and support from the highest level of the company. Michael Newcity, ArcBest's CEO, is dedicated to finding better ways of serving their customers and supports innovation across the company by dedicating funding and resources toward piloting and scaling new initiatives.
Having a clear purpose and mandate for innovation at all levels of the organization has resulted in extensive grassroots innovation and the development of a formalized innovation program.
Results
ArcBest has a legacy of innovation, going back to its early days when it developed a business intelligence solution before anything else existed on the market. It continues to innovate today and is now partnering with start-ups to further expand its innovation capabilities.
"We don't micromanage or process-manage incremental innovation. We hire really smart people who are inspired to create new things and we let them run – let them create – and we celebrate it.
Our dedication to innovation comes from the top – I am both the President and the Chief Innovation Officer, and innovation is one of my top priorities."
Michael Newcity
President and Chief Innovation Officer ArcBest
You can only influence what you can control.
Unless your mandate comes from the CEO or Board of Directors, driving enterprise-wide innovation is very difficult. If you do not have buy-in from senior business leaders, use lighthouse projects and a smaller innovation practice to prove the value of innovation before taking on enterprise innovation.
In order to execute on a mandate to build innovation, you don't just need buy-in. You need support in the form of resources and funding, as well as strong leadership who can influence culture and the authority to change policies and practices that inhibit innovation.
For more resources on building relationships in your organization, refer to Info-Tech's Become a Transformational CIO blueprint.
Innovation is often easier to recognize than define.
Align on a useful definition of innovation for your organization before you embark on a journey of becoming more innovative.
Innovation is the practice of developing new methods, products or services which provide value to an organization.
Practice
This does not have to be a formal process – innovation is a means to an end, not the end itself.
New
What does "new" mean to you?
Value
What does value mean to you? Look to your business strategy to understand what goals the organization is trying to achieve, then determine how "value" will be measured.
Some innovations are incremental, while some are radically transformative. Decide what kind of innovation you want to cultivate before developing your strategy.
Evaluate your goals with respect to innovation: focus, strategy, and potential to transform.
Focus: Where will you innovate?
Strategy: To what extent will you guide innovation efforts?
Potential: How radical will your innovations be?
Download the Innovation Program Template.
Input
Output
Materials
Participants
A strong vision statement:
Examples:
"Good business leaders create a vision, articulate the vision, passionately own the vision, and relentlessly drive it to completion." – Jack Welch, Former Chairman and CEO of GE
Strong guiding principles:
Encourage experimentation and risk-taking
Innovation often requires trying new things, even if they might fail. We encourage experimentation and learn from failure, so that new ideas can be tested and refined.
Foster collaboration and cross-functional teams
Innovation often comes from the intersection of different perspectives and skill sets.
Customer-centric
Focus on creating value for the end user. This means understanding their needs and pain points, and using that knowledge to develop new methods, products, or services.
Embrace diversity and inclusivity
Innovation comes from a variety of perspectives, backgrounds, and experiences. We actively seek out and encourage diversity and inclusivity among our team members.
Foster a culture of learning and continuous improvement
Innovation requires continuous learning, development, and growth. We facilitate a culture that encourages learning and development, and that seeks feedback and uses it to improve.
Flexible and adaptable
We adapt to changes in the market, customer needs, and new technologies, so that it can continue to innovate and create value over time.
Data-driven
We use performance metrics and data to guide our innovation efforts.
Transparency
We are open and transparent in our processes and let the business needs guide our innovation efforts. We do not lead innovation, we facilitate it.
Input
Output
Materials
Participants
A strong value proposition not only articulates the value that the business will derive from the innovation program but also provides a clear focus, helps to communicate the innovation goals, and ultimately drives the success of the program.
Focus
Prioritize and focus innovation efforts to create solutions that provide real value to the organization
Communicate
Communicate the mandate and benefits of innovation in a clear and compelling way and inspire people to think differently
Measure Success
Measure the success of your program by evaluating outcomes based on the value proposition
Your success metrics should link back to your organizational goals and your innovation program's value proposition.
Revenue Growth: Increase in revenue generated by new products or services.
Market Share: Percentage of total market that the business captures as a result of innovation.
Customer Satisfaction: Reviews, customer surveys, or willingness to recommend the company.
Employee Engagement: Engagement surveys, performance, employee retention, or turnover.
Innovation Output: The number of new products, services, or processes that have been developed.
Return on Investment: Financial return on the resources invested in the innovation process.
Social Impact: Number of people positively impacted, net reduction in emissions, etc.
Time to Launch: The time it takes for a new product or service to go from idea to launch.
The total impact of innovation is often intangible and extremely difficult to capture in performance metrics. Focus on developing a few key metrics rather than trying to capture the full value of innovation.
| Company | Industry | Revenue(2) (USD billions) |
R&D Spend (USD billions) |
R&D Spend (% of revenue) |
|---|---|---|---|---|
| Apple | Technology | $394.30 | $26.25 | 6.70% |
| Microsoft | Technology | $203.10 | $25.54 | 12.50% |
| Amazon.com | Retail | $502.20 | $67.71 | 13.40% |
| Alphabet | Technology | $282.10 | $37.94 | 13.40% |
| Tesla | Manufacturing | $74.90 | $3.01 | 4.00% |
| Samsung | Technology | $244.39 (2021)(3) | $19.0 (2021) | 7.90% |
| Moderna | Pharmaceuticals | $23.39 | $2.73 | 11.70% |
| Huawei | Technology | $99.9 (2021)4 | Not reported | - |
| Sony | Technology | $83.80 | Not reported | - |
| IBM | Technology | $60.50 | $1.61 | 2.70% |
| Meta | Software | $118.10 | $32.61 | 27.60% |
| Nike | Commercial goods | $49.10 | Not reported | - |
| Walmart | Retail | $600.10 | Not reported | - |
| Dell | Technology | $105.30 | $2.60 | 2.50% |
| Nvidia | Technology | $28.60 | $6.85 | 23.90% |
Innovation requires a dedicated investment of time, money, and resources in order to be successful. The most innovative companies, based on Boston Consulting Group's ranking of the 50 most innovative companies in the world, spend significant portions of their revenue on research and development.
Note: This data uses research and development as a proxy for innovation spending, which may overestimate the total spend on what this research considers true innovation.
(1) Based on Boston Consulting Group's ranking of the 50 most innovative companies in the world, 2022
(2) Macrotrends, based on the 12 months ending Sept 30, 2022
(3) Statista
(4) CNBC, 2022
Input
Output
Materials
Participants
Create a culture that fosters innovative behaviors and puts processes in place to support them.
Purpose | People | Practice |
|---|---|---|
|
|
|
This phase will walk you through the following activities:
This phase involves the following participants:
Info-Tech's Fix Your IT Culture can help you promote innovative behaviors
Refer to Improve IT Team Effectiveness to address team challenges
The following behaviors and key indicators either stifle or foster innovation.
| Stifles Innovation | Key Indicators | Fosters Innovation | Key Indicators |
|---|---|---|---|
| Fixed mindset | "It is what it is" | Growth mindset | "I wonder if there's a better way" |
| Performance focused | "It's working fine" | Learning focused | "What can we learn from this?" |
| Fear of reprisal | "I'll get in trouble" | Psychological safety | "I can disagree" |
| Apathy | "We've always done it this way" | Curiosity | "I wonder what would happen if…" |
| Cynicism | "It will never work" | Trust | "You have good judgement" |
| Punishing failure | "Who did this?" | Willingness to fail | "It's okay to make mistakes" |
| Individualism | "How does this benefit me?" | Collaboration | "How does this benefit us?" |
| Homogeneity | "We never disagree" | Diversity and inclusion | "We appreciate different views" |
| Excessive bureaucracy | "We need approval" | Autonomy | "I can do this" |
| Risk avoidance | "We can't try that" | Appropriate risk-taking | "How can we do this safely?" |
Ensure you are not inadvertently stifling innovation.
Review the following to ensure that the desired behaviors are promoted:
INDUSTRY: Commercial Real Estate and Retail
SOURCE: Interview
This anonymous national organization owned commercial properties across the country and had the goal of becoming the most innovative real estate and retail company in the market.
The organization pursued innovation in the digital solutions space across its commercial and retail properties. Within this space, there were significant differences in risk tolerance across teams, which resulted in the more risk-tolerant teams excluding the risk-averse members from discussions in order to circumvent corporate policies on risk tolerance. This resulted in an adversarial and siloed culture where each group believed they knew better than the other, and the more risk-averse teams felt like they were policing the actions of the risk-tolerant group.
Morale plummeted, and many of the organization's top people left. Unfortunately, one of the solutions did not meet regulatory requirements, and the company faced negative media coverage and legal action. There was significant reputational damage as a result.
Considering differences in risk tolerance and risk appetite is critical when pursuing innovation. While everyone doesn't have to agree, leadership needs to understand the different perspectives and ensure that no one party is dominating the conversation over the others. An understanding of corporate risk tolerance and risk appetite is necessary to drive innovation.
All perspectives have a place in innovation. More risk tolerant perspectives should be involved early in the ideas-generation phase, and risk-averse perspectives should be considered later when ideas are being refined.
Speed should not override safety or circumvent corporate policies.
It is more important to match the level of risk tolerance to the degree of innovation required. Not all innovation needs to be (or can feasibly be) disruptive.
Many factors impact risk tolerance including:
Use Info-Tech's Security Risk Management research to better understand risk tolerance
Input
Output
Materials
Participants
There is no one right way to pursue innovation, but some methods are better than others for specific situations and goals. Consider your existing culture, your innovation goals, and your budget when selecting the right methodology for your innovation.
| Model | Description | Advantages | Disadvantages | Good when… |
|---|---|---|---|---|
| Grassroots Innovation | Innovation is the responsibility of everyone, and there is no centralized innovation team. Ideas are piloted and scaled by the person/team which produces it. |
|
|
|
| Community of Practice | Innovation is led by a cross-divisional Community of Practice (CoP) which includes representation from across the business. Champions consult with their practice areas and bring ideas forward. |
|
|
|
| Innovation Enablement *Most often recommended* |
A dedicated innovation team with funding set aside to support pilots with a high degree of autonomy, with the role of facilitating business-led innovation. |
|
|
|
| Center of Excellence | Dedicated team responsible for leading innovation on behalf of the organization. Generally, has business relationship managers who gather ideas and liaise with the business. |
|
|
|
| Innovation Hub | An arm's length innovation team is responsible for all or much of the innovation and may not interact much with the core business. |
|
|
|
| Outsourced Innovation | Innovation is outsourced to an external organization which is not linked to the primary organization. This can take the form of working with or investing in startups. |
|
|
|
Adapted from Niklaus Gerber via Medium, 2022
For example, design thinking tends to be excellent for earlier innovation planning, while Agile can allow for faster implementation and launch of initiatives later in the process.
Consider combining two or more methodologies to create a custom approach that best suits your organization's capabilities and goals.
A robust innovation methodology ensures that the process for developing, prioritizing, selecting, implementing, and measuring initiatives is aligned with the results you are hoping to achieve.
Different types of problems (drivers for innovation) may necessitate different methodologies, or a combination of methodologies.
Hackathon: An event which brings people together to solve a well-defined problem.
