Streamline Application Maintenance

  • Buy Link or Shortcode: {j2store}402|cart{/j2store}
  • member rating overall impact: 9.5/10 Overall Impact
  • member rating average dollars saved: 20 Average Days Saved
  • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
  • Parent Category Name: Maintenance
  • Parent Category Link: /maintenance
  • Application maintenance teams are accountable for the various requests and incidents coming from a variety business and technical sources. The sheer volume and variety of requests create unmanageable backlogs.
  • The increasing complexity and reliance on technology within the business has set unrealistic expectations on maintenance teams. Stakeholders expect teams to accommodate maintenance without impact on project schedules.

Our Advice

Critical Insight

  • Improving maintenance’s focus and attention may mean doing less but more valuable work. Teams need to be realistic about what can be committed and be prepared to justify why certain requests have to be pushed down the backlog (e.g. lack of business value, high risks).
  • Maintenance must be treated like any other development activity. The same intake and prioritization practices and quality standards must be upheld, and best practices followed.

Impact and Result

  • Justify the necessity of streamlined maintenance. Gain a grounded understanding of stakeholder objectives and concerns, and validate their achievability against the current state of the people, process, and technologies involved in application maintenance.
  • Strengthen triaging and prioritization practices. Obtain a holistic picture of the business and technical impacts, risks, and urgencies of each accepted maintenance requests in order to justify its prioritization and relevance within your backlog. Identify opportunities to bundle requests together or integrate them within project commitments to ensure completion.
  • Establish and govern a repeatable process. Develop a maintenance process with well-defined stage gates, quality controls, and roles and responsibilities, and instill development best practices to improve the success of delivery.

Streamline Application Maintenance Research & Tools

Start here – read the Executive Brief

Read our Executive Brief to understand the common struggles found in application maintenance, their root causes, and the Info-Tech methodology to overcoming these hurdles.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Understand your maintenance priorities

Understand the stakeholder priorities driving changes in your application maintenance practice.

  • Streamline Application Maintenance – Phase 1: Assess the Current Maintenance Landscape
  • Application Maintenance Operating Model Template
  • Application Maintenance Resource Capacity Assessment
  • Application Maintenance Maturity Assessment

2. Instill maintenance governance

Identify the appropriate level of governance and enforcement to ensure accountability and quality standards are upheld across maintenance practices.

  • Streamline Application Maintenance – Phase 2: Develop a Maintenance Release Schedule

3. Enhance triaging and prioritization practices

Build a maintenance triage and prioritization scheme that accommodates business and IT risks and urgencies.

  • Streamline Application Maintenance – Phase 3: Optimize Maintenance Capabilities

4. Streamline maintenance delivery

Define and enforce quality standards in maintenance activities and build a high degree of transparency to readily address delivery challenges.

  • Streamline Application Maintenance – Phase 4: Streamline Maintenance Delivery
  • Application Maintenance Business Case Presentation Document
[infographic]

Workshop: Streamline Application Maintenance

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Understand Your Maintenance Priorities

The Purpose

Understand the business and IT stakeholder priorities driving the success of your application maintenance practice.

Understand any current issues that are affecting your maintenance practice.

Key Benefits Achieved

Awareness of business and IT priorities.

An understanding of the maturity of your maintenance practices and identification of issues to alleviate.

Activities

1.1 Define priorities for enhanced maintenance practices.

1.2 Conduct a current state assessment of your application maintenance practices.

Outputs

List of business and technical priorities

List of the root-cause issues, constraints, and opportunities of current maintenance practice

2 Instill Maintenance Governance

The Purpose

Define the processes, roles, and points of communication across all maintenance activities.

Key Benefits Achieved

An in-depth understanding of all maintenance activities and what they require to function effectively.

Activities

2.1 Modify your maintenance process.

2.2 Define your maintenance roles and responsibilities.

Outputs

Application maintenance process flow

List of metrics to gauge success

Maintenance roles and responsibilities

Maintenance communication flow

3 Enhance Triaging and Prioritization Practices

The Purpose

Understand in greater detail the process and people involved in receiving and triaging a request.

Define your criteria for value, impact, and urgency, and understand how these fit into a prioritization scheme.

Understand backlog management and release planning tactics to accommodate maintenance.

Key Benefits Achieved

An understanding of the stakeholders needed to assess and approve requests.

The criteria used to build a tailored prioritization scheme.

Tactics for efficient use of resources and ideal timing of the delivery of changes.

A process that ensures maintenance teams are always working on tasks that are valuable to the business.

Activities

3.1 Review your maintenance intake process.

3.2 Define a request prioritization scheme.

3.3 Create a set of practices to manage your backlog and release plans.

Outputs

Understanding of the maintenance request intake process

Approach to assess the impact, urgency, and severity of requests for prioritization

List of backlog management grooming and release planning practices

4 Streamline Maintenance Delivery

The Purpose

Understand how to apply development best practices and quality standards to application maintenance.

Learn the methods for monitoring and visualizing maintenance work.

Key Benefits Achieved

An understanding of quality standards and the scenarios for where they apply.

The tactics to monitor and visualize maintenance work.

Streamlined maintenance delivery process with best practices.

Activities

4.1 Define approach to monitor maintenance work.

4.2 Define application quality attributes.

4.3 Discuss best practices to enhance maintenance development and deployment.

Outputs

Taskboard structure and rules

Definition of application quality attributes with user scenarios

List of best practices to streamline maintenance development and deployment

5 Finalize Your Maintenance Practice

The Purpose

Create a target state built from appropriate metrics and attainable goals.

Consider the required items and steps for the implementation of your optimization initiatives.

Key Benefits Achieved

A realistic target state for your optimized application maintenance practice.

A well-defined and structured roadmap for the implementation of your optimization initiatives.

Activities

5.1 Refine your target state maintenance practices.

5.2 Develop a roadmap to achieve your target state.

Outputs

Finalized application maintenance process document

Roadmap of initiatives to achieve your target state

Satisfy Customer Requirements for Information Security

  • Buy Link or Shortcode: {j2store}259|cart{/j2store}
  • member rating overall impact: 9.0/10 Overall Impact
  • member rating average dollars saved: $247 Average $ Saved
  • member rating average days saved: 3 Average Days Saved
  • Parent Category Name: Governance, Risk & Compliance
  • Parent Category Link: /governance-risk-compliance
  • Your customers and potential customers are increasingly demanding assurance that you will meet their information security requirements.
  • Responding to these assurance demands requires ever more effort from the security team, which distracts them from their primary mission of protecting the organization.
  • Every customer seems to have their own custom security questionnaire they want you to complete, increasing the effort you have to expend to respond to them.

Our Advice

Critical Insight

  • Your security program can be a differentiator and help win and retain customers.
  • Value rank your customers to right-size the level of effort your security team dedicates to responding to questionnaires.
  • SOC 2 or ISO 27001 certification can be an important part of your security marketing, but only if you make the right business case.

Impact and Result

  • CISOs need to develop a marketing strategy for their information security program.
  • Ensure that your security team dedicates the appropriate amount of effort to sales by value ranking your potential customers and aligning efforts to value.
  • Develop a business case for SOC 2 or ISO 27001 to determine if certification makes sense for your organization, and to gain support from key stakeholders.

Satisfy Customer Requirements for Information Security Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should proactively satisfy customer requirements for information security, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Manage customer expectations for information security

Identify your customers’ expectations for security and privacy, value rank your customers to right-size your efforts, and learn how to impress them with your information security program.

  • Satisfy Customer Requirements for Information Security – Phase 1: Manage Customer Expectations for Information Security

2. Select a certification path

Decide whether to obtain SOC 2 or ISO 27001 certification, and build a business case for certification.

  • Satisfy Customer Requirements for Information Security – Phase 2: Select a Certification Path
  • Security Certification Selection Tool
  • Security Certification Business Case Tool

3. Obtain and maintain certification

Develop your certification scope, prepare for the audit, and learn how to maintain your certification over time.

  • Satisfy Customer Requirements for Information Security – Phase 3: Obtain and Maintain Certification
[infographic]

Develop a Targeted Flexible Work Program for IT

  • Buy Link or Shortcode: {j2store}542|cart{/j2store}
  • member rating overall impact: 9.0/10 Overall Impact
  • member rating average dollars saved: $18,909 Average $ Saved
  • member rating average days saved: 13 Average Days Saved
  • Parent Category Name: Attract & Select
  • Parent Category Link: /attract-and-select
  • Workplace flexibility continues to be top priority for IT employees. Organizations who fail to offer flexibility will have a difficult time attracting, recruiting, and retaining talent.
  • When the benefits of remote work are not available to everyone, this raises fairness and equity concerns.

Our Advice

Critical Insight

IT excels at hybrid location work and is more effective as a business function when location flexibility is an option for its employees. But hybrid work is just a start. A comprehensive flex work program extends beyond flexible location, so organizations must understand the needs of unique employee groups to uncover the options that will attract and retain talent.

Impact and Result

  • Uncover the needs of unique employee segments to shortlist flexible work options that employees want and will use.
  • Assess the feasibility of various flexible work options and select ones that meet employee needs and are feasible for the organization.
  • Equip leaders with the information and tools needed to implement and sustain a flexible work program.

Develop a Targeted Flexible Work Program for IT Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Assess employee and organizational flexibility needs

Identify prioritized employee segments, flexibility challenges, and the desired state to inform program goals.

  • Develop a Targeted Flexible Work Program for IT – Phases 1-3
  • Talent Metrics Library
  • Targeted Flexible Work Program Workbook
  • Fast-Track Hybrid Work Program Workbook

2. Identify potential flex options and assess feasibility

Review, shortlist, and assess the feasibility of common types of flexible work. Identify implementation issues and cultural barriers.

  • Flexible Work Focus Group Guide
  • Flexible Work Options Catalog

3. Implement selected option(s)

Equip managers and employees to adopt flexible work options while addressing implementation issues and cultural barriers and aligning HR programs.

  • Guide to Flexible Work for Managers and Employees
  • Flexible Work Time Policy
  • Flexible Work Time Off Policy
  • Flexible Work Location Policy

Infographic

Workshop: Develop a Targeted Flexible Work Program for IT

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Prepare to Assess Flex Work Feasibility

The Purpose

Gather information on organizational and employee flexibility needs.

Key Benefits Achieved

Understand the flexibility needs of the organization and its employees to inform a targeted flex work program.