Design Thinking: Creative approach that focuses on understanding the needs of users.
Lean Startup: Emphasizes rapid experimentation in order to validate business hypotheses.
Design Sprint: Five-day process for answering business questions via design, prototyping, and testing.
Agile: Iterative design process that emphasizes project management and retrospectives.
Three Horizons: Framework that looks at opportunities on three different time horizons.
Innovation Ambition Matrix: Helps organizations categorize projects as part of the core offering, an adjacent offering, or completely new.
Global Innovation Management: A process of identifying, developing and implementing new ideas, products, services, or processes using alternative thinking.
Blue Ocean Strategy: A methodology that helps organizations identify untapped market space and create new markets via unique value propositions.
Input
Output
Materials
Participants
Types of roles will depend on the purpose and size of the innovation team.
You don't need to grow them all internally. Consider partnering with vendors and other organizations to build capabilities.
Visionaries who inspire, support, and facilitate innovation across the business. Their responsibilities are to drive the culture of innovation.
Key skills and knowledge:
Sample titles:
Translate ideas into tangible business initiatives, including assisting with business cases and developing performance metrics.
Key skills and knowledge:
Sample titles:
Provide expertise in product design, delivery and management, and responsible for supporting and executing on pilot projects.
Key skills and knowledge:
Sample titles:
Visualize the whole value delivery process end-to-end to help identify the types of roles, resources, and capabilities required. These capabilities can be sourced internally (i.e. grow and hire internally) or through collaboration with centers of excellence, commercial partners, etc.
Input
Output
Materials
Participants
Master Organizational Change Management Practices
Purpose | People | Practice |
|---|---|---|
|
|
|
This phase will walk you through the following activities:
This phase involves the following participants:
INDUSTRY: Government
SOURCE: Interview
The business applications group at this government agency strongly believes that innovation is key to progress and has instituted a formal innovation program as part of their agile operations. The group uses a Scaled Agile Framework (SAFe) with 2-week sprints and a 12-week program cycle.
To support innovation across the business unit, the last sprint of each cycle is dedicated toward innovation and teams do not commit to any other during these two weeks. At the end of each innovation sprint, ideas are presented to leadership and the valuable ones were either implemented initially or were given time in the next cycle of sprints for further development. This has resulted in a more innovative culture across the practice.
There have been several successful innovations since this process began. Notably, the agency had previously purchased a robotic process automation platform which was only being used for a few specific applications. One team used their innovation sprint to expand the use cases for this solution and save nearly 10,000 hours of effort.

Your operating model should include several steps including ideation, validation, evaluation and prioritization, piloting, and a retrospective which follows the pilot. Use the example on this slide when designing your own innovation operating model.
Design Thinking
A structured approach that encourages participants to think creatively about the needs of the end user.
Ideation Workshop
A formal session that is used to understand a problem then generate potential solutions. Workshops can incorporate the other methodologies (such as brainstorming, design thinking, or mind mapping) to generate ideas.
Crowdsourcing
An informal method of gathering ideas from a large group of people. This can be a great way to generate many ideas but may lack focus.
Value Proposition Canvas
A visual tool which helps to identify customer (or user) needs and design products and services that meet those needs.
Evaluation should be transparent and use both quantitative and qualitative metrics. The exact metrics used will depend on your organization and goals.
It is important to include qualitative metrics as these dimensions are better suited to evaluating highly innovative ideas and can capture important criteria like alignment with overall strategy and feasibility.
Develop 5 to 10 criteria that you can use to evaluate and prioritize ideas. Some criteria may be a pass/fail (for example, minimum ROI) and some may be comparative.
Evaluate
The first step is to evaluate ideas to determine if they meet the minimum criteria. This might include quantitative criteria like ROI as well as qualitative criteria like strategic alignment and feasibility.
Prioritize
Ideas that pass the initial evaluation should be prioritized based on additional criteria which might include quantitative criteria such as potential market size and cost to implement, and qualitative criteria such as risk, impact, and creativity.
Quantitative metrics are objective and easily comparable between initiatives, providing a transparent and data-driven process for evaluation and prioritization.
Examples:
Qualitative metrics are less easily comparable but are equally important when it comes to evaluating ideas. These should be developed based on your organization strategy and innovation goals.
Examples:
Input
Output
Materials
Participants
Download the Initiative Prioritization Template
"Learning is as powerful as the outcome." – Brett Trelfa, CIO, Arkansas Blue Cross
Adoption: How many end users have adopted the pilot solution?
Utilization: Is the solution getting utilized?
Support Requests: How many support requests have there been since the pilot was initiated?
Value: Is the pilot delivering on the value that it proposed? For example, time savings.
Feasibility: Has the feasibility of the solution changed since it was first proposed?
Satisfaction: Focus groups or surveys can provide feedback on user/customer satisfaction.
A/B Testing: Compare different methods, products or services.
Ensure standard core metrics are used across all pilot projects so that outcomes can be compared. Additional metrics may be used to refine and test hypotheses through the pilot process.
Input
Output
Materials
Participants
A retrospective is a review of your innovation program with the aim of identifying lessons learned, areas for improvement, and opportunities for growth.
During a retrospective, the team will reflect on past experiences and use that information to inform future decision making and improve outcomes.
The goal of a retrospective is to learn from the past and use that knowledge to improve in the future.
Ensure that the retrospective is based on facts and objective data, rather than personal opinions or biases.
Ensure that the retrospective is a positive and constructive experience, with a focus on finding solutions rather than dwelling on problems.
The retrospective should result in a clear action plan with specific steps to improve future initiatives.
Input
Output
Materials
Participants
Adopt Design Thinking in Your Organization
Prototype With an Innovation Design Sprint
Fund Innovation With a Minimum Viable Business Case
You have now completed your innovation strategy, covering the following topics:
If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
Accelerate Digital Transformation With a Digital Factory
Sustain and Grow the Maturity of Innovation in Your Enterprise
Define Your Digital Business Strategy
Kim Osborne Rodriguez
Research Director, CIO Advisory
Info-Tech Research Group
Kim is a professional engineer and Registered Communications Distribution Designer with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach, with a track record of supporting successful projects.
Kim holds a Bachelor's degree in Mechatronics Engineering from University of Waterloo.
Joanne Lee
Principal Research Director, CIO Advisory
Info-Tech Research Group
Joanne is an executive with over 25 years of experience in digital technology and management consulting across both public and private entities from solution delivery to organizational redesign across Canada and globally.
Prior to joining Info-Tech Research Group, Joanne was a management consultant within KPMG's CIO management consulting services and the Western Canadas Digital Health Practice lead. She has held several executive roles in the industry with the most recent position as Chief Program Officer for a large $450M EHR implementation. Her expertise spans cloud strategy, organizational design, data and analytics, governance, process redesign, transformation, and PPM. She is passionate about connecting people, concepts, and capital.
Joanne holds a Master's in Business and Health Policy from the University of Toronto and a Bachelor of Science (Nursing) from the University of British Columbia.
Jack Hakimian
Senior Vice President
Info-Tech Research Group
Jack has more than 25 years of technology and management consulting experience. He has served multi-billion-dollar organizations in multiple industries including Financial Services and Telecommunications. Jack also served a number of large public sector institutions.
He is a frequent speaker and panelist at technology and innovation conferences and events and holds a Master's degree in Computer Engineering as well as an MBA from the ESCP-EAP European School of Management.
Michael Tweedie
Practice Lead, CIO Strategy
Info-Tech Research Group
Mike Tweedie brings over 25 years as a technology executive. He's led several large transformation projects across core infrastructure, application, and IT services as the head of Technology at ADP Canada. He was also the Head of Engineering and Service Offerings for a large French IT services firm, focused on cloud adoption and complex ERP deployment and management.
Mike holds a Bachelor's degree in Architecture from Ryerson University.
Mike Schembri
Senior Executive Advisor
Info-Tech Research Group
Mike is the former CIO of Fuji Xerox Australia and has 20+ years' experience serving IT and wider business leadership roles. Mike has led technical and broader business service operations teams to value and growth successfully in organizations ranging from small tech startups through global IT vendors, professional service firms, and manufacturers.
Mike has passion for strategy and leadership and loves working with individuals/teams and seeing them grow.
John Leidl
Senior Director, Member Services
Info-Tech Research Group
With over 35 years of IT experience, including senior-level VP Technology and CTO leadership positions, John has a breadth of knowledge in technology innovation, business alignment, IT operations, and business transformation. John's experience extends from start-ups to corporate enterprise and spans higher education, financial services, digital marketing, and arts/entertainment.
Joe Riley
Senior Workshop Director
Info-Tech Research Group
Joe ensures our members get the most value out of their Info-Tech memberships by scoping client needs, current state and desired business outcomes, and then drawing upon his extensive experience, certifications, and degrees (MBA, MS Ops/Org Mgt, BS Eng/Sci, ITIL, PMP, Security+, etc.) to facilitate our client's achievement of desired and aspirational business outcomes. A true advocate of ITSM, Joe approaches technology and technology practices as a tool and enabler of people, core business, and competitive advantage activities.
Denis Goulet
Senior Workshop Director
Info-Tech Research Group
Denis is a transformational leader and experienced strategist who has worked with 100+ organizations to develop their digital, technology, and governance strategies.
He has held positions as CIO, Chief Administrative Office (City Manager), General Manager, Vice President of Engineering, and Management Consultant, specializing in enterprise and technology strategy.
Cole Cioran
Managing Partner
Info-Tech Research Group
I knew I wanted to build great applications that would delight their users. I did that over and over. Along the way I also discovered that it takes great teams to deliver great applications. Technology only solves problems when people, processes, and organizations change as well. This helped me go from writing software to advising some of the largest organizations in the world on how to how to build a digital delivery umbrella of Product, Agile, and DevOps and create exceptional products and services powered by technology.
Carlene McCubbin
Research Lead, CIO Practice
Info-Tech Research Group
During her tenure at Info-Tech, Carlene has led the development of Info-Tech's Organization and Leadership practice and worked with multiple clients to leverage the methodologies by creating custom programs to fit each organization's needs.
Before joining Info-Tech, Carlene received her Master of Communications Management from McGill University, where she studied development of internal and external communications, government relations, and change management.
Isabelle Hertanto
Principal Research Director
Info-Tech Research Group
Isabelle Hertanto has over 15 years of experience delivering specialized IT services to the security and intelligence community. As a former federal officer for Public Safety Canada, Isabelle trained and led teams on data exploitation and digital surveillance operations in support of Canadian national security investigations. Since transitioning into the private sector, Isabelle has held senior management and consulting roles across a variety of industry sectors, including retail, construction, energy, healthcare, and the broader Canadian public sector.
Hans Eckman
Principal Research Director
Info-Tech Research Group
Hans Eckman is a business transformation leader helping organizations connect business strategy and innovation to operational excellence. He supports Info-Tech members in SDLC optimization, Agile and DevOps implementation, CoE/CoP creation, innovation program development, application delivery, and leadership development. Hans is based out of Atlanta, Georgia.