Activities

1.1 Identify employee and organizational needs.

1.2 Identify employee segments.

1.3 Establish program goals and metrics.

1.4 Shortlist flexible work options.

Outputs

Organizational context summary

List of shortlisted flex work options

2 Assess Flex Work Feasibility

The Purpose

Perform a data-driven feasibility analysis on shortlisted work options.

Key Benefits Achieved

A data-driven feasibility analysis ensures your flex work program meets its goals.

Activities

2.1 Conduct employee/manager focus groups to assess feasibility of flex work options.

Outputs

Summary of flex work options feasibility per employee segment

3 Finalize Flex Work Options

The Purpose

Select the most impactful flex work options and create a plan for addressing implementation challenge

Key Benefits Achieved

A data-driven selection process ensures decisions and exceptions can be communicated with full transparency.

Activities

3.1 Finalize list of approved flex work options.

3.2 Brainstorm solutions to implementation issues.

3.3 Identify how to overcome cultural barriers.

Outputs

Final list of flex work options

Implementation barriers and solutions summary

4 Prepare for Implementation

The Purpose

Create supporting materials to ensure program implementation proceeds smoothly.

Key Benefits Achieved

Employee- and manager-facing guides and policies ensure the program is clearly documented and communicated.

Activities

4.1 Design employee and manager guide prototype.

4.2 Align HR programs and policies to support flexible work.

4.3 Create a communication plan.

Outputs

Employee and manager guide to flexible work

Flex work roadmap and communication plan

5 Next Steps and Wrap-Up

The Purpose

Put everything together and prepare to implement.

Key Benefits Achieved

Our analysts will support you in synthesizing the workshop’s efforts into a cohesive implementation strategy.

Activities

5.1 Complete in-progress deliverables from previous four days.

5.2 Set up review time for workshop deliverables and to discuss next steps.

Outputs

Completed flexible work feasibility workbook

Flexible work communication plan

Further reading

Develop a Targeted Flexible Work Program for IT

Select flexible work options that balance organizational and employee needs to drive engagement and improve attraction and retention.

Executive Summary

Your Challenge

  • IT leaders continue to struggle with workplace flexibility, and it is a top priority for IT employees; as a result, organizations who fail to offer flexibility will have a difficult time attracting, recruiting, and retaining talent.
  • The benefits of remote work are not available to everyone, raising fairness and equity concerns for employees.

Common Obstacles

  • A one-size-fits-all approach to selecting and implementing flexible work options fails to consider unique employee needs and will not reap the benefits of offering a flexible work program (e.g. higher engagement or enhanced employer brand).
  • Improper structure and implementation of flexible work programs exacerbates existing challenges (e.g. high turnover) or creates new ones.

Info-Tech's Approach

  • Uncover the needs of unique employee segments to shortlist flexible work options that employees want and will use.
  • Assess the feasibility of various flexible work options and select ones that meet employee needs and are feasible for the organization.
  • Equip leaders with the information and tools needed to implement and sustain a flexible work program.

Info-Tech Insight

IT excels at hybrid location work and is more effective as a business function when location flexibility is an option for its employees. But hybrid work is just a start. A comprehensive flex work program extends beyond flexible location, so organizations must understand the needs of unique employee groups to uncover the options that will attract and retain talent.

Flexible work arrangements are a requirement in today's world of work

Flexible work continues to gain momentum…

A 2022 LinkedIn report found that the following occurred between 2019 and 2021:

+362%

Increase in LinkedIn members sharing content with the term "flexible work."

+83%

Increase in job postings that mention "flexibility."
(LinkedIn, 2022)

In 2022, Into-Tech found that hybrid was the most commonly used location work model for IT across all industries.

("State of Hybrid Work in IT," Info-Tech Research Group, 2022)

…and employees are demanding more flexibility

90%

of employees said they want schedule and location flexibility ("Global Employee Survey," EY, 2021).

17%

of resigning IT employees cited lack of flexible work options as a reason ("IT Talent Trends 2022," Info-Tech Research Group, 2022).

71%

of executives said they felt "pressure to change working models and adapt workplace policies to allow for greater flexibility" (LinkedIn, 2021).

Therefore, organizations who fail to offer flexibility will be left behind

Difficulty attracting and retaining talent

98% of IT employees say flexible work options are important in choosing an employer ("IT Talent Trends 2022," Info-Tech Research Group, 2022).

Worsening employee wellbeing and burnout

Knowledge workers with minimal to no schedule flexibility are 2.2x more likely to experience work-related stress and are 1.4x more likely to suffer from burnout (Slack, 2022; N=10,818).

Offering workplace flexibility benefits organizations and employees

Higher performance

IT departments that offer some degree of location flexibility are more effective at supporting the organization than those who do not.

35% of service desk functions report improved service since implementing location flexibility.
("State of Hybrid Work in IT," Info-Tech Research Group, 2023).

Enhanced employer brand

Employees are 2.1x more likely to recommend their employer to others when they are satisfied with their organization's flexible work arrangements (LinkedIn, 2021).

Improved attraction

41% of IT departments cite an expanded hiring pool as a key benefit of hybrid work.

Organizations that mention "flexibility" in their job postings have 35% more engagement with their posts (LinkedIn, 2022).

Increased job satisfaction

IT employees who have more control over their working arrangement experience a greater sense of contribution and trust in leadership ("State of Hybrid Work in IT," Info-Tech Research Group, 2023).

Better work-life balance

81% of employees say flexible work will positively impact their work-life balance (FlexJobs, 2021).

Boosted inclusivity

  • Caregivers regardless of gender, supporting them in balancing responsibilities
  • Individuals with disabilities, enabling them to work from the comfort of their homes
  • Women who may have increased responsibilities
  • Women of color to mitigate the emotional tax experienced at work

Info-Tech Insight

Flexible work options are not a concession to lower productivity. Properly implemented, flex work enables employees to be more productive at reaching business goals.

Despite the popularity of flexible work options, not all employees can participate

IT organizations differ on how much flexibility different roles can have.

IT employees were asked what percentage of IT roles were currently in a hybrid or remote work arrangement ("State of Hybrid Work in IT," Info-Tech Research Group, 2023).

However, the benefits of remote work are not available to all, which raises fairness and equity concerns between remote and onsite employees.

45%

of employers said, "one of the biggest risks will be their ability to establish fairness and equity among employees when some jobs require a fixed schedule or location, creating a 'have and have not' dynamic based on roles" ("Businesses Suffering," EY, 2021).

Offering schedule flexibility to employees who need to be fully onsite can be used to close the fairness and equity gap.

When offered the choice, 54% of employees said they would choose schedule flexibility over location flexibility ("Global Employee Survey," EY, 2021).

When employees were asked "What choice would you want your employer to provide related to when you have to work?" The top three choices were:

68%

Flexibility on when to start and finish work

38%

Compressed or four-day work weeks

33%

Fixed hours (e.g. 9am to 5pm)

Disclaimer: "Percentages do not sum to 100%, as each respondent could choose up to three of the [five options provided]" ("Global Employee Survey," EY, 2021).

Beware of the "all or nothing" approach

There is no one-size-fits-all approach to workplace flexibility.

Understanding the needs of various employee segments in the organization is critical to the success of a flexible work program.

Working parents want more flexibility

82%

of working mothers desire flexibility in where they work.

48%

of working fathers "want to work remotely 3 to 5 days a week."

Historically underrepresented groups value more flexibility

38%

"Thirty-eight percent of Black male employees and 33% of Black female employees would prefer a fully flexible schedule, compared to 25% of white female employees and 26% of white male employees."
(Slack, 2022; N=10,818)

33%

Workplace flexibility must be customized to the organization to avoid longer working hours and heavy workloads that impact employee wellbeing

84%

of remote workers and 61% of onsite workers reported working longer hours post pandemic. Longer working hours were attributed to reasons such as pressure from management and checking emails after working hours (Indeed, 2021).

2.6x

Respondents who either agreed or strongly agreed with the statement "Generally, I find my workload reasonable" were 2.6x more likely to be engaged compared to those who stated they disagreed or strongly disagreed (McLean & Company Engagement Survey Database;2022; N=5,615 responses).

Longer hours and unsustainable workloads can contribute to stress and burnout, which is a threat to employee engagement and retention. With careful management (e.g. setting clear expectations and establishing manageable workloads), flexible work arrangement benefits can be preserved.

Info-Tech Insight

Employees' lived experiences and needs determine if people use flexible work programs – a flex program that has limited use or excludes people will not benefit the organization.

Develop a flexible work program that meets employee and organizational needs

This is an image of a sample flexible work program which meets employee and organizational needs.

Insight summary

Overarching insight: IT excels at hybrid location work and is more effective as a business function when location, time, and time-off flexibility are an option for its employees.

Introduction

Step 1 insight

Step 2 insight

Step 3 insight

  • Flexible work options are not a concession to lower productivity. Properly implemented, flex work enables employees to be more productive at reaching business goals.
  • Employees' lived experiences and needs determine if people use flexible work programs – a flex program that has limited use or excludes people will not benefit the organization.
  • Flexible work benefits everyone. IT employees experience greater engagement, motivation, and company loyalty. IT organizations realize benefits such as better service coverage, reduced facilities costs, and increased productivity.
  • Hybrid work is a start. A comprehensive flex work program extends beyond flexible location to flexible time and time off. Organizations must understand the needs of unique employee groups to uncover the options that will attract and retain talent. Provide greater inclusivity to employees by broadening the scope to include flex location, flex time, and flex time off.
  • No two employee segments are the same. To be effective, flexible work options must align with the expectations and working processes of each segment.
  • Every role is eligible for hybrid location work. If onsite work duties prevent an employee group from participating, see if processes can be digitized or automated. Flexible work is an opportunity to go beyond current needs to future proofing your organization.
  • Flexible work options must balance organizational and employee needs. If an option is beneficial to employees but there is little or no benefit to the organization, or if the cost of the option is too high, it will not support the long-term success of the organization.
  • Prioritize flexible work options that employees want. Providing too many options often leads to information overload and results in employees not understanding what is available, lowering adoption of the flexible work program.
  • Leaders' collective support of the flexible program determines the program's successful adoption. Don't sweep cultural barriers under the rug; acknowledge and address them to overcome them.
  • Negative performance of a flexible work option does not necessarily mean failure. Take the time to evaluate whether the option simply needs to be tweaked or whether it truly isn't working for the organization.
  • A set of formal guidelines for IT ensures flexible work is:
    1. Administered fairly across all IT employees.
    2. Defensible and clear.
    3. Scalable to the rest of the organization.

Case Study

Expanding hybrid work at Info-Tech

Challenge

In 2020, Info-Tech implemented emergency work-from-home for its IT department, along with the rest of the organization. Now in 2023, hybrid work is firmly embedded in Info-Tech's culture, with plans to continue location flexibility for the foreseeable future.

Adjusting to the change came with lessons learned and future-looking questions.

Lessons Learned

Moving into remote work was made easier by certain enablers that had already been put in place. These included issuing laptops instead of desktops to the user base and using an existing cloud-based infrastructure. Much support was already being done remotely, making the transition for the support teams virtually seamless.

Continuing hybrid work has brought benefits such as reduced commuting costs for employees, higher engagement, and satisfaction among staff that their preferences were heard.

Looking Forward

Every flexible work implementation is a work in progress and must be continually revisited to ensure it continues to meet organizational and employee needs. Current questions being explored at Info-Tech are:

  • The concept of the "office as a tool" – how does use of the office change when it is used for specific collaboration-related tasks, rather than everything? How should the physical space change to support this?
  • What does a viable replacement for quick hallway meetings look like in a remote world where communication is much more deliberate? How can managers adjust their practices to ensure the benefits of informal encounters aren't lost?

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit

“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

Guided Implementation

“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

Workshop

“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

Consulting

“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

Diagnostics and consistent frameworks used throughout all four options

Guided Implementation

What does a typical GI on this topic look like?

Preparation

Step 1

Step 2

Step 3

Follow-up

Call #1: Scope requirements, objectives, and your specific challenges.

Call #2: Assess employee and organizational needs.

Call #3: Shortlist flex work options and assess feasibility.

Call #4: Finalize flex work options and create rollout plan.

Call #5: (Optional) Review rollout progress or evaluate pilot success.

A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

A typical GI is 3 to 5 calls over the course of 4 to 6 months.

Workshop Overview

Contact your account representative for more information.
workshops@infotech.com 1-888-670-8889

Day 1

Day 2

Day 3

Day 4

Day 5

Activities

Prepare to assess flex work feasibility

Assess flex work feasibility

Finalize flex work options

Prepare for implementation

Next Steps and Wrap-Up (offsite)

1.1 Identify employee and organizational needs.

1.2 Identify employee segments.

1.3 Establish program goals and metrics.

1.4 Shortlist flex work options.

2.1 Conduct employee/manager focus groups to assess feasibility of flex work options.

3.1 Finalize list of approved flex work options.

3.2 Brainstorm solutions to implementation issues.

3.2 Identify how to overcome cultural barriers.

4.1 Design employee and manager guide prototype.

4.2 Align HR programs and policies to support flexible work.

4.3 Create a communication plan.

5.1 Complete in-progress deliverables from previous four days.

5.2 Set up review time for workshop deliverables and to discuss next steps.

Deliverables

  1. Organizational context summary
  2. List of shortlisted flex work options
  1. Summary of flex work options' feasibility per employee segment
  1. 1.Final list of flex work options
  2. 2.Implementation barriers and solutions summary
  1. Employee and manager guide to flexible work
  2. Flex work roadmap and communication plan
  1. Completed flexible work feasibility workbook
  2. Flexible work communication plan

Step 1

Assess employee and organizational needs

1. Assess employee and organizational flexibility needs
2. Identify potential flex options and assess feasibility
3. Implement selected option(s)

After completing this step you will have:

  • Identified key stakeholders and their responsibilities
  • Uncovered the current and desired state of the organization
  • Analyzed feedback to identify flexibility challenges
  • Identified and prioritized employee segments
  • Determined the program goals
  • Identified the degree of flexibility for work location, timing, and deliverables

Identify key stakeholders

Organizational flexibility requires collaborative and cross-functional involvement to determine which flexible options will meet the needs of a diverse workforce. HR leads the project to explore flexible work options, while other stakeholders provide feedback during the identification and implementation processes.

HR

  • Assist with the design, implementation, and maintenance of the program.
  • Provide managers and employees with guidance to establish successful flexible work arrangements.
  • Help develop communications to launch and maintain the program.

Senior Leaders

  • Champion the project by modeling and promoting flexible work options
  • Help develop and deliver communications; set the tone for flexible work at the organization.
  • Provide input into determining program goals.

Managers

  • Model flexible work options and encourage direct reports to request and discuss options.
  • Use flexible work program guidelines to work with direct reports to select suitable flexible work options.
  • Develop performance metrics and encourage communication between flexible and non-flexible workers.

Flexible Workers

  • Indicate preferences of flexible work options to the manager.
  • Identify ways to maintain operational continuity and communication while working flexibly.
  • Flag issues and suggest improvements to the manager.
  • Develop creative ways to work with colleagues who don't work flexibly.

Non-Flexible Workers

  • Share feedback on issues with flexible arrangements and their impact on operational continuity.

Info-Tech Insight

Flexible work is a holistic team effort. Leaders, flexible workers, teammates, and HR must clearly understand their roles to ensure that teams are set up for success.

Uncover the current and desired state of flexibility in the organization

Current State

Target State

Review:

  • Existing policies related to flexibility (e.g. vacation, work from anywhere)
  • Existing flexibility programs (e.g. seasonal hours) and their uptake
  • Productivity of employees
  • Current culture at the organization. Look for:
    • Employee autonomy
    • Reporting structure and performance management processes
    • Trust and psychological safety of employees
    • Leadership behavior (e.g. do leaders model work-life balance, or does the organization have a work 24/7 mentality?)

Identify what is driving the need for flexible work options. Ask:

  • Why does the organization need flexible options?
    • For example, the introduction of flexibility for some employees has created a "have and have not" dynamic between roles that must be addressed.
  • What does the organization hope to gain from implementing flexible options? For example:
    • Improved retention
    • Increased attraction, remaining competitive for talent
    • Increased work-life balance for employees
    • Reduced burnout
  • What does the organization aspire to be?
    • For example, an organization that creates an environment that values output, not face time.

These drivers identify goals for the organization to achieve through targeted flexible work options.

Info-Tech Insight

Hybrid work is a start. A comprehensive flex work program extends beyond flexible location, so organizations must understand the needs of unique employee groups to uncover the options that will attract and retain talent. Provide greater inclusivity to employees by broadening the scope to include flex location, flex time, and flex time off.

Identify employee segments

Using the data, feedback, and challenges analyzed and uncovered so far, assess the organization and identify employee segments.

Identify employee segments with common characteristics to assess if they require unique flexible work options. Assess the feasibility options for the segments separately in Step 2.

  • Segments' unique characteristics include:
    • Role responsibilities (e.g. interacting with users, creating reports, development and testing)
    • Work location/schedule (e.g. geographic, remote vs. onsite, 9 to 5)
    • Work processes (e.g. server maintenance, phone support)
    • Group characteristics (e.g. specific teams, new hires)

Identify employee segments and sort them into groups based on the characteristics above.

Examples of segments:

  • Functional area (e.g. Service Desk, Security)
  • Job roles (e.g. desktop support, server maintenance)
  • Onsite, remote, or hybrid
  • Full-time or part-time
  • Job level (e.g. managers vs. independent contributors)
  • Employees with dependents

Prioritize employee segments

Determine whether the organization needs flexible work options for the entire organization or specific employee segments.
For specific employee segments:

  • Answer the questions on the right to identify whether an employee segment is high, medium, or low priority. Complete slides 23 to 25 for each high-priority segment, repeating the process for medium-priority segments when resources allow.

For the entire organization:

  • When identifying an option for the entire organization, consider all segments. The approach must create consistency and inclusion; keep this top of mind when identifying flexibility on slides 23 to 25. For example, the work location flexibility would be low in an organization where some segments can work remotely and others must be onsite due to machinery requirements.

High priority: The employee segment has the lowest engagement scores or highest turnover within the organization. Segment sentiment is that current flexibility is nonexistent or not sufficiently meeting needs.
Medium priority: The employee segment has low engagement or high turnover. Segment sentiment is that currently available flexibility is minimal or not sufficiently meeting needs.
Low priority: The segment does not have the lowest engagement or the highest turnover rate. Segment sentiment is that currently available flexibility is sufficiently meeting needs.

  1. What is the impact on the organization if this segment's challenges aren't addressed (e.g. if low engagement and high turnover are not addressed)?
  2. How critical is flexibility to the segment's needs/engagement?
  3. How time sensitive is it to introduce flexibility to this segment (e.g. is the organization losing employees in this segment at a high rate)?
  4. Will providing flexibility to this segment increase organizational productivity or output

Identify challenges to address with flexibility

Uncover the lived experiences and expectations of employees to inform selection of segments and flexible options.

  1. Collect data from existing sources, such as:
    • Engagement surveys
    • New hire/exit surveys
    • Employee experience monitor surveys
    • Employee retention pulse surveys
    • Burnout surveys
    • DEI pulse surveys
  2. Analyze employee feedback on experiences with:
    • Work duties
    • Workload
    • Work-life balance
    • Operating processes and procedures
    • Achieving operational outcomes
    • Collaboration and communication
    • Individual experience and engagement
  3. Evaluate the data and identify challenges

Example challenges:

  • Engagement: Low average score on work-life balance question; flexible work suggested in open-ended responses.
  • Retention: Exit survey indicating that lack of work-life balance is consistently a reason employees leave. Include the cost of turnover (e.g. recruitment, training, severance).
  • Burnout: Feedback from employees through surveys or HR business partner anecdotes indicating high burnout; high usage of wellness services or employee assistance programs.
  • Absenteeism: High average number of days employees were absent in the past year. Include the cost of lost productivity.
  • Operational continuity: Provide examples of when flexible work would have enabled operational continuity in the case of disaster or extended customer service coverage.
  • Program uptake: If the organization already has a flexible work program, provide data on the low proportion of eligible employees using available options.

1.1 Prepare to evaluate flexible work options

1-3 hours

Follow the guidance on preceding slides to complete the following activities.
Note: If you are only considering remote or hybrid work, use the Fast-Track Hybrid Work Program Workbook. Otherwise, proceed with the Targeted Flexible Work Program Workbook.