Valence Howden
Principal Research Director
Info-Tech Research Group
With 30 years of IT experience in the public and private sector, Valence has developed experience in many Information Management and Technology domains, with a particular focus in the areas of Service Management, Enterprise and IT Governance, Development and Execution of Strategy, Risk Management, Metrics Design and Process Design, and Implementation and Improvement. Prior to joining Info-Tech, he served in technical and client-facing roles at Bell Canada and CGI Group Inc., as well as managing the design, integration, and implementation of services and processes in the Ontario Public Sector.
Clayton Gillett
Managing Partner
Info-Tech Research Group
Clayton Gillett is a Managing Partner for Info-Tech, providing technology management advisory services to healthcare clients. Clayton joined Info-Tech with more than 28 years of experience in health care information technology. He has held senior IT leadership roles at Group Health Cooperative of Puget Sound and OCHIN, as well as advisory or consulting roles at ECG Management Consultants and Gartner.
Donna Bales
Principal Research Director
Info-Tech Research Group
Donna Bales is a Principal Research Director in the CIO Practice at Info-Tech Research Group specializing in research and advisory services in IT risk, governance, and compliance. She brings over 25 years of experience in strategic consulting and product development and has a history of success in leading complex, multi-stakeholder industry initiatives.
Igor Ikonnikov
Research Director
Info-Tech Research Group
Igor Ikonnikov is a Research and Advisory Director in the Data and Analytics practice. Igor has extensive experience in strategy formation and execution in the information management domain, including master data management, data governance, knowledge management, enterprise content management, big data, and analytics.
Igor has an MBA from the Ted Rogers School of Management (Toronto, Canada) with a specialization in Management of Technology and Innovation.
Michael Newcity
Chief Innovation Officer
ArcBest
Kevin Yoder
Vice President, Innovation
ArcBest
Gary Boyd
Vice President, Information Systems & Digital Transformation
Arkansas Blue Cross and Blue Shield
Brett Trelfa
Chief Information Officer
Arkansas Blue Cross and Blue Shield
Kristen Wilson-Jones
Chief Technology & Product Officer
Medcurio
Note: additional contributors did not wish to be identified
Altringer, Beth. "A New Model for Innovation in Big Companies" Harvard Business Review. 19 Nov. 2013. Accessed 30 Jan. 2023. https://hbr.org/2013/11/a-new-model-for-innovation-in-big-companies
Arpajian, Scott. "Five Reasons Why Innovation Fails" Forbes Magazine. 4 June 2019. Accessed 31 Jan. 2023. https://www.forbes.com/sites/forbestechcouncil/2019/06/04/five-reasons-why-innovation-fails/?sh=234e618914c6
Baldwin, John & Gellatly, Guy. "Innovation Capabilities: The Knowledge Capital Behind the Survival and Growth of Firms" Statistics Canada. Sept. 2006. Accessed 30 Jan. 2023. https://www.bdc.ca/fr/documents/other/innovation_capabilities_en.pdf
Bar Am, Jordan et al. "Innovation in a Crisis: Why it is More Critical Than Ever" McKinsey & Company, 17 June 2020. Accessed 12 Jan. 2023. <https://www.mckinsey.com/capabilities/strategy-and-corporate-finance/our-insights/innovation-in-a-crisis-why-it-is-more-critical-than-ever >
Boston Consulting Group, "Most Innovative Companies 2021" BCG, April 2021. Accessed 30 Jan. 2023. https://web-assets.bcg.com/d5/ef/ea7099b64b89860fd1aa3ec4ff34/bcg-most-innovative-companies-2021-apr-2021-r.pdf
Boston Consulting Group, "Most Innovative Companies 2022" BGC, 15 Sept. 2022. Accessed 6 Feb. 2023. https://www.bcg.com/en-ca/publications/2022/innovation-in-climate-and-sustainability-will-lead-to-green-growth
Christensen, Clayton M. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail. Harvard Business Review Press, 2016.
Gerber, Niklaus. "What is innovation? A beginner's guide into different models, terminologies and methodologies" Medium. 20 Sept 2022. Accessed 7 Feb. 2023. https://world.hey.com/niklaus/what-is-innovation-a-beginner-s-guide-into-different-models-terminologies-and-methodologies-dd4a3147
Google X, Homepage. Accessed 6 Feb. 2023. https://x.company/
Harnoss, Johann D. & Baeza, Ramón. "Overcoming the Four Big Barriers to Innovation Success" Boston Consulting Group, 24 Sept. 2019. Accessed 30 Jan 2023. https://www.bcg.com/en-ca/publications/2019/overcoming-four-big-barriers-to-innovation-success
Jaruzelski, Barry et al. "Global Innovation 1000 Study" Pricewaterhouse Cooper, 30 Oct. 2018. Accessed 13 Jan. 2023. <https://www.strategyand.pwc.com/gx/en/insights/innovation1000.html>
Kharpal, Arjun. "Huawei posts first-ever yearly revenue decline as U.S. sanctions continue to bite, but profit surges" CNBC. 28 March 2022. Accessed 7 Feb. 2023. https://www.cnbc.com/2022/03/28/huawei-annual-results-2021-revenue-declines-but-profit-surges.html
Kirsner, Scott. "The Biggest Obstacles to Innovation in Large Companies" Harvard Business Review, 30 July 2018. Accessed 12 Jan. 2023. <https://hbr.org/2018/07/the-biggest-obstacles-to-innovation-in-large-companies>
Macrotrends. "Apple Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/AAPL/apple/revenue
Macrotrends. "Microsoft Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/MSFT/microsoft/revenue
Macrotrends. "Amazon Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/AMZN/amazon/revenue
Macrotrends. "Alphabet Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/GOOG/alphabet/revenue
Macrotrends. "Tesla Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/TSLA/tesla/revenue
Macrotrends. "Moderna Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/MRNA/moderna/revenue
Macrotrends. "Sony Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/SONY/sony/revenue
Macrotrends. "IBM Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/IBM/ibm/revenue
Macrotrends. "Meta Platforms Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/META/meta-platforms/revenue
Macrotrends. "NIKE Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/NKE/nike/revenue
Macrotrends. "Walmart Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/WMT/walmart/revenue
Macrotrends. "Dell Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/DELL/dell/revenue
Macrotrends. "NVIDIA Revenue 2010-2022" Macrotrends. Accessed 23 Jan. 2023. https://www.macrotrends.net/stocks/charts/NVDA/nvidia/revenue
Sloan, Paul. "How to Develop a Vision for Innovation" Innovation Management, 10 Aug. 2009. Accessed 7 Feb. 2023. https://innovationmanagement.se/2009/08/10/how-to-develop-a-vision-for-innovation/
Statista. "Samsung Electronics' global revenue from 2005 to 2021" Statista. Accessed 7 Feb. 2023. https://www.statista.com/statistics/236607/global-revenue-of-samsung-electronics-since-2005/
Tichy, Noel & Ram Charan. "Speed, Simplicity, Self-Confidence: An Interview with Jack Welch" Harvard Business Review, 2 March 2020. Accessed 7 Feb. 2023. https://hbr.org/1989/09/speed-simplicity-self-confidence-an-interview-with-jack-welch
Weick, Karl and Kathleen Sutcliffe. Managing the Unexpected: Sustained Performance in a Complex World, Third Edition. John Wiley & Sons, 2015.
Xuan Tian, Tracy Yue Wang, Tolerance for Failure and Corporate Innovation, The Review of Financial Studies, Volume 27, Issue 1, 2014, Pages 211–255, Accessed https://doi.org/10.1093/rfs/hhr130
Organizations consider application oversight a low priority and app portfolio knowledge is poor:
Build an APM program that is actionable and fit for size:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Enterprises have more applications than they need and rarely apply oversight to monitor the health, cost, and relative value of applications to ensure efficiency and minimal risk. This blueprint will help you build a streamlined application portfolio management process.
Visibility into your application portfolio and APM practices will help inform and guide your next steps.
Capture your APM roles and responsibilities and build a repeatable process.
This tool is the central hub for the activities within Application Portfolio Management Foundations.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
Work with key corporate stakeholders to come to a shared understanding of the benefits and aspects of application portfolio management.
Establish the goals of APM.
Set the scope of APM responsibilities.
Establish business priorities for the application portfolio.
1.1 Define goals and metrics.
1.2 Define application categories.
1.3 Determine steps and roles.
1.4 Weight value drivers.
Set short- and long-term goals and metrics.
Set the scope for applications.
Set the scope for the APM process.
Defined business value drivers.
Gather information on your applications to build a detailed inventory and identify areas of redundancy.
Populated inventory based on your and your team’s current knowledge.
Understanding of outstanding data and a plan to collect it.
2.1 Populate inventory.
2.2 Assign business capabilities.
2.3 Review outstanding data.
Initial application inventory
List of areas of redundancy
Plan to collect outstanding data
Work with the application subject matter experts to collect and compile data points and determine the appropriate disposition for your apps.
Dispositions for individual applications
Application rationalization framework
3.1 Assess business value.
3.2 Assess end-user perspective.
3.3 Assess TCO.
3.4 Assess technical health.
3.5 Assess redundancies.
3.6 Determine dispositions.
Business value score for individual applications
End-user satisfaction scores for individual applications
TCO score for individual applications
Technical health scores for individual applications
Feature-level assessment of redundant applications
Assigned dispositions for individual applications
Work with application delivery specialists to determine the strategic plans for your apps and place these in your portfolio roadmap.
Prioritized initiatives
Initial application portfolio roadmap
Ongoing structure of APM
4.1 Prioritize initiatives
4.2 Populate roadmap.
4.3 Determine ongoing APM cadence.
4.4 Build APM action plan.
Prioritized new potential initiatives.
Built an initial portfolio roadmap.
Established an ongoing cadence of APM activities.
Built an action plan to complete APM activities.
Many lack visibility into their overall application portfolio, focusing instead on individual projects or application development. Inevitably, application sprawl creates process and data disparities, redundant applications, and duplication of resources and stands as a significant barrier to business agility and responsiveness. The shift from strategic investment to application maintenance creates an unnecessary constraint on innovation and value delivery.
With the rise and convenience of SAAS solutions, IT has an increasing need to discover and support all applications in the organization. Unmanaged and unsanctioned applications can lead to increased reputational risk. What you don’t know WILL hurt you.
You can outsource development, you can even outsource maintenance, but you cannot outsource accountability for the portfolio. Organizations need a holistic dashboard of application performance and dispositions to help guide and inform planning and investment discussions. Application portfolio management (APM) can’t tell you why something is broken or how to fix it, but it is an important tool to determine if an application’s value and performance are up to your standards and can help meet your future goals.
Hans Eckman
Principal Research Director
Info-Tech Research Group
Research Navigation
Managing your application portfolio is essential regardless of its size or whether your software is purchased or developed in house. Each organization must have some degree of application portfolio management to ensure that applications deliver value efficiently and that their risk or gradual decline in technical health is appropriately limited.
|
Your APM goals |
If this describes your primary goal(s) |
|
|
|
|
|
|
|
|
|
Your Challenge |
Common Obstacles |
Info-Tech’s Approach |
|
|
|
Modern software options have decreased the need for organizations to have robust in-house application management capabilities. Your applications’ future and governance of the portfolio still require a centralized IT oversight to ensure the best return on investment.