  1. Identify key stakeholders. Be sure to record the level of involvement and responsibility expected from each stakeholder. Use the "Stakeholders" tab of the workbook.
  2. Uncover current and desired state. Review and record your current state with respect to culture, productivity, and current flexible work options, if any. Next, record your desired future state, including reasons for implementing flexible work, and goals for the program. Record this in the "Current and Desired State" tab of the workbook.
  3. Identify and prioritize employee segments. Identify and record employee segments. Depending on the size of your department, you may identify a few or many. Be as granular as necessary to fully separate employee groups with different needs. If your resources or needs prevent you from rolling out flexible work to the entire department, record the priority level of each segment so you can focus on the highest priority first.
  4. Identify challenges with flexibility. With each employee segment in mind, analyze your available data to identify and record each segment's main challenges regarding flexible work. These will inform your program goals and metrics.

Download the Targeted Flexible Work Program Workbook

Download the Fast-Track Hybrid Work Program Workbook

Input

  • List of departmental roles
  • Data on employee engagement, productivity, sentiment regarding flexible work, etc.

Output

  • List of stakeholders and responsibilities
  • Flexible work challenges and aims
  • Prioritized list of employee segments

Materials

  • Targeted Flexible Work Program Workbook
    Or
  • Fast-Track Hybrid Work Program Workbook

Participants

  • IT department head
  • HR business partner
  • Flexible work program committee

Determine goals and metrics for the flexible work program

Sample program goals

Sample metrics

Increase productivity

  • Employee, team, and department key performance indicators (KPIs) before and after flexible work implementation
  • Absenteeism rate (% of lost working days due to all types of absence)

Improve business satisfaction and perception of IT value

Increase retention

  • % of exiting employees who cite lack of flexible work options or poor work-life balance as a reason they left
  • Turnover and retention rates

Improve the employee value proposition (EVP) and talent attraction

  • # of responses on the new hire survey where flexible work options or work-life balance are cited as a reason for accepting an employment offer
  • # of views of career webpage that mentions flexible work program
  • Time-to-fill rates

Improve engagement and work-life balance

  • Overall engagement score – deploy Info-Tech's Employee Engagement Diagnostics
  • Score for questions about work-life balance on employee engagement or pulse survey, including:
    • "I am able to maintain a balance between my work and personal life."
    • "I find my stress levels at work manageable."

Info-Tech Insight

Implementing flex work without solid performance metrics means you won't have a way of determining whether the program is enabling or hampering your business practices.

1.2 Determine goals and metrics

30 minutes

Use the examples on the preceding slide to identify program goals and metrics:

  1. Brainstorm program goals. Be sure to consider both the business benefits (e.g. productivity, retention) and the employee benefits (work-life balance, engagement). A successful flexible work program benefits both the organization and its employees.
  2. Brainstorm metrics for each goal. Identify metrics that are easy to track accurately. Use Info-Tech's IT and HR metrics libraries for reference. Ideally, the metrics you choose should already exist in your organization so no extra effort will be necessary to implement them. It is also important to have a baseline measure of each one before flexible work is rolled out.
  3. Record your outputs on the "Goals and Metrics" tab of the workbook.

Download the Targeted Flexible Work Program Workbook

Download the IT Metrics Library

Download the HR Metrics Library

Input

  • Organizational and departmental strategy

Output

  • List of program goals and metrics

Materials

  • Targeted Flexible Work Program Workbook
    Or
  • Fast-Track Hybrid Work Program Workbook

Participants

  • Flexible work program committee

Determine work location flexibility for priority segments

Work location looks at where a segment can complete all or some of their tasks (e.g. onsite vs. remote). For each prioritized employee segment, evaluate the amount of location flexibility available.

Work Duties

Processes

Operational Outcomes

High degree of flexibility

  • Low dependence on onsite equipment
  • Work easily shifts to online platforms
  • Low dependence on onsite external interactions (e.g. clients, customers, vendors)
  • Low interdependence of work duties internally (most work is independent)
  • Work processes and expectations are or can be formally documented
  • Remote work processes are sustainable long term

Most or all operational outcomes can be achieved offsite (e.g. products/service delivery not impacted by WFH)

  • Some dependence on onsite equipment
  • Some work can shift to online platforms
  • Some dependence on onsite external interactions
  • Some interdependence of work duties internally (collaboration is critical)
  • Most work processes and expectations have been or can be formally documented
  • Remote work processes are sustainable (e.g. workarounds can be supported and didn't add work)

Some operational outcomes can be achieved offsite (e.g. some impact of WFH on product/service delivery)

Low degree of flexibility

  • High dependence on onsite equipment
  • Work cannot shift to online platforms
  • High dependence on onsite external interactions
  • High interdependence of work duties internally (e.g. line work)
  • Few work processes and expectations can be formally documented
  • Work processes cannot be done remotely, and workarounds for remote work are not sustainable long term

Operational outcomes cannot be achieved offsite (e.g. significant impairment to product/service delivery)

Note

If roles within the segment have differing levels of location flexibility, use the lowest results (e.g. if role A in the segment has a high degree of flexibility for work duties and role B has a low degree of flexibility, use the results for role B).

Identify work timing for priority segments

Work timing looks at when work can or needs to be completed (e.g. Monday to Friday, 9am to 5pm).

Work Duties

Processes

Operational Outcomes

High degree of flexibility

  • No need to be available to internal and/or external customers during standard work hours
  • Equipment is available at any time
  • Does not rely on synchronous (occurring at the same time) work duties internally
  • Work processes and expectations are or can be formally documented
  • Low reliance on collaboration
  • Work is largely asynchronous (does not occur at the same time)

Most or all operational outcomes are not time sensitive

  • Must be available to internal and/or external customers during some standard work hours
  • Some reliance on synchronous work duties internally (collaboration is critical)
  • Most work processes and expectations have been or can be formally documented
  • Moderate reliance on collaboration
  • Some work is synchronous

Some operational outcomes are time sensitive and must be conducted within set date or time windows

Low degree of flexibility

  • Must be available to internal and/or external customers during all standard work hours (e.g. Monday to Friday 9 to 5)
  • High reliance on synchronous work duties internally (e.g. line work)
  • Few work processes and expectations can be formally documented
  • High reliance on collaboration
  • Most work is synchronous

Most or all operational outcomes are time sensitive and must be conducted within set date or time windows

Note

With additional coordination, flex time or flex time off options are still possible for employee segments with a low degree of flexibility. For example, with a four-day work week, the segment can be split into two teams – one that works Monday to Thursday and one that works Tuesday to Friday – so that employees are still available for clients five days a week.

Examine work deliverables for priority segments

Work deliverables look at the employee's ability to deliver on their role expectations (e.g. quota or targets) and whether reducing the time spent working would, in all situations, impact the work deliverables (e.g. constrained vs. unconstrained).

Work Duties

Operational Outcomes

High degree of flexibility

  • Few or no work duties rely on equipment or processes that put constraints on output (unconstrained output)
  • Employees have autonomy over which work duties they focus on each day
  • Most or all operational outcomes are unconstrained (e.g. a marketing analyst who builds reports and strategies for clients can produce more reports, produce better reports, or identify new strategies)
  • Work quota or targets are achievable even if working fewer hours
  • Some work duties rely on equipment or processes that put constraints on output
  • Employees have some ability to decide which work duties they focus on each day
  • Some operational outcomes are constrained or moderately unconstrained (e.g. an analyst build reports based on client data; while it's possible to find efficiencies and build reports faster, it's not possible to attain the client data any faster)
  • Work quota or targets may be achievable if working fewer hours

Low degree of flexibility

  • Most or all work duties rely on equipment or processes that put constraints on output (constrained output)
  • Daily work duties are prescribed (e.g. a telemarketer is expected to call a set number of people per day using a set list of contacts and a defined script)
  • Most or all operational outcomes are constrained (e.g. a machine operator works on a machine that produces 100 parts an hour; neither the machine nor the worker can produce more parts)
  • Work quota or targets cannot be achieved if fewer hours are worked

Note

For segments with a low degree of work deliverable flexibility (e.g. very constrained output), flexibility is still an option, but maintaining output would require additional headcount.

1.3 Determine flexibility needs and constraints

1-2 hours

Use the guidelines on the preceding slides to document the parameters of each work segment.

  1. Determine work location flexibility. Work location looks at where a segment can complete all or some of their tasks (e.g. onsite vs. remote). For each prioritized employee segment, evaluate the amount of location flexibility available.
  2. Identify work timing. Work timing looks at when work can or needs to be completed (e.g. Monday to Friday, 9am to 5pm).
  3. Examine work deliverables. Work deliverables look at the employee's ability to deliver on their role expectations (e.g. quota or targets) and whether reducing the time spent working would, in all situations, impact the work deliverables (e.g. constrained vs. unconstrained).
  4. Record your outputs on the "Current and Desired State" tab of the workbook.

Download the Targeted Flexible Work Program Workbook

Input

  • List of employee segments

Output

  • Summary of flexibility needs and constraints for each employee segment

Materials

  • Targeted Flexible Work Program Workbook
    Or
  • Fast-Track Hybrid Work Program Workbook

Participants

  • Flexible work program committee
  • Employee segment managers

Step 2

Identify potential flex options and assess feasibility

1. Assess employee and organizational flexibility needs
2. Identify potential flex options and assess feasibility
3. Implement selected option(s)

After completing this step you will have:

  • Created a shortlist of potential options for each prioritized employee segment
  • Evaluated the feasibility of each potential option
  • Determined the cost and benefit of each potential option
  • Gathered employee sentiment on potential options
  • Finalized options with senior leadership

Prepare to identify and assess the feasibility of potential flexible work options

First, review the Flexible Work Solutions Catalog

Before proceeding to the next slide, review the Flexible Work Options Catalog to identify and shortlist five to seven flexible work options that are best suited to address the challenges faced for each of the priority employee segments identified in Step 1.

Then, assess the feasibility of implementing selected options using slides 29 to 32

Assess the feasibility of implementing the shortlisted solutions for the prioritized employee segments against the feasibility factors in this step. Repeat for each employee segment. Use the following slides to consult with and include leaders when appropriate.

  • Document your analysis in tabs 6 to 8 of the Targeted Flexible Work Program Workbook.
  • Note implementation issues throughout the assessment and record them in the tool. They will be addressed in Step 3: Implement Selected Program(s). Don't rule out an option simply because it presents some challenges; careful implementation can overcome many challenges.
  • At the end of this step, determine the final list of flexible work options and gain approval from senior leaders for implementation.

Evaluate feasibility by reviewing the option's impact on continued operations and job performance

Operational coverage

Synchronous communication

Time zones

Face-to-face

communication

To what extent are employees needed to deliver products or services?