Source: National Small Business Association, 2019 |
Having more applications than an organization needs means unnecessarily high costs and additional burden on the teams who support the applications. Especially in the case of small enterprises, this is added pressure the IT team cannot afford. A poorly maintained portfolio will eventually hurt the business more than it hurts IT. Legacy systems, complex environments, or anything that leads to a portfolio that can’t adapt to changing business needs will eventually become a barrier to business growth and accomplishing objectives. Often the blame is put on the IT department. |
56%
of small businesses cited inflexible technology as a barrier to growth Source: Salesforce as quoted by Tech Republic, 2019 |
||||||||||||||
A hidden and inefficient application portfolio is the root cause of so many pains experienced by both IT and the business.
The benefits of APM
APM identifies areas where you can reduce core spending and reinvest in innovation initiatives.
Other benefits can include:
Application Inventory
The artifact that documents and informs the business of your application portfolio.
Application Rationalization
The process of collecting information and assessing your applications to determine recommended dispositions.
Application Alignment
The process of revealing application information through interviewing stakeholders and aligning to business capabilities.
Application Roadmap
The artifact that showcases the strategic directions for your applications over a given timeline.
The ongoing practice of:
Product Lifecycle Management
Align your product and service improvement and execution to enterprise strategy and value realization in three key areas: defining your products and services, aligning product/service owners, and developing your product vision.
Product Delivery Lifecycle (Agile DevOps)
Enhance business agility by leveraging an Agile mindset and continuously improving your delivery throughput, quality, value realization, and adaptive governance.
Application Portfolio Management
Transform your application portfolio into a cohesive service catalog aligned to your business capabilities by discovering, rationalizing, and modernizing your applications while improving application maintenance, management, and reuse.
Inefficiencies within your application portfolio are created by the gradual and non-strategic accumulation of applications.
You have more apps than you need.
Only 34% of software is rated as both IMPORTANT and EFFECTIVE by users.
|
Directionless portfolio of applications |
Info-Tech’s Five Lens Model |
Assigned dispositions for individual apps |
||||
|
Application Alignment |
Business Value |
Technical Health |
End-User Perspective |
Total Cost of Ownership (TCO) |
Maintain: Keep the application but adjust its support structure. Modernize: Create a new initiative to address an inadequacy. Consolidate: Create a new initiative to reduce duplicate functionality. Retire: Phase out the application. Disposition: The intended strategic direction or implied course of action for an application. |
|
How well do your apps support your core functions and teams? |
How well are your apps aligned to value delivery? |
Do your apps meet all IT quality standards and policies? |
How well do your apps meet your end users’ needs? |
What is the relative cost of ownership and operation of your apps? |
||
|
Application rationalization requires the collection of several data points that represent these perspectives and act as the criteria for determining a disposition for each of your applications. |
||||||
| Determine Scope and categories | Build your list of applications and capabilities | Score each application based on your values | Determine outcomes based on app scoring and support for capabilities | |||
|---|---|---|---|---|---|---|
|
1. Lay Your Foundations 1.1 Assess the state of your current application portfolio. 1.2 Determine narrative. 1.3 Define goals and metrics. 1.4 Define application categories. 1.5 Determine APM steps and roles (SIPOC). |
⇒ |
2. Improve Your Inventory 2.1 Populate your inventory. 2.2 Align to business capabilities. *Repeat |
⇒ |
3. Rationalize Your Apps 3.1 Assess business value. 3.2 Assess technical health. 3.3 Assess end-user perspective. 3.4 Assess total cost of ownership. *Repeat |
⇒ |
4. Populate Your Roadmap 4.1 Review APM Snapshot results. 4.2 Review APM Foundations results. 4.3 Determine dispositions. 4.4 Assess redundancies (optional). 4.5 Determine dispositions for redundant applications (optional). 4.6 Prioritize initiatives. 4.7 Determine ongoing cadence. *Repeat |
INDUSTRY: Retail
SOURCE: Deloitte, 2017
|
Supermarket Company The grocer was a smaller organization for the supermarket industry with a relatively low IT budget. While its portfolio consisted of a dozen applications, the organization still found it difficult to react to an evolving industry due to inflexible and overly complex legacy systems. The IT manager found himself in a scenario where he knew the applications well but had little awareness of the business processes they supported. Application maintenance was purely in keeping things operational, with little consideration for a future business strategy. As the business demanded more responsiveness to changes, the IT team needed to be able to react more efficiently and effectively while still securing the continuity of the business. The IT manager found success by introducing APM and gaining a better understanding of the business use and future needs for the applications. The organization started small but then increased the scope over time to produce and develop techniques to aid the business in meeting strategic goals with applications. Results The IT manager gained credibility and trust within the organization. The organization was able to build a plan to move away from the legacy systems and create a portfolio more responsive to the dynamic needs of an evolving marketplace. |
The application portfolio management initiative included the following components: Train teams and stakeholders on APM Model the core business processes Collect application inventory Assign APM responsibilities Start small, then grow |
|
1. Lay Your Foundations |
2. Improve Your Inventory |
3. Rationalize Your Apps |
4. Populate Your Roadmap |
|
|---|---|---|---|---|
|
Phase Activities |
1.1 Assess your current application portfolio 1.2 Determine narrative 1.3 Define goals and metrics 1.4 Define application categories 1.5 Determine APM steps and roles |
2.1 Populate your inventory 2.2 Align to business capabilities |
3.1 Assess business value 3.2 Assess technical health 3.3 Assess end-user perspective 3.4 Assess total cost of ownership |
4.1 Review APM Snapshot results 4.2 Review APM Foundations results 4.3 Determine dispositions 4.4 Assess redundancies (optional) 4.5 Determine dispositions for redundant applications (optional) 4.6 Prioritize initiatives 4.7 Determine ongoing APM cadence |
|
Phase Outcomes |
Work with the appropriate management stakeholders to:
|
Gather information on your own understanding of your applications to build a detailed inventory and identify areas of redundancy. |
Work with application subject matter experts to collect and compile data points and determine the appropriate disposition for your apps. |
Work with application delivery specialists to determine the strategic plans for your apps and place these in your portfolio roadmap. |
Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.
|
Application Portfolio Management Foundations Playbook |
Application Portfolio Management Snapshot and Foundations Tool |
|
This template allows you to capture your APM roles and responsibilities and build a repeatable process. |
This tool stores all relevant application information and allows you to assess your capability support, execute rationalization, and build a portfolio roadmap. |
|
|
Key deliverable:
Blueprint Storyboard
This is the PowerPoint document you are viewing now. Follow this guide to understand APM, learn how to use the tools, and build a repeatable APM process that will be captured in your playbook.
DIY Toolkit |
Guided Implementation |
Workshop |
Consulting |
| “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” | “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” | “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” | “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.” |
Diagnostics and consistent frameworks used throughout all four options
| Phase 1 | Phase 2 | Phase 3 | Phase 4 |
|---|---|---|---|
|
Call #1: Establish goals and foundations for your APM practice. |
Call #2: Initiate inventory and determine data requirements. |
Call #3: Initiate rationalization with group of applications. Call #4: Review result of first iteration and perform retrospective. |
Call #5: Initiate your roadmap and determine your ongoing APM practice. |
Note: The Guided Implementation will focus on a subset or group of applications depending on the state of your current APM inventory and available time. The goal is to use this first group to build your APM process and models to support your ongoing discovery, rationalization, and modernization efforts.
A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our right-sized best practices in your organization. A typical GI, using our materials, is 3 to 6 calls over the course of 1 to 3 months.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
1. Lay Your Foundations | 2. Improve Your Inventory | 3. Rationalize Your Apps | 4. Populate Your Roadmap | Post Workshop Steps | |
|---|---|---|---|---|---|
Activities | 1.1 Assess your current 1.2 Determine narrative 1.3 Define goals and metrics 1.4 Define application categories 1.5 Determine APM steps and roles | 2.1 Populate your inventory 2.2 Align to business capabilities | 3.1 Assess business value 3.2 Assess technical health 3.3 Assess end-user perspective 3.4 Assess total cost of ownership | 4.1 Review APM Snapshot results 4.2 Review APM Foundations results 4.3 Determine dispositions 4.4 Assess redundancies (optional) 4.5 Determine dispositions for redundant applications (optional) 4.6 Prioritize initiatives 4.7 Determine ongoing APM cadence |
|
Outcomes | Work with the appropriate management stakeholders to:
| Work with your applications team to:
| Work with the SMEs for a subset of applications to:
| Work with application delivery specialists to:
| Info-Tech analysts complete:
|
Note: The workshop will focus on a subset or group of applications depending on the state of your current APM inventory and available time. The goal is to use this first group to build your APM process and models to support your ongoing discovery, rationalization, and modernization efforts.
Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889
|
Outcomes |
1-Day Snapshot |
3-Day Snapshot and Foundations (Key Apps) |
4-Day Snapshot and Foundations (Pilot Area) |
|---|---|---|---|
|
APM Snapshot
|
✓ | ✓ | ✓ |
|
APM Foundations
|
✓ Establish APM practice with a small sample set of apps and capabilities. |
✓ Establish APM practice with a pilot group of apps and capabilities. |
|
APM Lead/Owner (Recommended) ☐ Applications Lead or the individual responsible for application portfolio management, along with any applications team members, if available Key Corporate Stakeholders Depending on size and structure, participants could include: ☐ Head of IT (CIO, CTO, IT Director, or IT Manager) ☐ Head of shared services (CFO, COO, VP HR, etc.) ☐ Compliance Officer, Steering Committee ☐ Company owner or CEO Application Subject Matter Experts Individuals who have familiarity with a specific subset of applications ☐ Business owners (product owners, Head of Business Function, power users) ☐ Support owners (Operations Manager, IT Technician) Delivery Leads ☐ Development Managers ☐ Solution Architects ☐ Project Managers |
1.Diagnostic
|
5. Foundations: Chart
|
|
2. Data Journey
|
6. App Comparison
|
|
3. Snapshot
|
7. Roadmap
|
|
4. Foundations: Results
|
|
Examples and explanations of these tools are located on the following slides and within the phases where they occur.
One of the primary purposes of application portfolio management is to get what we know and need to know on paper so we can share a common vision and understanding of our portfolio. This enables better discussions and decisions with your application owners and stakeholders.
|
|
TCO, compared relatively to business value, helps determine the practicality of a disposition and the urgency of any call to action. Application alignment is factored in when assessing redundancies and has a separate set of dispositions.
|
Phase 1 1.1 Assess Your Current Application Portfolio 1.2 Determine Narrative 1.3 Define Goals and Metrics 1.4 Define Application Categories 1.5 Determine APM Steps and Roles |
Phase 2 2.1 Populate Your Inventory 2.2 Align to Business Capabilities |
Phase 3 3.1 Assess Business Value 3.2 Assess Technical Health 3.3 Assess End-User Perspective 3.4 Assess Total Cost of Ownership |
Phase 4 4.1 Review APM Snapshot Results 4.2 Review APM Foundations Results 4.3 Determine Dispositions 4.4 Assess Redundancies (Optional) 4.5 Determine Dispositions for Redundant Applications (Optional) 4.6 Prioritize Initiatives 4.7 Determine Ongoing APM Cadence |
This phase involves the following participants:
Applications Lead
Key Corporate Stakeholders
Additional Resources
Building an APM process requires a proper understanding of the underlying business goals and objectives of your organization’s strategy. Effectively identifying these drivers is paramount to gaining buy-in and the approval for any changes you plan to make to your application portfolio.
After identifying these goals, you will need to ensure they are built into the foundations of your APM process.
“What is most critical?” but also “What must come first?”
|
Discover |
Improve |
Transform |
|---|---|---|
|
Collect Inventory Uncover Shadow IT Uncover Redundancies Anticipate Upgrades Predict Retirement |
Reduce Cost Increase Efficiency Reduce Applications Eliminate Redundancy Limit Risk |
Improve Architecture Modernize Enable Scalability Drive Business Growth Improve UX |
One of the primary purposes of application portfolio management is to get what we know and need to know on paper so we can share a common vision and understanding of our portfolio. This enables better discussions and decisions with your application owners and stakeholders.
Estimated time: 1 hour
Download the Application Portfolio Management Diagnostic Tool
| Input | Output |
|
|
| Materials | Participants |
|
|
|
|
|
|
|
|
Portfolio Governance |
Transformative Initiatives |
Event-Driven Rationalization |
|
Improves:
Impact on your rationalization framework:
|
Enables:
Impact on your rationalization framework:
|
Responds to:
Impact on your rationalization framework:
|
Different motivations will influence the appropriate approach to and urgency of APM or, specifically, rationalizing the portfolio. When rationalizing is directly related to enabling or in response to a broader initiative, you will need to create a more structured approach with a formal budget and resources.
Estimated time: 30 minutes-2 hours
Record the results in the APM Snapshot and Foundations Tool
| Input | Output |
|
|
| Materials | Participants |
|
|
|
Root Cause |
IT Pain Points |
Business Pain Points |
Business Goals |
Narrative |
Technical Objectives |
|---|---|---|---|---|---|
|
Sprawl Shadow IT/decentralized oversight Neglect over time Poor delivery processes |
Back-End Complexity Disparate Data/Apps Poor Architectural Fit Redundancy Maintenance Demand/ Low Maintainability Technical Debt Legacy, Aging, or Expiring Apps Security Vulnerabilities Unsatisfied Customers |
Hurdles to Growth/Change Poor Business Analytics Process Inefficiency Software Costs Business Continuity Risk Data Privacy Risk Data/IP Theft Risk Poor User Experience Low-Value Apps |
Scalability Flexibility/Agility Data-Driven Insights M&A Transition Business Unit Consolidation/ Centralization Process Improvement Process Modernization Cost Reduction Stability Customer Protection Security Employee Enablement Business Enablement Innovation |
Create Strategic Alignment Identify specific business capabilities that are incompatible with strategic initiatives. Reduce Application Intensity Highlight the capabilities that are encumbered due to functional overlaps and complexity. Reduce Software Costs Specific business capabilities come at an unnecessarily or disproportionately high cost. Mitigate Business Continuity Risk Specific business capabilities are at risk of interruption or stoppages due to unresolved back-end issues. Mitigate Security Risk Specific business capabilities are at risk due to unmitigated security vulnerabilities or breaches. Increase Satisfaction Applications Specific business capabilities are not achieving their optimal business value. |
Platform Standardization Platform Standardization Consolidation Data Harmonization Removal/Consolidation of Redundant Applications Legacy Modernization Application Upgrades Removal of Low-Value Applications |
Estimated time: 1 hour
Record the results in the APM Snapshot and Foundations Tool
| Input | Output |
|
|
| Materials | Participants |
|
|
|
Goals |
Metric |
Target |
||
|---|---|---|---|---|
|
Short Term |
Improve ability to inform the business |
Leading Indicators |
|
|
|
Improve ownership of applications |
|
|
||
|
Reduce costs of portfolio |
|
|
||
|
Long Term |
Migrate platform |
Lagging Indicators |
|
|
|
Improve overall satisfaction with portfolio |
|
|
||
|
Become more customer-centric |
|
|
|
Code: A body of code that's seen by developers as a single unit. |
|
Functionality: A group of functionality that business customers see as a single unit. |
|
|
Funding: An initiative that those with the money see as a single budget. |
|
| ?: What else? |
“Essentially applications are social constructions.”
Source: Martin Fowler
APM focuses on business applications.
“Software used by business users to perform a business function.”
Unfortunately, that definition is still quite vague.
|
1. Many individual items can be considered applications on their own or components within or associated with an application. |
2. Different categories of applications may be out of scope or handled differently within the activities and artifacts of APM. |
|
Different categories of applications may be out of scope or handled differently within the activities and artifacts of APM.
|
Apps can be categorized by generic categories
|
|
Apps can be categorized by bought vs. built or install types
|
|
|
Apps can be categorized by the application family
|
Apps can be categorized by the group managing them
|
|
Apps can be categorized by tiers
|
Set boundaries on what is an application or the individual unit that you’re making business decisions on. Also, determine which categories of applications are in scope and how they will be included in the activities and artifacts of APM. Use your product families defined in Deliver Digital Products at Scale to help define your application categories, groups, and boundaries.
Estimated time: 1 hour
Record the results in the APM Snapshot and Foundations Tool
| Input | Output |
|
|
| Materials | Participants |
|
|
|
Category |
Definition/Description |
Examples |
Documented in your application inventory? |
Included in application rationalization? |
Listed in your application portfolio roadmap? |
|
Business Application |
End-user facing applications that directly enable specific business functions. This includes enterprise-wide and business-function-specific applications. Separate modules will be considered a business application when appropriate. |
ERP system, CRM software, accounting software |
Yes |
Yes. Unless currently in dev. TCO of the parent application will be divided among child apps. |
Yes |
|
Software Components |
Back-end solutions are self-contained units that support business functions. |
ETL, middleware, operating systems |
No. Documentation in CMDB. These will be listed as a dependency in the application inventory. |
No. These will be linked to a business app and included in TCO estimates and tech health assessments. |
No |
|
Productivity Tools |
End-user-facing applications that enable standard communication of general document creation. |
MS Word, MS Excel, corporate email |
Yes |
No |
Yes |
|
End-User- Built Microsoft Tools |
Single instances of a Microsoft tool that the business has grown dependent on. |
Payroll Excel tool, Access databases |
No. Documentation in Business Tool Glossary. |
No | No |
|
Partner Applications |
Partners or third-party applications that the business has grown dependent on but are internally owned or managed. |
Supplier’s ERP portal, government portal |
No | No |
Yes |
|
Shadow IT |
Business-managed applications. |
Downloaded tools |
Yes |
Yes. However, just from a redundancy perspective. |
Yes |
|
Application Portfolio Manager
|
Business Owner
|
|
Support Owner
|
Project Portfolio Manager
|
Corner-of-the-Desk Approach
Dedicated Approach
Create the full list of applications and capture all necessary attributes.
Engage with appropriate SMEs and collect necessary data points for rationalization.
Apply rationalization framework and toolset to determine dispositions.
Present dispositions for validation and communicate any decisions or direction for applications.
Estimated time: 1-2 hours
Record the results in the APM Snapshot and Foundations Tool
| Input | Output |
|
|
| Materials | Participants |
|
|
|
Suppliers |
Inputs |
Process |
Outputs |
Customers |
|---|---|---|---|---|
|
|
Build Inventory Create the full list of applications and capture all necessary attributes. Resp: Applications Manager & IT team member |
|
|
|
|
Collect & Compile Engage with appropriate SMEs and collect necessary data points for rationalization. Resp: IT team member |
|
|
|
|
Assess & Recommend Apply rationalization framework and toolset to determine dispositions. Resp: Applications Manager |
|
|
|
|
Validate & Roadmap Present dispositions for validation and communicate any decisions or direction for applications. Resp: Applications Manager |
|
|
|
|
Project Intake Build business case for project request. Resp: Project Manager |
|
|
| Discovery | Rationalization | Disposition | Roadmap |
|---|---|---|---|
|
Enter your pilot inventory.
|
Score your pilot apps to refine your rationalization criteria and scoring.
|
Determine recommended disposition for each application.
|
Populate your application roadmap.
|
Phase 1 1.1 Assess Your Current Application Portfolio 1.2 Determine Narrative 1.3 Define Goals and Metrics 1.4 Define Application Categories 1.5 Determine APM Steps and Roles | Phase 2 2.1 Populate Your Inventory 2.2 Align to Business Capabilities | Phase 3 3.1 Assess Business Value 3.2 Assess Technical Health 3.3 Assess End-User Perspective 3.4 Assess Total Cost of Ownership | Phase 4 4.1 Review APM Snapshot Results 4.2 Review APM Foundations Results 4.3 Determine Dispositions 4.4 Assess Redundancies (Optional) 4.5 Determine Dispositions for Redundant Applications (Optional) 4.6 Prioritize Initiatives 4.7 Determine Ongoing APM Cadence |
This phase involves the following participants:
Additional Resources
Document Your Business Architecture
The more information you plan to capture, the larger the time and effort, especially as you move along toward advanced and strategic items. Capture the information most aligned to your objectives to make the most of your investment.
If you completed Deliver Digital Products at Scale, use your product families and products to help define your applications.
Learn more about automated application discovery:
High Application Satisfaction Starts With Discovering Your Application Inventory
Estimated time: 1-4 hours per group
Record the results in the APM Snapshot and Foundations Tool
| Input | Output |
|
|
| Materials | Participants |
|
|
For the purposes of an inventory, business capabilities help all stakeholders gain a sense of the functionality the application provides.
However, the true value of business capability comes with rationalization.
Upon linking all the organization’s applications to a standardized and consistent set of business capabilities, you can then group your applications based on similar, complementary, or overlapping functionality. In other words, find your redundancies and consolidation opportunities.
Important Consideration
Defining business capabilities and determining the full extent of redundancy is a challenging undertaking and often is a larger effort than APM all together.
Business capabilities should be defined according to the unique functions and language of your organization, at varying levels of granularity, and ideally including target-state capabilities that identify gaps in the future strategy.
This blueprint provides a simplified and generic list for the purpose of categorizing similar functionality. We strongly encourage exploring Document Your Business Architecture to help in the business capability defining process, especially when visibility into your portfolio and knowledge of redundancies is poor.
For a more detailed capability mapping, use the Application Portfolio Snapshot and the worksheets in your current workbook.
A business capability map (BCM) is an abstraction of business operations that helps describe what the enterprise does to achieve its vision, mission, and goals. Business capabilities are the building blocks of the enterprise. They are typically defined at varying levels of granularity and include target-state capabilities that identify gaps in the future strategy. These are the people, process, and tool units that deliver value to your teams and customers.
Info-Tech’s Industry Coverage and Reference Architectures give you a head start on producing a BCM fit for your organization. The visual to the left is an example of a reference architecture for the retail industry.
These are the foundational piece for our Application Portfolio Snapshot. By linking capabilities to your supporting applications, you can better visualize how the portfolio supports the organization at a single glance. More specifically, you can highlight how issues with the portfolio are impacting capability delivery.
Reminder: Best practices imply that business capabilities are methodologically defined by business stakeholders and business architects to capture the unique functions and language of your organization.
The approach laid out in this service is about applying minimal time and effort to make the case for proper investment into the best practices, which can include creating a tailored BCM. Start with a good enough example to produce a useful visual and generate a positive conversation toward resourcing and analyses.