  • If constant customer service is required, stagger employees' schedules (e.g. one team works Monday-Thursday while another works Tuesday-Friday).

To what extent do employees need to communicate with each other synchronously?

  • Break the workflow down and identify times when employees do and do not have to work at the same time to communicate with each other.

To what extent do employees need to coordinate work across time zones?

  • If the organization already operates in different time zones, ensure that the option does not impact operations requiring continuous coverage.
  • When employees are located in different time zones, coordinate schedules based on the other operational factors.

When do employees need to interact with each other or clients in person?

  • Examine the workflow closely to identify times when face-to-face communication is not required. Schedule "office days" for employees to work together when in-person interaction is needed.
  • When the interaction is only required with clients, determine whether employees are able to meet clients offsite.

Info-Tech Insight

Every role is eligible for hybrid location work. If onsite work duties prevent an employee group from participating, see if processes can be digitized or automated. Flexible work is an opportunity to go beyond current needs to future-proof your organization.

Assess the option's alignment with organizational culture

Symbols

Values

Behaviors

How supportive of flexible work are the visible aspects of the organization's culture?

  • For example, the mission statement, newsletters, or office layout.
  • Note: Visible elements will need to be adapted to ensure they reinforce the value of the flexible work option.

How supportive are both the stated and lived values of the organization?

  • When the flexible work option includes less direct supervision, assess how empowered employees feel to make decisions.
  • Assess whether all types of employees (e.g. virtual) are included, valued, and supported.

How supportive are the attitudes and behaviors, especially of leaders?

  • Leaders set the expectations for acceptable behaviors in the organization. Determine how supportive leaders are toward flexible workers by examining their attitudes and perceptions.
  • Identify if employees are open to different ways of doing work.

Determine the resources required for the option

People

Process

Technology

Do employees have the knowledge, skills, and abilities to adopt this option?

  • Identify any areas (e.g. process, technology) employees will need to be trained on and assess the associated costs.
  • Determine whether the option will require additional headcount to ensure operational continuity (e.g. two part-time employees in a job-sharing arrangement) and calculate associated costs (e.g. recruitment, training, benefits).

How much will work processes need to change?

  • Interview organizational leaders with knowledge of the employee segment's core work processes. Determine whether a significant change will be required.
  • If a significant change is required, evaluate whether the benefits of the option outweigh the costs of the process and behavioral change (see the "net benefit" factor on slide 33).

What new technologies will be required?

  • Identify the technology (e.g. that supports communication, work processes) required to enable the flexible work option.
  • Note whether existing technology can be used or additional technology will be required, and further investigate the viability and costs of these options.

Examine the option's risks

Data

Health & Safety

Legal

How will data be kept secure?

  • Determine whether the organization's data policy and technology covers employees working remotely or other flexible work options.
  • If the employee segment handles sensitive data (e.g. personal employee information), consult relevant stakeholders to determine how data can be kept secure and assess any associated costs.

How will employees' health and safety be impacted?

  • Consult your organization's legal counsel to determine whether the organization will be liable for the employees' health and safety while working from home or other locations.
  • Determine whether the organization's policies and processes will need to be modified.

What legal risks might be involved?

  • Identify any policies in place or jurisdictional requirements to avoid any legal risks. Consult your organization's legal counsel about the situations below.
    • If the option causes significant changes to the nature of jobs, creating the risk of constructive dismissal.
    • If there are any risks to providing less supervision (e.g. higher chance of harassment).
    • When only some employee segments are eligible for the option, determine whether there is a risk of inequitable access.
    • If the option impacts any unionized employees or collective agreements.

Determine whether the benefits of the option outweigh the costs

Include senior leadership in the net benefit process to ensure any unfeasible options are removed from consideration before presenting to employees.

  1. Document the employee and employer benefits of the option from the previous feasibility factors on slides 29 to 32.
  • Include the benefits of reaching program goals identified in Step 1.
  • Quantify the benefits in dollar value where possible.
  • Document the costs and risks of the option, referring to the costs noted from previous feasibility factors.
    • Quantify the costs in dollar value where possible.
  • Compare the benefits and costs.
    • Add an option to your final list if the benefits are greater than the costs.
  • This is an image of a table with the main heading being Net Benefit, with the following subheadings: Benefits to organization; Benefits to employees; Costs.

    Info-Tech Insight

    Flexible work options must balance organizational and employee needs. If an option is beneficial to employees but there is little or no benefit to the organization as a whole, or if the cost of the option is too high, it will not support the long-term success of the organization.

    2.1a Identify and evaluate flexible work options

    30 minutes per employee segment per work option

    If you are only considering hybrid or remote work, skip to activity 2.1b. Use the guidelines on the preceding slides to conduct feasibility assessments.

    1. Shortlist flexible work options. Review the Flexible Work Options Catalog to identify and shortlist five to seven flexible work options that are best suited to address the challenges faced for each of the priority employee segments. Record these on the "Options Shortlist" tab of the workbook. Even if the decision is simple, ensure you record the rationale to help communicate your decision to employees. Transparent communication is the best way to avoid feelings of unfairness if desired work options are not implemented.
    2. Evaluate option feasibility. For each of the shortlisted options, complete one "Feasibility - Option" tab in the workbook. Make as many copies of this tab as needed.
      • When evaluating each option, consider each employee segment individually as you work through the prompts in the workbook. You may find that segments differ greatly in the feasibility of various types of flexible work. You will use this information to inform your overall policy and any exceptions to it.
      • You may need to involve each segment's management team to get an accurate picture of day-to-day responsibilities and flexible work feasibility.
    3. Weigh benefits and costs. At the end of each flexible work option evaluation, record the anticipated costs and benefits. Discuss whether this balance renders the option viable or rules it out.

    Download the Targeted Flexible Work Program Workbook

    Download the Flexible Work Options Catalog

    Input

    • List of employee segments

    Output

    • Shortlist of flexible work options
    • Feasibility analysis for each work option

    Materials

    • Targeted Flexible Work Program Workbook
    • Flexible Work Options Catalog

    Participants

    • Flexible work program committee
    • Employee segment managers

    2.1b Assess hybrid work feasibility

    30 minutes per employee segment

    Use the guidelines on the preceding slides to conduct a feasibility assessment. This exercise relies on having trialed hybrid or remote work before. If you have never implemented any degree of remote work, consider completing the full feasibility assessment in activity 2.1a.

    1. Evaluate hybrid work feasibility. Review the feasibility prompts on the "Work Unit Remote Work Assessment" tab and record your insight for each employee segment.
      • When evaluating each option, consider each employee segment individually as you work through the prompts in the workbook. You may find that segments differ greatly in their ability to accommodate hybrid work. You will use this information to inform your overall policy and any exceptions to it.
      • You may need to involve each segment's management team to get an accurate picture of day-to-day responsibilities and hybrid work feasibility.

    Download the Fast-Track Hybrid Work Program Workbook

    Input

    • List of employee segments

    Output

    • Feasibility analysis for each work option

    Materials

    • Fast-Track Hybrid Work Program Workbook

    Participants

    • Flexible work program committee
    • Employee segment managers

    Ask employees which options they prefer and gather feedback for implementation

    Deliver a survey and/or conduct focus groups with a selection of employees from all prioritized employee segments.

    Share

    • Present your draft list of options to select employees.
    • Communicate that the organization is in the process of assessing the feasibility of flexible work options and would like employee input to ensure flex work meets needs.
    • Be clear that the list is not final or guaranteed.

    Ask

    • Ask which options are preferred more than others.
    • Ask for feedback on each option – how could it be modified to meet employee needs better? Use this information to inform implementation in Step 3.

    Decide

    • Prioritize an option if many employees indicated an interest in it.
    • If employees indicate no interest in an option, consider eliminating it from the list, unless it will be required. There is no value in providing an option if employees won't use it.

    Survey

    • List the options and ask respondents to rate each on a Likert scale from 1 to 5.
    • Ask some open-ended questions with comment boxes for employee suggestions.

    Focus Group

    • Conduct focus groups to gather deeper feedback.
    • See Appendix I for sample focus group questions.

    Info-Tech Insight

    Prioritize flexible work options that employees want. Providing too many options often leads to information overload and results in employees not understanding what is available, lowering adoption of the flexible work program.

    Finalize options list with senior leadership

    1. Select one to three final options and outline the details of each. Include:
      • Scope: To what extent will the option be applied? E.g. work-from-home one or two days a week.
      • Eligibility: Which employee segments are eligible?
      • Cost: What investment will be required?
      • Critical implementation issues: Will any of the implementation issues identified for each feasibility factor impact whether the option will be approved?
      • Resources: What additional resources will be required (e.g. technology)?
    2. Present the options to stakeholders for approval. Include:
      • An outline of the finalized options, including what the option is and the scope, eligibility, and critical implementation issues.
      • The feasibility assessment results, including benefits, costs, and employee preferences. Have more detail from the other factors ready if leaders ask about them.
      • The investment (cost) required to implement the option.
    3. Proceed to Step 3 to implement approved options.

    Running an IT pilot of flex work

    • As a technology department, IT typically doesn't own flexible work implementation for the entire organization. However, it is common to trial flexible work options for IT first, before rolling out to the entire organization.
    • During a flex work pilot, ensure you are working closely with HR partners, especially regarding regulatory and compliance issues.
    • Keep the rest of the organizational stakeholders in the loop, especially regarding their agreement on the metrics by which the pilot's success will be evaluated.

    2.2a Finalize flexible work options

    2-3 hours + time to gather employee feedback

    If you are only considering hybrid or remote work, skip to activity 2.2b. Use the guidelines on the preceding slides to gather final feedback and finalize work option selections.

    1. Gather employee feedback. If employee preferences are already known, skip this step. If they are not, gather feedback to ascertain whether any of the shortlisted options are preferred. Remember that a successful flexible work program balances the needs of employees and the business, so employee preference is a key determinant in flexible work program success. Document this on the "Employee Preferences" tab of the workbook.
    2. Finalize flexible work options. Use your notes on the cost-benefit balance for each option, along with employee preferences, to decide whether the move forward with it. Record this decision on the "Options Final List" tab. Include information about eligible employee segments and any implementation challenges that came up during the feasibility assessments. This is the final decision summary that will inform your flexible program parameters and policies.