We strongly encourage exploring Document Your Business Architecture and the Application Portfolio Snapshot to understand the thorough methods and tactics for BCM.
Having to address redundancy complicates the application rationalization process. There is no doubt that assessing applications in isolation is much easier and allows you to arrive at dispositions for your applications in a timelier manner.
Rationalization has two basic steps: first, collect and compile information, and second, analyze that information and determine a disposition for each application. When you don’t have redundancy, you can analyze an application and determine a disposition in isolation. When you do have redundancies, you need to collect information for multiple applications, likely across departments or lines of business, then perform a comparative analysis.
Most likely your approach will fall somewhere between the examples below and require a hybrid approach.
Benefits of a high-level application alignment:
Estimated time: 1-4 hours per grouping
The APM tool provides up to three different grouping comparisons to assess how well your applications are supporting your enterprise. Although business capabilities are important, identify your organizational perspectives to determine how well your portfolio supports these functions, departments, or value streams. Each grouping should be a consistent category, type, or arrangement of applications.
Record the results in the APM Snapshot and Foundations Tool
| Input | Output |
|
|
| Materials | Participants |
|
|
|
Capability, Department, or Function 1 |
Capability, Department, or Function 2 |
Capability, Department, or Function 3 |
Capability, Department, or Function 4 |
Capability, Department, or Function 5 |
Capability, Department, or Function 6 |
|
|---|---|---|---|---|---|---|
|
Application A |
x | |||||
|
Application B |
x | |||||
|
Application C |
x | |||||
|
Application D |
x | |||||
|
Application E |
x | x | ||||
|
Application F |
x | |||||
|
Application G |
x | |||||
|
Application H |
x | |||||
|
Application I |
x | |||||
|
Application J |
x |
In this example:
BC 1 is supported by App A
BC 2 is supported by App B
BC 3 is supported by Apps C & D
BCs 4 & 5 are supported by App E
BC 6 is supported by Apps F-G. BC 6 shows an example of potential redundancy and portfolio complexity.
The APM tool supports three different Snapshot groupings. Repeat this exercise for each grouping.
Phase 1 1.1 Assess Your Current Application Portfolio 1.2 Determine Narrative 1.3 Define Goals and Metrics 1.4 Define Application Categories 1.5 Determine APM Steps and Roles | Phase 2 2.1 Populate Your Inventory 2.2 Align to Business Capabilities | Phase 3 3.1 Assess Business Value 3.2 Assess Technical Health 3.3 Assess End-User Perspective 3.4 Assess Total Cost of Ownership | Phase 4 4.1 Review APM Snapshot Results 4.2 Review APM Foundations Results 4.3 Determine Dispositions 4.4 Assess Redundancies (Optional) 4.5 Determine Dispositions for Redundant Applications (Optional) 4.6 Prioritize Initiatives 4.7 Determine Ongoing APM Cadence |
This phase involves the following participants:
Additional Resources
Application Rationalization | Additional Information Sources | Ideal Stakeholders |
|---|---|---|
| Business Value
| |
| End User
| |
| TCO
| |
| Technical Health
| |
| Application Alignment
|
Disposition: The intended strategic direction or course of action for an application.
|
Directionless portfolio of applications |
Assigned dispositions for individual apps High-level examples: |
|---|---|
|
Maintain: Keep the application but adjust its support structure.
Modernize: Create a new project to address an inadequacy.
Consolidate: Create a new project to reduce duplicate functionality.
Retire: Phase out the application.
|
Directionless portfolio of applications | Info-Tech’s Five Lens Model | Assigned dispositions for individual apps | ||||
![]() | Application Alignment | Business Value | Technical Health | End-User Perspective | Total Cost of Ownership (TCO) | Maintain: Keep the application but adjust its support structure. Modernize: Create a new initiative to address an inadequacy. Consolidate: Create a new initiative to reduce duplicate functionality. Retire: Phase out the application. Disposition: The intended strategic direction or implied course of action for an application. |
How well do your apps support your core functions and teams? | How well are your apps aligned to value delivery? | Do your apps meet all IT quality standards and policies? | How well do your apps meet your end users’ needs? | What is the relative cost of ownership and operation of your apps? | ||
Application rationalization requires the collection of several data points that represent these perspectives and act as the criteria for determining a disposition for each of your applications. Disposition: The intended strategic direction or implied course of action for an application. | ||||||
| The Business | Business Value of Applications | IT |
|---|---|---|
| Keepers of the organization’s mission, vision, and value statements that define IT success. The business maintains the overall ownership and evaluation of the applications. | Technical subject matter experts of the applications they deliver and maintain. Each IT function works together to ensure quality applications are delivered to stakeholder expectations. |
First, the authorities on business value need to define and weigh their value drivers that describe the priorities of the organization.
This will then allow the applications team to apply a consistent, objective, and strategically aligned evaluation of applications across the organization.
In this context…business value is the value of the business outcome that the application produces and how effective the application is at producing that outcome.
Business value IS NOT the user’s experience or satisfaction with the application.
|
Financial vs. Human Benefits Financial benefits refer to the degree to which the value source can be measured through monetary metrics and are often quite tangible. Human benefits refer to how an application can deliver value through a user’s experience. Inward vs. Outward Orientation Inward orientation refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations. Outward orientation refers to value sources that come from your interaction with external factors, such as the market or your customers. |
|
|---|
|
Increased Revenue |
Reduced Costs |
Enhanced Services |
Reach Customers |
|---|---|---|---|
|
Application functions that are specifically related to the impact on your organization’s ability to generate revenue and deliver value to your customers. |
Reduction of overhead. The ways in which an application limits the operational costs of business functions. |
Functions that enable business capabilities that improve the organization’s ability to perform its internal operations. |
Application functions that enable and improve the interaction with customers or produce market information and insights. |
Record the results in the APM Snapshot and Foundations Tool
| Input | Output |
|
|
| Materials | Participants |
|
|
For additional support in implementing a balanced value framework, refer to Build a Value Measurement Framework.
MAINTAINABILITY (RAS)
RAS refers to an app’s reliability, availability, and serviceability. How often, how long, and how difficult is it for your resources to keep an app functioning, and what are the resulting continuity risks? This can include root causes of maintenance challenges.
SECURITY
Applications should be aligned and compliant with ALL security policies. Are there vulnerabilities or is there a history of security incidents? Remember that threats are often internal and non-malicious.
ADAPTABILITY
How easily can the app be enhanced or scaled to meet changes in business needs? Does the app fit within the business strategy?
INTEROPERABILITY
The degree to which an app is integrated with current systems. Apps require comprehensive technical planning and oversight to ensure they connect within the greater application architecture. Does the app fit within your enterprise architecture strategy?
BUSINESS CONTINUITY/DISASTER RECOVERY
The degree to which the application is compatible with business continuity/disaster recovery (BC/DR) policies and plans that are routinely tested and verified.
Unfortunately, the business only cares about what they can see or experience. Rationalization is your opportunity to get risk on the business’ radar and gain buy-in for the necessary action.
Estimated time: 1-4 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the APM Snapshot and Foundations Tool
Data Quality
To what degree do the end users find the data quality sufficient to perform their role and achieve their desired outcome?
Effectiveness
To what degree do the end users find the application effective for performing their role and desired outcome?
Usability
To what degree do the end users find the application reliable and easy to use to achieve their desired outcome?
Satisfaction
To what degree are end users satisfied with the features of this application?
What else matters to you?
Tune your criteria to match your values and priorities.
When facing large user groups, do not make assumptions or use lengthy methods of collecting information. Use Info-Tech’s Application Portfolio Assessment to collect data by surveying your end users’ perspectives.
Estimated time: 1-4 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the APM Snapshot and Foundations Tool
LICENSING AND SUBSCRIPTIONS: Your recurring payments to a vendor.
Many commercial off-the-shelf applications require a license on a per-user basis. Review contracts and determine costs by looking at per-user or fixed rates charged by the vendor.
MAINTENANCE COSTS: Your internal spending to maintain an app.
These are the additional costs to maintain an application such as support agreements, annual maintenance fees, or additional software or hosting expenses.
INDIRECT COSTS: Miscellaneous expenses necessary for an app’s continued use.
Expenses like end-user training, developer education, and admin are often neglected, but they are very real costs organizations pay regularly.
RETURN ON INVESTMENT: Perceived value of the application related to its TCO.
Some of our most valuable applications are the most expensive. ROI is an optional criterion to account for the value and importance of the application.
The TCO assessment is one area where what you are considering the ”application” matters quite a bit. An application’s peripherals or software components need to be considered in your estimates. For additional help calculating TCO, use the Application TCO Calculator from Build a Rationalization Framework.
Estimated time: 1-4 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the APM Snapshot and Foundations Tool
Phase 1 1.1 Assess Your Current Application Portfolio 1.2 Determine Narrative 1.3 Define Goals and Metrics 1.4 Define Application Categories 1.5 Determine APM Steps and Roles | Phase 2 2.1 Populate Your Inventory 2.2 Align to Business Capabilities | Phase 3 3.1 Assess Business Value 3.2 Assess Technical Health 3.3 Assess End-User Perspective 3.4 Assess Total Cost of Ownership | Phase 4 4.1 Review APM Snapshot Results 4.2 Review APM Foundations Results 4.3 Determine Dispositions 4.4 Assess Redundancies (Optional) 4.5 Determine Dispositions for Redundant Applications (Optional) 4.6 Prioritize Initiatives 4.7 Determine Ongoing APM Cadence |
his phase involves the following participants:
Additional Resources
Estimated time: 1-2 hours
| Input | Output |
|
|
Materials | Participants |
|
|
Record the results in the APM Snapshot and Foundations Tool
Estimated time: 1-2 hours
The APM Foundations Results dashboard (“App Rationalization Results” worksheet) provides a detailed summary of your relative app scoring to serve as input to demand planning.
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the APM Snapshot and Foundations Tool
|
|
TCO, compared relatively to business value, helps determine the practicality of a disposition and the urgency of any call to action. Application alignment is factored in when assessing redundancies and has a separate set of dispositions.
Estimated time: 1-4 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the APM Snapshot and Foundations Tool
Solving application redundancy is a lot more complicated than simply keeping one application and eliminating the others.
First, you need to understand the extent of the redundancy. The applications may support the same capability, but do they offer the same functions? Determine which apps offer which functions within a capability. This means you cannot accurately arrive at a disposition until you have evaluated all applications.
Next, you need to isolate the preferred system. This is completed by comparing the same data points collected for rationalization and the application alignment analysis. Cost and coverage of all necessary functions become the more important factors in this decision-making process.
Lastly, for the non-preferred redundant applications you need to determine: What will you do with the users? What will you do with the data? And what can you do with the functionality (can the actual coding be merged onto a common platform)?
|
Disposition |
Description & Additional Analysis |
Call to Action (Priority) |
|---|---|---|
|
Keep & Absorb Higher value, health satisfaction, and cost than alternatives |
These are the preferred apps to be kept. However, additional efforts are still required to migrate new users and data and potentially configure the app to new processes. |
Application or Process Initiative (Moderate) |
|
Shift & Retire Lower value, health satisfaction, and cost than alternatives |
These apps will be decommissioned alongside efforts to migrate users and data to the preferred system. *Confirm there are no unique and necessary features. |
Process Initiative & Decommission (Moderate) |
|
Merge Lower value, health satisfaction, and cost than alternatives but still has some necessary unique features |
These apps will be merged with the preferred system onto a common platform. *Determine the unique and necessary features. *Determine if the multiple applications are compatible for consolidation. |
Application Initiative (Moderate) |
Estimated rime: 1 hour per group
This exercise is best performed after aligning business capabilities to applications across the portfolio and identifying your areas of redundancy. At this stage, this is still an information collection exercise, and it will not yield a consolidation-based disposition until applied to all relevant applications. Lastly, this exercise may still be at too high a level to outline the full details of redundancy, but it is still vital information to collect and a starting point to determine which areas require more concentrated analysis.
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the APM Snapshot and Foundations Tool
|
Account Management |
Call Management |
Order/Transaction Processing |
Contract Management |
Lead/Opportunity Management |
Forecasting/Planning |
Customer Surveying |
Email Synchronization |
|
|---|---|---|---|---|---|---|---|---|
| M | M | M | M | S | S | C | W | |
|
CRM 1 |
✓ |
✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |
|
CRM 2 |
✓ | ✓ | ✓ | ✓ | ||||
|
CRM 3 |
✓ | ✓ | ✓ |
Estimated time: 1 hour per group
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the APM Snapshot and Foundations Tool
Roadmaps are used for different communication purposes and at varying points in your application delivery practice. Some use a roadmap to showcase strategy and act as a feedback mechanism that allows stakeholders to validate any changes (process 1). Others may use it to illustrate and communicate approved and granular elements of a change to an application to inform appropriate stakeholders of what to anticipate (process 2).
|
Select Dispositions & Identify New Initiatives |
Add to Roadmap |
Validate Direction |
Plan Project |
Execute Project |
|
Select Dispositions & Identify New Initiatives |
|
Approve Project |
Add to Roadmap |
Execute Project |
The steps between selecting a disposition and executing on any resulting project will vary based on the organization’s project intake standards (or lack thereof).
This blueprint focuses on building a strategic portfolio roadmap prior to any in-depth assessments related to initiative/project intake, approval, and prioritization. For in-depth support related to intake, approval, prioritization, or planning, review the following resources.
|
|
A roadmap should not be limited to what is approved or committed to. A roadmap should be used to present the items that need to happen and begin the discussion of how or if this can be put into place. However, not every idea should make the cut and end up in front of key stakeholders.
Estimated time: 1-4 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the APM Snapshot and Foundations Tool
Info-Tech’s Build an Application Rationalization Framework provides additional TCO and value tools to help build out your portfolio strategy.
| Determine scope and categories | Build your list of applications and capabilities | Score each application based on your values | Determine outcomes based on app scoring and support for capabilities |
|---|---|---|---|
|
1. Lay Your Foundations
|
2. Improve Your Inventory
|
3. Rationalize Your Apps
|
4. Populate Your Roadmap
|
Repeat according to APM cadence and application changes
Estimated time: 1-2 hours
| Input | Output |
|
|
| Materials | Participants |
|
|
Record the results in the APM Snapshot and Foundations Tool
Artifact | Owner | Update Cadence | Update Scope | Audience | Presentation Cadence |
|---|---|---|---|---|---|
Inventory | Greg Dawson |
|
|
|
|
Rationalization Tool | Judy Ng |
|
|
|
|
Portfolio Roadmap | Judy Ng |
|
|
|
|
Worksheet Data Mapping | Application and Capability List | Group Alignment Matrix (1-3) | Rationalization Inputs | Group 1-3 Results | Application Inventory Details | App Rationalization Results | Roadmap | App Redundancy Comparison |
|---|---|---|---|---|---|---|---|---|
Application and Capability List | App list, Groupings | App list | App list, Groupings | App list, Categories | App list, Categories | App list | App list | |
Groups 1-3 Alignment Matrix | App to Group Tracing | |||||||
Application Categories | Category | Category | Category | |||||
Rationalization Inputs | Lens Scores (weighted input to Group score) | Lens Scores (weighted input) | ||||||
Disposition Options | Disposition list, Priorities list, Recommended Disposition and Priority | Lens Scores (weighted input) | ||||||
App Rationalization Results | Disposition |
| Attribute | Description | Common Collection Method |
|---|---|---|
| Name | Organization’s terminology used for the application. | Auto-discovery tools will provide names for the applications they reveal. However, this may not be the organizational nomenclature. You may adapt the names by leveraging pre-existing documentation and internal knowledge or by consulting business users. |
| ID | Unique identifiers assigned to the application (e.g. app number). | Typically an identification system developed by the application portfolio manager. |
| Description | A brief description of the application, often referencing core capabilities. | Typically completed by leveraging pre-existing documentation and internal knowledge or by consulting business users. |
| Business Units | A list of all business units, departments, or user groups. | Consultation, surveys, or interviews with business unit representatives. However, this doesn’t always expose hidden applications. Application-capability mapping is the most effective way to determine all the business units/user groups of an app. |
| Business Capabilities | A list of business capabilities the application is intended to enable. | Application capability mapping completed via interviews with business unit representatives. |
| Criticality | A high-level grading of the importance of the application to the business, typically used for support prioritization purposes (i.e. critical, high, medium, low). | Typically the criticality rating is determined by a committee representing IT and business leaders. |
| Ownership | The individual accountable for various aspect of the application (e.g. product owner, product manager, application support, data owner); typically includes contact information and alternatives. | If application ownership is an established accountability in your organization, typically consulting appropriate business stakeholders will reveal this information. Otherwise, application capability mapping can be an effective means of identifying who that owner should be. |
| Application SMEs | Any relevant subject matter experts who can speak to various aspects of the application (e.g. business process owners, development managers, data architects, data stewards, application architects, enterprise architects). | Technical SMEs should be known within an IT department, but shadow IT apps may require interviews with the business unit. Application capability mapping will determine the identity of those key users/business process SMEs. |
| Type | An indication of whether the application was developed in-house, commercial off-the-shelf, or a hybrid option. | Consultation, surveys, or interviews with product owners or development managers. |
| Active Status | An indication of whether the application is currently active, out of commission, in repair, etc. | Consultation, surveys, or interviews with product owners or operation managers. |
| Attribute | Description | Common Collection Method |
|---|---|---|
| Vendor Information | Identification of the vendor from whom the software was procured. May include additional items such as the vendor’s contact information. | Consultation with business SMEs, end users, or procurement teams, or review of vendor contracts or license agreements. |
| Links to Other Documentation | Pertinent information regarding the other relevant documentation of the application (e.g. SLA, vendor contracts, data use policies, disaster recovery plan). Typically includes links to documents. | Consultation with product owners, service providers, or SMEs, or review of vendor contracts or license agreements. |
| Number of Users | The current number of users for the application. This can be based on license information but will often require some estimation. Can include additional items of quantities at different levels of access (e.g. admin, key users, power users). | Consultation, surveys, or interviews with product owners or appropriate business SMEs or review of vendor contracts or license agreements. Auto-discovery tools can reveal this information. |
| Software Dependencies | List of other applications or operating components required to run the application. | Consultation with application architects and any architectural tools or documentation. This information can begin to reveal itself through application capability mapping. |
| Hardware Dependencies | Identification of any hardware or infrastructure components required to run the application (i.e. databases, platform). | Consultation with infrastructure or enterprise architects and any architectural tools or documentation. This information can begin to reveal itself through application capability mapping. |
| Development Language | Coding language used for the application. | Consultation, surveys, or interviews with development managers or appropriate technical SMEs. |
| Platform | A framework of services that application programs rely on for standard operations. | Consultation, surveys, or interviews with infrastructure or development managers. |
| Lifecycle Stage | Where an application is within the birth, growth, mature, end-of-life lifecycle. | Consultation with business owners and technical SMEs. |
| Scheduled Updates | Any major or minor updates related to the application, including the release date. | Consultation with business owners and vendor managers. |
| Planned or In-Flight Projects | Any projects related to the application, including estimated project timeline. | Consultation with business owners and project managers. |
”2019 Technology & Small Business Survey.” National Small Business Association (NSBA), n.d. Accessed 1 April 2020.
“Application Rationalization – Essential Part of the Process for Modernization and Operational Efficiency.” Flexera, 2015. Web.
“Applications Rationalization during M&A: Standardize, Streamline, Simplify.” Deloitte Consulting, 2016. Web.
Bowling, Alan. “Clearer Visibility of Product Roadmaps Improves IT Planning.” ComputerWeekly.com, 1 Nov. 2010. Web.
Brown, Alex. “Calculating Business Value.” Agile 2014 Orlando, 13 July 2014. Scrum Inc. 2014. Web.
Brown, Roger. “Defining Business Value.” Scrum Gathering San Diego 2017. Agile Coach Journal. Web.
“Business Application Definition.” Microsoft Docs, 18 July 2012. Web.
“Connecting Small Businesses in the US.” Deloitte Consulting, 2017. Accessed 1 April. 2020.
Craveiro, João. “Marty meets Martin: connecting the two triads of Product Management.” Product Coalition, 18 Nov. 2017. Web.
Curtis, Bill. “The Business Value of Application Internal Quality.” CAST, 6 April 2009. Web.
Fleet, Neville, Joan Lasselle, and Paul Zimmerman. “Using a Balance Scorecard to Measure the Productivity and Value of Technical Documentation Organizations.” CIDM, April 2008. Web.
Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Web.
Harris, Michael. “Measuring the Business Value of IT.” David Consulting Group, 2007. Web.
“How Application Rationalization Contributes to the Bottom Line.” LeanIX, 2017. Web.
Jayanthi, Aruna. “Application Landscape Report 2014.” Capgemini, 4 March 2014. Web.
Lankhorst, Marc., et al. “Architecture-Based IT Valuation.” Via Nova Architectura, 31 March 2010. Web.
“Management of business application.” ServiceNow, Jan.2020. Accessed 1 April 2020.
Mauboussin, Michael J. “The True Measures of Success.” HBR, Oct. 2012. Web.
Neogi, Sombit., et al. “Next Generation Application Portfolio Rationalization.” TATA, 2011. Web.
Riverbed. “Measuring the Business Impact of IT Through Application Performance.” CIO Summits, 2015. Web.
Rouse, Margaret. “Application Rationalization.” TechTarget, March 2016. Web.
Van Ramshorst, E.A. “Application Portfolio Management from an Enterprise Architecture Perspective.” Universiteit Utrecht, July 2013.
“What is a Balanced Scorecard?” Intrafocus, n.d. Web.
Whitney, Lance. “SMBs share their biggest constraints and great challenges.” Tech Republic, 6 May 2019. Web.
You have made significant investments in availability and disaster recovery – but your ability to recover hasn’t been tested in years. Testing will:
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Use this research to understand the different types of tests, prioritize and plan tests for your organization, review the results, and establish a cadence for testing.
Use this template to document scope and goals, participants, key pre-test milestones, the test-day schedule, and your findings from the testing exercise.
Identify the tests you will run over the next year and the expertise, governance, process, and funding required to support testing.
[infographic]

Most businesses make significant investments in disaster recovery and technology resilience. Redundant sites and systems, monitoring, intrusion prevention, backups, training, documentation: it all costs time and money.