    Download the Targeted Flexible Work Program Workbook

    Input

    • Flexible work options shortlist

    Output

    • Final flexible work options list

    Materials

    • Targeted Flexible Work Program Workbook

    Participants

    • Flexible work program committee

    2.2b Finalize hybrid work parameters

    2-3 hours + time to gather employee feedback

    Use the guidelines on the preceding slides to gather final feedback and finalize work option selections.

    1. Summarize feasibility analysis. On the "Program Parameters" tab, record the main insights from your feasibility analysis. Finalize important elements, including eligibility for hybrid/remote work by employee segment. Additionally, record the standard parameters for the program (i.e. those that apply to all employee segments) and variable parameters (i.e. ones that differ by employee segment).

    Download the Fast-Track Hybrid Work Program Workbook

    Input

    • Hybrid work feasibility analysis

    Output

    • Final hybrid work program parameters

    Materials

    • Fast-Track Hybrid Work Program Workbook

    Participants

    • Flexible work program committee

    Step 3

    Implement selected option(s)

    1. Assess employee and organizational flexibility needs
    2. Identify potential flex options and assess feasibility
    3. Implement selected option(s)

    After completing this step, you will have:

    • Addressed implementation issues and cultural barriers
    • Equipped the organization to adopt flexible work options successfully
    • Piloted the program and assessed its success
    • Developed a plan for program rollout and communication
    • Established a program evaluation plan
    • Aligned HR programs to support the program

    Solve the implementation issues identified in your feasibility assessment

    1. Identify a solution for each implementation issue documented in the Targeted Flexible Work Program Workbook. Consider the following when identifying solutions:
      • Scope: Determine whether the solution will be applied to one or all employee segments.
      • Stakeholders: Identify stakeholders to consult and develop a solution. If the scope is one employee segment, work with organizational leaders of that segment. When the scope is the entire organization, consult with senior leaders.
      • Implementation: Collaborate with stakeholders to solve implementation issues. Balance the organizational and employee needs, referring to data gathered in Steps 1 and 2.

    Example:

    Issue

    Solution

    Option 1: Hybrid work

    Brainstorming at the beginning of product development benefits from face-to-face collaboration.

    Block off a "brainstorming day" when all team members are required in the office.

    Employee segment: Product innovation team

    One team member needs to meet weekly with the implementation team to conduct product testing.

    Establish a schedule with rotating responsibility for a team member to be at the office for product testing; allow team members to swap days if needed.

    Address cultural barriers by involving leaders

    To shift a culture that is not supportive of flexible work, involve leaders in setting an example for employees to follow.

    Misconceptions

    Tactics to overcome them

    • Flexible workers are less productive.
    • Flexible work disrupts operations.
    • Flexible workers are less committed to the organization.
    • Flexible work only benefits employees, not the organization.
    • Employees are not working if they aren't physically in the office.

    Make the case by highlighting challenges and expected benefits for both the organization and employees (e.g. same or increased productivity). Use data in the introductory section of this blueprint.

    Demonstrate operational feasibility by providing an overview of the feasibility assessment conducted to ensure operational continuity.

    Involve most senior leadership in communication.

    Encourage discovery and exploration by having managers try flexible work options themselves, which will help model it for employees.

    Highlight success stories within the organization or from competitors or similar industries.

    Invite input from managers on how to improve implementation and ownership, which helps to discover hidden options.

    Shift symbols, values, and behaviors

    • Work with senior leaders to identify symbols, values, and behaviors to modify to align with the selected flexible work options.
    • Validate that the final list aligns with your organization's mission, vision, and values.

    Info-Tech Insight

    Leaders' collective support of the flexible program determines the program's successful adoption. Don't sweep cultural barriers under the rug; acknowledge and address them to overcome them.

    Equip the organization for successful implementation

    Info-Tech recommends providing managers and employees with a guide to flexible work, introducing policies, and providing training for managers.

    Provide managers and employees with a guide to flexible work

    Introduce appropriate organization policies

    Equip managers with the necessary tools and training

    Use the guide to:

    • Familiarize employees and managers with the flexible work program.
    • Gain employee and manager buy-in and support for the program.
    • Explain the process and give guidance on selecting flexible work options and working with their colleagues to make it a success.

    Use Info-Tech's customizable policy templates to set guidelines, outline arrangements, and scope the organization's flexible work policies. This is typically done by, or in collaboration with, the HR department.

    Download the Guide to Flexible Work for Managers and Employees

    Download the Flex Location Policy

    Download the Flex Time-Off Policy

    Download the Flex Time Policy

    3.1 Prepare for implementation

    2-3 hours

    Use the guidelines on the preceding slides to brainstorm solutions to implementation issues and prepare to communicate program rollout to stakeholders.

    1. Solve implementation issues.
      • If you are working with the Targeted Flexible Work Program Workbook: For each implementation challenge identified on the "Final Options List" tab, brainstorm solutions. If you are working with the Fast-Track Hybrid Work Program Workbook: Work through the program enablement prompts on the "Program Enablement" tab.
      • You may need to involve relevant stakeholders to help you come up with appropriate solutions for each employee segment.
      • Ensure that any anticipated cultural barriers have been documented and are addressed during this step. Don't underestimate the importance of a supportive organizational culture to the successful rollout of flexible work.
    2. Prepare the employee guide. Modify the Guide to Flexible Work for Managers and Employees template to reflect your final work options list and the processes and expectations employees will need to follow.
    3. Create a communication plan. Use Info-Tech's Communicate Any IT Initiative blueprint and Appendix II to craft your messaging.

    Download the Guide to Flexible Work for Managers and Employees

    Download the Targeted Flexible Work Program Workbook

    Input

    • Flexible work options final list

    Output

    • Employee guide to flexible work
    • Flexible work rollout communication plan

    Materials

    • Guide to Flexible Work for Managers and Employees
    • Targeted Flexible Work Program Workbook
      Or
    • Fast-Track Hybrid Work Program Workbook

    Participants

    • Flexible work program committee
    • Employee segment managers

    Run an IT pilot for flexible work

    Prepare for pilot

    Launch Pilot

    Identify the flexible work options that will be piloted.

    • Refer to the final list of selected options for each priority segment to determine which options should be piloted.

    Select pilot participants.

    • If not rolling out to the entire IT department, look for the departments and/or team(s) where there is the greatest need and the biggest interest (e.g. team with lowest engagement scores).
    • Include all employees within the department, or team if the department is too large, in the pilot.
    • Start with a group whose managers are best equipped for the new flexibility options.

    Create an approach to collect feedback and measure the success of the pilot.

    • Feedback can be collected using surveys, focus groups, and/or targeted in-person interviews.

    The length of the pilot will greatly vary based on which flexible work options were selected (e.g. seasonal hours will require a shorter pilot period compared to implementing a compressed work week). Use discretion when deciding on pilot length and be open to extending or shortening the pilot length as needed.

    Launch pilot.

    • Launch the program through a town hall meeting or departmental announcement to build excitement and buy-in.
    • Develop separate communications for employee segments where appropriate. See Appendix II for key messaging to include.

    Gather feedback.

    • The feedback will be used to assess the pilot's success and to determine what modifications will be needed later for a full-scale rollout.
    • When gathering feedback, tailor questions based on the employee segment but keep themes similar. For example:
      • Employees: "How did this help your day-to-day work?"
      • Managers: "How did this improve productivity on your team?"

    Track metrics.

    • The success of the pilot is best communicated using your department's unique KPIs.
    • Metrics are critical for:
      • Accurately determining pilot success.
      • Getting buy-in to expand the pilot beyond IT.
      • Justifying to employees any changes made to the flexible work options.

    Assess the pilot's success and determine next steps

    Review the feedback collected on the previous slide and use this decision tree to decide whether to relaunch a pilot or proceed to a full-scale rollout of the program.

    This is an image of the flow chart used to assess the pilot's success and determine the next steps.  It will help you to determine whether you will Proceed to full-scale rollout on next slide, Major modifications to the option/launch (e.g. change operating time) – adjust and relaunch pilot or select a new employee segment and relaunch pilot, Minor modifications to the option/launch (e.g. introduce additional communications) – adjust and proceed to full scale rollout, or Return to shortlist (Step 2) and select a different option or launch pilot with a different employee segment.

    Prepare for full-scale rollout

    If you have run a team pilot prior to rolling out to all of IT, or run an IT pilot before an organizational rollout, use the following steps to transition from pilot to full rollout.

    1. Determine modifications
      • Review the feedback gathered during the pilot and determine what needs to change for a full-scale implementation.
      • Update HR policies and programs to support flexible work. Work closely with your HR business partner and other organizational leaders to ensure every department's needs are understood and compliance issues are addressed.
    2. Roll out and evaluate
      • Roll out the remainder of the program (e.g. to other employee segments or additional flexible work options) once there is significant uptake of the pilot by the target employee group and issues have been addressed.
      • Determine how feedback will be gathered after implementation, such as during engagement surveys, new hire and exit surveys, stay interviews, etc., and assess whether the program continues to meet employee and organizational needs.

    Rolling out beyond IT

    For a rollout beyond IT, HR will likely take over.

    However, this is your chance to remain at the forefront of your organization's flexible work efforts by continuing to track success and gather feedback within IT.

    Align HR programs and organizational policies to support flexible work

    Talent Management

    Learning & Development

    Talent Acquisition

    Reinforce managers' accountability for the success of flexible work in their teams:

    • Include "managing virtual teams" in the people management leadership competency.
    • Recognize managers who are modeling flexible work.

    Support flexible workers' career progression:

    • Monitor the promotion rates of flexible workers vs. non-flexible workers.
    • Make sure flexible workers are discussed during talent calibration meetings and have access to career development opportunities.

    Equip managers and employees with the knowledge and skills to make flexible work successful.

    • Provide guidance on selecting the right options and maintaining workflow.
    • If moving to a virtual environment, train managers on how to make it a success.

    Incorporate the flexible work program into the organization's employee value proposition to attract top talent who value flexible work options.

    • Highlight the program on the organization's career site and in job postings.

    Organizational policies

    Determine which organizational policies will be impacted as a result of the new flexible work options. For example, the introduction of flex time off can result in existing vacation policies needing to be updated.

    Plan to re-evaluate the program and make improvements

    Collect data

    Collect data

    Act on data

    Uptake

    Gather data on the proportion of employees eligible for each option who are using the option.

    If an option is tracking positively:

    • Maintain or expand the program to more of the organization.
    • Conduct a feasibility assessment (Step 2) for new employee segments.