But does this investment deliver expected value? Specifically, can you deliver service continuity in a way that meets business requirements?
You can’t know the answer without regularly testing recovery processes and systems. And more than just validation, testing helps you deliver service continuity by finding and addressing gaps in your plans and training your staff on recovery procedures.
Use the insights, tools, and templates in this research to create a streamlined and effective resilience testing program that helps validate recovery capabilities and enhance service reliability, availability, and continuity.
Research Director, Infrastructure & Operations
Info-Tech Research Group
Your ChallengeYou have made significant investments in availability and disaster recovery (DR) – but your ability to recover hasn’t been tested in years. Testing will:
|
Common ObstaclesDespite the value testing can offer, actually executing on DR tests is difficult because:
|
Info-Tech's ApproachTake a realistic approach to resilience testing by starting with small, low-risk tests, then iterating with the lessons you’ve learned:
|
If you treat testing as a pass/fail exercise, you aren’t meeting the end goal of improving organizational resilience. Focus on identifying gaps and risks so you can address them before a real disaster hits.
This research is accompanied by templates to help you achieve your goals faster.
1 - Establish the business rationale for DR testing.
2 - Review a range of options for testing.
3 - Prioritize tests that are most valuable to your business.
4 - Create a disaster recovery test plan.
5 - Establish a Test Program to support a regular testing cycle.
Orange activity slides like the one on the left provide directions to help you make key decisions.
Disaster Recovery Test Plan Template
Build a plan for your first disaster recovery test.
This document provides a complete example you can use to quickly build your own plan, including goals, milestones, participants, the test-day schedule, and findings from the after-action review.
“Routine testing is vital to survive a disaster… that’s when muscle memory sets in. If you don’t test your DR plan it falls [in importance], and you never see how routine changes impact it.”
– Jennifer Goshorn
Chief Administrative Officer
Gunderson Dettmer LLP
Info-Tech members estimated even one day of system downtime could lead to significant revenue losses. 
Average estimated potential loss* in thousands of USD due to a 24-hour outage (N=41)
*Data aggregated from 41 business impact analyses (BIAs) conducted with Info-Tech advisory assistance. BIAs evaluate potential revenue loss due to a full day of system downtime, at the worst possible time.

30 minutes
Identify a group of participants who can fill the following roles and inform the discussions around testing in this research. A single person could fill multiple roles and some roles could be filled by multiple people. Many participants will be drawn from the larger DRP team.
Input
|
Output
|
Participants
|
Use Info-Tech’s Create a Right-Sized Disaster Recovery Plan research to identify recovery objectives based on business impact and outline recovery processes. Both are tremendously valuable inputs to your test plans.
IT Disaster Recovery PlanA plan to restore IT services (e.g. applications and infrastructure) following a disruption. A DRP:
|
BCP for Each Business UnitA set of plans to resume business processes for each business unit. A business continuity plan (BCP) is also sometimes called a continuity of operations plan (COOP). BCPs are created and owned by each business unit, and creating a BCP requires deep involvement from the leadership of each business unit. Info-Tech’s Develop a Business Continuity Plan blueprint provides a methodology for creating business unit BCPs as part of an overall BCP for the organization. |
Crisis Management PlanA plan to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage. Info-Tech’s Implement Crisis Management Best Practices blueprint provides a framework for planning a response to any crisis, from health and safety incidents to reputational damage. |
15-30 minutes
Identify the value recovery testing for your organization. Use language appropriate for a nontechnical audience. Start with the list below and add, modify, or delete bullet points to reflect your own organization.
Drivers for testing – Examples:
Time-strapped technical staff will sometimes push back on planning and testing, objecting that the team will “figure it out” in a disaster. But the question isn’t whether recovery is possible – it’s whether the recovery aligns with business needs. If your plan is to “MacGyver” a solution on the fly, you can’t know if it’s the right solution for your organization.
Input
|
Output
|
Participants
|

In a tabletop planning exercise, the team walks through a disaster scenario to outline the recovery workflow, and risks or gaps that could disrupt that workflow.
Tabletops are particularly effective because:
2 hours
Tabletop testing is part of our core DRP methodology, Create a Right-Sized Disaster Recovery Plan. This exercise can be run using cue cards, sticky notes, or on a whiteboard; many of our facilitators find building the workflow directly in flowchart software to be very effective.
Use our Recovery Workflow Template as a starting point.
Some tips for running your first tabletop exercise:
Do
|
Don't
|
Input
|
Output
|
Participants
|
In live exercises, some portion of your recovery plans are executed in a way that mimics a real recovery scenario. Some advantages of live testing:
| Boot and smoke test | Turn on a standby system and confirm it boots up correctly. |
| Restore and validate data | Restore data or servers from backup. Confirm data integrity. |
| Parallel testing | Send familiar transactions to production and standby systems. Confirm both systems produce the same result. |
| Failover systems | Shut down the production system and use the standby system in production. |
Most unacceptable downtime is caused by localized issues, such as hardware or software failures, rather than widespread destructive events. Regular local testing can help validate the recovery plan for local issues and improve overall service continuity.
Make local testing a standard step in maintenance work and new deployments to embed resilience considerations in day-to-day activities. Run the same tests in both your primary and your DR environment.
Some examples of localized tests:
Local tests will vary between different services, and local test design is usually best left to the system SMEs. At the same time, centralize reporting to understand where tests are being done.
Investigate whether your IT Service Management or ticketing system can create recurring tasks or work orders to schedule, document, and track test exercises. Tasks can be pre-populated with checklists and documentation to support the test and provide a record of completed tests to support oversight and reporting.
User acceptance testing (UAT) after system recovery is a key step in the recovery process. Like any step in the process, there’s value in testing it before it actually needs to be done. Assign responsibility for building UATs to the person who will be responsible for executing them.
An acceptance test script might look something like the checklist below.
“I cannot stress how important it is to assign ownership of responsibilities in a test; this is the only way to truly mitigate against issues in a test.”
– Robert Nardella
IT Service Management
Certified z/OS Mainframe Professional
Build test scripts and test transactions ahead of time to minimize the amount of new work required during a recovery scenario.
What you get:
What you need:
What you get:
What you need:
What you get:
What you need:
What you get:
What you need:
More complex, challenging, risky, or costly tests, such as full failover tests, can deliver value. But do the high-value, low-effort stuff first!
30-60 minutes
Even if you have an idea of what you need to test and how you want to run those tests, this brainstorming exercise can generate useful ideas for testing that might otherwise have been missed.
The next steps will help you prioritize the list – if needed – to tests that are highest value and lowest effort.
“There are different levels of testing and it is very progressive. I do not recommend my clients to do anything, unless they do it in a progressive fashion. Don’t try to do a live failover test with your users, right out of the box.”
– Steve Tower
Principal Consultant
Prompta Consulting Group
Input
|
Output
|
Participants
|
3-5 days
Building a test plan helps the test run smoothly and can uncover issues with the underlying DRP as you dig into the details.
The test coordinator will own the plan document but will rely on the sponsor to confirm scope and goals, technical SMEs to develop system recovery plans, and business liaisons to create UAT scripts.
Download Info-Tech’s Disaster Recovery Test Plan Template. Use the structure of the template to build your own document, deleting example data as you go. Consider saving a separate copy of this document as an example and working from a second copy.
Key sections of the document include:
Download the Disaster Recovery Test Plan Template
Input
|
Output
|
Participants
|
30-60 minutes
Take time after test exercises – especially large-scale tests with many participants – to consider what went well, what didn’t, and where you can improve future testing exercises. Track lessons learned and next steps at the bottom of your test plan.
Input
|
Output
|
Participants
|
All tests are expected to drive actions to improve resilience, as appropriate. Experience from previous tests will be applied to future testing exercises.

Outputs and lessons learned from testing should help you run future tests.

Testing should get easier over time. But if you’re easily passing every test, it’s a sign that you’re ready to run more challenging tests.
2-4 hours
Regular testing allows you to build on prior tests and helps keep plans current despite changes to your environment.
Keeping a regular testing schedule requires expertise, a process to coordinate your efforts, and a level of governance to provide oversight and ensure testing continues to deliver value. Create a call to action using Info-Tech’s Disaster Recovery Testing Program Summary Template.
The result is a summary document that:
“It is extremely important in the early stages of development to concentrate the focus on actual recoverability and data protection, enhancing these capabilities over time into a fully matured program that can truly test the recovery, and not simply focusing on the testing process itself.”
– Joe Starzyk
Senior Business Development Executive
IBM Global Services
Alton, Yoni. “Ransomware simulators – reality or a bluff?” Palo Alto Blog, 2 May 2022. Accessed 31 Jan 2023.
https://www.paloaltonetworks.com/blog/security-operations/ransomware-simulators-reality-or-a-bluff/
Brathwaite, Shimon. “How to Test your Business Continuity and Disaster Recovery Plan,” Security Made Simple, 13 Nov 2022. Accessed 31 Jan 2023.
https://www.securitymadesimple.org/cybersecurity-blog/how-to-test-your-business-continuity-and-disaster-recovery-plan
The Business Continuity Institute. Good Practice Guidelines: 2018 Edition. The Business Continuity Institute, 2017.
Emigh, Jacqueline. “Disaster Recovery Testing: Ensuring Your DR Plan Works,” Enterprise Storage Forum, 28 May 2019. Accessed 31 Jan 2023.
Disaster Recovery Testing: Ensuring Your DR Plan Works | Enterprise Storage Forum
Gardner, Dana. "Case Study: Strategic Approach to Disaster Recovery and Data Lifecycle Management Pays off for Australia's SAI Global." ZDNet. BriefingsDirect, 26 Apr 2012. Accessed 31 Jan 2023.
http://www.zdnet.com/article/case-study-strategic-approach-to-disaster-recovery-and-data-lifecycle-management-pays-off-for-australias-sai-global/.
IBM. “Section 11. Testing the Disaster Recovery Plan.” IBM, 2 Aug 2021. Accessed 31 Jan 2023. Section 11. Testing the disaster recovery plan - IBM Documentation Lutkevich, Ben and Alexander Gillis. “Chaos Engineering”. TechTarget, Jun 2021. Accessed 31 Jan 2023.
https://www.techtarget.com/searchitoperations/definition/chaos-engineering
Monperrus, Martin. “Principles of Antifragility.” Arxiv Forum, 7 June 2017. Accessed 31 Jan 2023.
https://arxiv.org/ftp/arxiv/papers/1404/1404.3056.pdf
“Principles of Chaos Engineering.” Principles of Chaos Engineering, 2019 March. Accessed 31 Jan 2023.
https://principlesofchaos.org/
Sloss, Benjamin Treynor. “Introduction.” Site Reliability Engineering. Ed. Betsy Beyer. O’Reilly Media, 2017. Accessed 31 Jan 2023.
https://sre.google/sre-book/introduction/
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Acquire the right hire.
Ensure an effective and seamless interview process.
Be an effective interviewer.
Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Analyze the scope of the IoT and the three most prominent enterprise use cases.
Develop and prioritize use cases for the IoT using Info-Tech’s IoT Initiative Framework.
Present the IoT initiative to stakeholders and understand the way forward for the IoT initiative.