    Satisfaction

    Survey managers and employees about their satisfaction with the options they are eligible for and provide an open box for suggestions on improvements.

    If an option is tracking negatively:

    • Investigate why. Gather additional data, interview organizational leaders, and/or conduct focus groups to gain deeper insight.
    • Re-assess the feasibility of the option (Step 2). If the costs outweigh the benefits based on new data, determine whether to cancel the option.
    • Take appropriate action based on the outcome of the evaluation, such as modifying or cancelling the option or providing employees with more support.
      • Note: Cancelling an option can impact the engagement of employees using the option. Ensure that the data, reasons for cancelling the option, and potential substitute options are communicated to employees in advance.

    Program goal progress

    Monitor progress against the program goals and metrics identified in Step 1 to evaluate the impact on issues that matter to the organization (e.g. retention, productivity, diversity).

    Career progression

    Evaluate flexible workers' promotion rates and development opportunities to determine if they are developing.

    Info-Tech Insight

    Negative performance of a flexible work option does not necessarily mean failure. Take the time to evaluate whether the option simply needs to be tweaked or whether it truly isn't working for the organization.

    Insight summary

    Overarching insight: IT excels at hybrid location work and is more effective as a business function when location, time, and time-off flexibility are an option for its employees.

    Introduction

    • Flexible work options are not a concession to lower productivity. Properly implemented, flex work enables employees to be more productive at reaching business goals.
    • Employees' lived experiences and needs determine if people use flexible work programs – a flex program that has limited use or excludes people will not benefit the organization.
    • Flexible work benefits everyone. IT employees experience greater engagement, motivation, and company loyalty. IT organizations realize benefits such as better service coverage, reduced facilities costs, and increased productivity.

    Step 1 insight

    • Hybrid work is a start. A comprehensive flex work program extends beyond flexible location to flexible time and time off. Organizations must understand the needs of unique employee groups to uncover the options that will attract and retain talent. Provide greater inclusivity to employees by broadening the scope to include flex location, flex time, and flex time off.
    • No two employee segments are the same. To be effective, flexible work options must align with the expectations and working processes of each segment.

    Step 2 insight

    • Every role is eligible for hybrid location work. If onsite work duties prevent an employee group from participating, see if processes can be digitized or automated. Flexible work is an opportunity to go beyond current needs to future proofing your organization.
    • Flexible work options must balance organizational and employee needs. If an option is beneficial to employees but there is little or no benefit to the organization, or if the cost of the option is too high, it will not support the long-term success of the organization.
    • Prioritize flexible work options that employees want. Providing too many options often leads to information overload and results in employees not understanding what is available, lowering adoption of the flexible work program.

    Step 3 insight

    • Leaders' collective support of the flexible program determines the program's successful adoption. Don't sweep cultural barriers under the rug; acknowledge and address them to overcome them.
    • Negative performance of a flexible work option does not necessarily mean failure. Take the time to evaluate whether the option simply needs to be tweaked or whether it truly isn't working for the organization.
    • A set of formal guidelines for IT ensures flexible work is:
      1. Administered fairly across all IT employees.
      2. Defensible and clear.
      3. Scalable to the rest of the organization.

    Research Contributors and Experts

    Quinn Ross
    CEO
    The Ross Firm Professional Corporation

    Margaret Yap
    HR Professor
    Ryerson University

    Heather Payne
    CEO
    Juno College

    Lee Nguyen
    HR Specialist
    City of Austin

    Stacey Spruell
    Division HR Director
    Travis County

    Don MacLeod
    Chief Administrative Officer
    Zorra Township

    Stephen Childs
    CHRO
    Panasonic North America

    Shawn Gibson
    Sr. Director
    Info Tech Research Group

    Mari Ryan
    CEO/Founder
    Advancing Wellness

    Sophie Wade
    Founder
    Flexcel Networks

    Kim Velluso
    VP Human Resources
    Siemens Canada

    Lilian De Menezes
    Professor of Decision Sciences
    Cass Business School, University of London

    Judi Casey
    WorkLife Consultant and former Director, Work and Family Researchers Network
    Boston College

    Chris Frame
    Partner – Operations
    LiveCA

    Rose M. Stanley, CCP, CBP, WLCP, CEBS
    People Services Manager
    Sunstate Equipment Co., LLC

    Shari Lava
    Director, Vendor Research
    Info-Tech Research Group

    Carol Cochran
    Director of People & Culture
    FlexJobs

    Kidde Kelly
    OD Practitioner

    Dr. David Chalmers
    Adjunct Professor
    Ted Rogers School of Management, Ryerson University

    Kashmira Nagarwala
    Change Manager
    Siemens Canada

    Dr. Isik U. Zeytinoglu
    Professor of Management and Industrial Relations McMaster University, DeGroote School of Business

    Claire McCartney
    Diversity & Inclusion Advisor
    CIPD

    Teresa Hopke
    SVP of Client Relations
    Life Meets Work – www.lifemeetswork.com

    Mark Tippey
    IT Leader and Experienced Teleworker

    Dr. Kenneth Matos
    Senior Director of Research
    Families and Work Institute

    1 anonymous contributor

    Appendix I: Sample focus group questions

    See Info-Tech's Focus Group Guidefor guidance on setting up and delivering focus groups. Customize the guide with questions specific to flexible work (see sample questions below) to gain deeper insight into employee preferences for the feasibility assessment in Step 2 of this blueprint.

    Document themes in the Targeted Flexible Work Program Workbook.

    • What do you need to balance/integrate your work with your personal life?
    • What challenges do you face in achieving work-life balance/integration?
    • What about your job is preventing you from achieving work-life balance/integration?
    • How would [flexible work option] help you achieve work-life balance/integration?
    • How well would this option work with the workflow of your team or department? What would need to change?
    • What challenges do you see in adopting [flexible work option]?
    • What else would be helpful for you to achieve work-life balance/integration?
    • How could we customize [flexible work option] to ensure it meets your needs?
    • If this program were to fail, what do you think would be the top reasons and why?

    Appendix II: Communication key messaging

    1. Program purpose

    Start with the name and high-level purpose of the program.

    2. Business reasons for the program

    Share data you gathered in Step 1, illustrating challenges causing the need for the program and the benefits.

    3. Options selection process

    Outline the process followed to select options. Remember to share the involvement of stakeholders and the planning around employees' feedback, needs, and lived experiences.

    4. Options and eligibility

    Provide a brief overview of the options and eligibility. Specify that the organization is piloting these options and will modify them based on feedback.

    5. Approval not guaranteed

    Qualify that employees need to be "flexible about flexible work" – the options are not guaranteed and may sometimes be unavailable for business reasons.

    6. Shared responsibility

    Highlight the importance of everyone (managers, flexible workers, the team) working together to make flexible work achievable.

    7. Next steps

    Share any next steps, such as where employees can find the organization's Guide to Flexible Work for Managers and Employees, how to make flexible work a success, or if managers will be providing further detail in a team meeting.

    8. Ongoing communications

    Normalize the program and embed it in organizational culture by continuing communications through various media, such as the organization's newsletter or announcements in town halls.

    Works Cited

    Baziuk, Jennifer, and Duncan Meadows. "Global Employee Survey - Key findings and implications for ICMIF." EY, June 2021. Accessed May 2022.
    "Businesses suffering 'commitment issues' on flexible working," EY, 21 Sep. 2021. Accessed May 2022.
    "IT Talent Trends 2022". Info-Tech Research Group, 2022.
    "Jabra Hybrid Ways of Working: 2021 Global Report." Jabra, Aug. 2021. Accessed May 2022.
    LinkedIn Talent Solutions. "2022 Global Talent Trends." LinkedIn, 2022. Accessed May 2022.
    Lobosco, Mark. "The Future of Work is Flexible: 71% of Leaders Feel Pressure to Change Working Models." LinkedIn, 9 Sep. 2021. Accessed May 2022.
    Ohm, Joy, et al. "Covid-19: Women, Equity, and Inclusion in the Future of Work." Catalyst, 28 May 2020. Accessed May 2022.
    Pelta, Rachel. "Many Workers Have Quit or Plan to After Employers Revoke Remote Work." FlexJobs, 2021. Accessed May 2022.
    Slack Future Forum. "Inflexible return-to-office policies are hammering employee experience scores." Slack, 19 April 2022. Accessed May 2022.
    "State of Hybrid Work in IT: A Trend Report". Info-Tech Research Group, 2023.
    Threlkeld, Kristy. "Employee Burnout Report: COVID-19's Impact and 3 Strategies to Curb It." Indeed, 11 March 2021. Accessed March 2022.

    We may not be able to show you this

    We may not be able to show you this just yet.
    Our deeper, more detailed content is reserved for Tymans Group clients. 

    If you are interested in retaining our services or would really like access, please contact us. 

    Service Management Integration With Agile Practices

    • Buy Link or Shortcode: {j2store}400|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Service Management
    • Parent Category Link: /service-management

    • Work efficiently and in harmony with Agile and service management to deliver business value.
    • Optimize the value stream of services and products.
    • Leverage the benefits of each practice.
    • Create a culture of collaboration to support a rapidly changing business.

    Our Advice

    Critical Insight

    Agile and Service Management are not necessarily at odds; find the integration points to solve specific problems.

    Impact and Result

    • Optimize the value stream of services and products.
    • Work efficiently and in harmony with Agile and service management to deliver business value.
    • Create a culture of collaboration to support a rapidly changing business.

    Service Management Integration With Agile Practices Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Service Management Integration With Agile Practices Storyboard – Use this deck to understand the integration points and how to overcome common challenges.

    Understand how service management integrates with Agile software development practices, and how to solve the most common challenges to work efficiently and deliver business value.

    • Service Management Integration With Agile Practices Storyboard

    2. Service Management Stakeholder Register Template – Use this tool to identify and document Service Management stakeholders.

    Use this tool to identify your stakeholders to engage when working on the service management integration.

    • ITSM Stakeholder Register Template

    3. Service Management Integration With Agile Practices Assessment Tool – Use this tool to identify key challenging integration points in your organization.

    Use this tool to identify which of your current practices might already be aligned with Agile mindset and which might need adjustment. Identify integration challenges with the current service management practices.

    • Service Management Integration With Agile Practices Assessment Tool
    [infographic]

    Further reading

    Service Management Integration With Agile Practices

    Understand how Agile transformation affects service management

    Analyst Perspective

    Don't forget about operations

    Many organizations believe that once they have implemented Agile that they no longer need any service management framework, like ITIL. They see service management as "old" and a roadblock to deliver products and services quickly. The culture clash is obvious, and it is the most common challenge people face when trying to integrate Agile and service management. However, it is not the only challenge. Agile methodologies are focused on optimized delivery. However, what happens after delivery is often overlooked. Operations may not receive proper communication or documentation, and processes are cumbersome or non-existent. This is a huge paradox if an organization is trying to become nimbler. You need to find ways to integrate your Agile practices with your existing Service Management processes.

    This is a picture of Renata Lopes

    Renata Lopes
    Senior Research Analyst
    Organizational Transformation Practice
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    • Work efficiently and in harmony with Agile and service management to deliver business value.
    • Optimize the value stream of services and products.
    • Leverage the benefits of each practice.
    • Create a culture of collaboration to support a rapidly changing business.

    Common Obstacles

    • Culture clashes.
    • Inefficient or inexistent processes.
    • Lack of understanding of what Agile and service management mean.
    • Leadership doesn't understand the integration points of practices.
    • Development overlooks the operations requirement.

    Info-Tech's Approach

    • When integrating Agile and service management practices start by understanding the key integration points:
    • Processes
    • People and resources
    • Governance and org structure

    Info-Tech Insight

    Agile and Service Management are not necessarily at odds Find the integration points to solve specific problems.

    Your challenge

    Deliver seamless business value by integrating service management and Agile development.

    • Understand how Agile development impacts service management.
    • Identify bottlenecks and inefficiencies when integrating with service management.
    • Connect teams across the organization to collaborate toward the organizational goals.
    • Ensure operational requirements are considered while developing products in an Agile way.
    • Stay in alignment when designing and delivering services.

    The most significant Agile adoption barriers

    46% of respondents identified inconsistent processes and practices across teams as a challenge.
    Source: Digital.ai, 2021

    43% of respondents identified Culture clashes as a challenge.
    Source: Digital.ai, 2021

    What is Agile?

    Agile development is an umbrella term for several iterative and incremental development methodologies to develop products.

    In order to achieve Agile development, organizations will adopt frameworks and methodologies like Scaled Agile Framework (SAFe), Scrum, Large Scaled Scrum (LeSS), DevOps, Spotify Way of Working (WoW), etc.

    • DevOps
    • WoW
    • SAFe
    • Scrum
    • LeSS

    Cyber Resilience Report 2018

    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A

    "The cyber threat landscape today is highly complex and rapidly changing. Cyber security incidents can have several impacts on organizations and society, both on a physical and non-physical level. Through the use of a computer, criminals can indeed cause IT outages, supply chain disruptions and other physical security incidents"

    -- excerpt from the foreword of the BCI Cyber resilience report 2018 by David Thorp, Executive Director, BCI

    There are a number of things you can do to protect yourself. And they range, as usual, from the fairly simple to the more elaborate and esoteric. Most companies can, with some common sense, if not close the door on most of these issues, at least prepare themselves to limit the consequences.

    Register to read more …

    Mergers & Acquisitions: The Sell Blueprint

    • Buy Link or Shortcode: {j2store}324|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: IT Strategy
    • Parent Category Link: /it-strategy

    There are four key scenarios or entry points for IT as the selling/divesting organization in M&As:

    • IT can suggest a divestiture to meet the business objectives of the organization.
    • IT is brought in to strategy plan the sale/divestiture from both the business’ and IT’s perspectives.
    • IT participates in due diligence activities and complies with the purchasing organization’s asks.
    • IT needs to reactively prepare its environment to enable the separation.

    Consider the ideal scenario for your IT organization.

    Our Advice

    Critical Insight

    Divestitures are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:

    • The growing trend for organizations to increase, decrease, or evolve through these types of transactions.
    • A maturing business perspective of IT, preventing the difficulty that IT is faced with when invited into the transaction process late.
    • Transactions that are driven by digital motivations, requiring IT’s expertise.
    • There never being such a thing as a true merger, making the majority of M&A activity either acquisitions or divestitures.

    Impact and Result

    Prepare for a sale/divestiture transaction by:

    • Recognizing the trend for organizations to engage in M&A activity and the increased likelihood that, as an IT leader, you will be involved in a transaction in your career.
    • Creating a standard strategy that will enable strong program management.
    • Properly considering all the critical components of the transaction and integration by prioritizing tasks that will reduce risk, deliver value, and meet stakeholder expectations.

    Mergers & Acquisitions: The Sell Blueprint Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how your organization can excel its reduction strategy by engaging in M&A transactions. Review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Proactive Phase

    Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.

    • One-Pager: M&A Proactive
    • Case Study: M&A Proactive
    • Information Asset Audit Tool
    • Data Valuation Tool
    • Enterprise Integration Process Mapping Tool
    • Risk Register Tool
    • Security M&A Due Diligence Tool
    • Service Catalog Internal Service Level Agreement Template

    2. Discovery & Strategy

    Create a standardized approach for how your IT organization should address divestitures or sales.

    • One-Pager: M&A Discovery & Strategy – Sell
    • Case Study: M&A Discovery & Strategy – Sell

    3. Due Diligence & Preparation

    Comply with due diligence, prepare the IT environment for carve-out possibilities, and establish the separation project plan.

    • One-Pager: M&A Due Diligence & Preparation – Sell
    • Case Study: M&A Due Diligence & Preparation – Sell
    • IT Due Diligence Charter
    • IT Culture Diagnostic
    • M&A Separation Project Management Tool (SharePoint)
    • SharePoint Template: Step-by-Step Deployment Guide
    • M&A Separation Project Management Tool (Excel)

    4. Execution & Value Realization

    Deliver on the separation project plan successfully and communicate IT’s transaction value to the business.

    • One-Pager: M&A Execution & Value Realization – Sell
    • Case Study: M&A Execution & Value Realization – Sell

    Infographic

    Workshop: Mergers & Acquisitions: The Sell Blueprint

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Pre-Transaction Discovery & Strategy

    The Purpose

    Establish the transaction foundation.

    Discover the motivation for divesting or selling.

    Formalize the program plan.

    Create the valuation framework.

    Strategize the transaction and finalize the M&A strategy and approach.

    Key Benefits Achieved

    All major stakeholders are on the same page.

    Set up crucial elements to facilitate the success of the transaction.

    Have a repeatable transaction strategy that can be reused for multiple organizations.

    Activities

    1.1 Conduct the CIO Business Vision and CEO-CIO Alignment diagnostics.

    1.2 Identify key stakeholders and outline their relationship to the M&A process.

    1.3 Understand the rationale for the company's decision to pursue a divestiture or sale.

    1.4 Assess the IT/digital strategy.

    1.5 Identify pain points and opportunities tied to the divestiture/sale.

    1.6 Create the IT vision statement and mission statement and identify IT guiding principles and the transition team.

    1.7 Document the M&A governance.

    1.8 Establish program metrics.

    1.9 Create the valuation framework.

    1.10 Establish the separation strategy.

    1.11 Conduct a RACI.

    1.12 Create the communication plan.

    1.13 Prepare to assess target organizations.

    Outputs

    Business perspectives of IT

    Stakeholder network map for M&A transactions

    Business context implications for IT

    IT’s divestiture/sale strategic direction

    Governance structure

    M&A program metrics

    IT valuation framework

    Separation strategy

    RACI

    Communication plan

    Prepared to assess target organization(s)

    2 Mid-Transaction Due Diligence & Preparation

    The Purpose

    Establish the foundation.

    Discover the motivation for separation.

    Identify expectations and create the carve-out roadmap.

    Prepare and manage employees.

    Plan the separation roadmap.

    Key Benefits Achieved

    All major stakeholders are on the same page.

    Methodology identified to enable compliance during due diligence.

    Employees are set up for a smooth and successful transition.

    Separation activities are planned and assigned.

    Activities

    2.1 Gather and evaluate the stakeholders involved, M&A strategy, future-state operating model, and governance.

    2.2 Review the business rationale for the divestiture/sale.

    2.3 Establish the separation strategy.

    2.4 Create the due diligence charter.

    2.5 Create a list of IT artifacts to be reviewed in the data room.

    2.6 Create a carve-out roadmap.

    2.7 Create a service/technical transaction agreement.

    2.8 Measure staff engagement.

    2.9 Assess the current culture and identify the goal culture.

    2.10 Create employee transition and functional workplans.

    2.11 Establish the separation roadmap.

    2.12 Establish and align project metrics with identified tasks.

    2.13 Estimate integration costs.

    Outputs

    Stakeholder map

    IT strategy assessed

    IT operating model and IT governance structure defined

    Business context implications for IT

    Separation strategy

    Due diligence charter

    Data room artifacts

    Carve-out roadmap

    Service/technical transaction agreement

    Engagement assessment

    Culture assessment

    Employee transition and functional workplans

    Integration roadmap and associated resourcing

    3 Post-Transaction Execution & Value Realization

    The Purpose

    Establish the transaction foundation.

    Discover the motivation for separation.

    Plan the separation roadmap.

    Prepare employees for the transition.

    Engage in separation.

    Assess the transaction outcomes.

    Key Benefits Achieved

    All major stakeholders are on the same page.

    Separation activities are planned and assigned.

    Employees are set up for a smooth and successful transition.

    Separation strategy and roadmap are executed to benefit the organization.

    Review what went well and identify improvements to be made in future transactions.

    Activities

    3.1 Identify key stakeholders and outline their relationship to the M&A process.

    3.2 Gather and evaluate the M&A strategy, future-state operating model, and governance.

    3.3 Review the business rationale for the divestiture/sale.

    3.4 Establish the separation strategy.

    3.5 Prioritize separation tasks.

    3.6 Establish the separation roadmap.

    3.7 Establish and align project metrics with identified tasks.

    3.8 Estimate separation costs.

    3.9 Measure staff engagement.

    3.10 Assess the current culture and identify the goal culture.

    3.11 Create employee transition and functional workplans.

    3.12 Complete the separation by regularly updating the project plan.

    3.13 Assess the service/technical transaction agreement.

    3.14 Confirm separation costs.

    3.15 Review IT’s transaction value.

    3.16 Conduct a transaction and separation SWOT.

    3.17 Review the playbook and prepare for future transactions.

    Outputs

    M&A transaction team

    Stakeholder map

    IT strategy assessed

    IT operating model and IT governance structure defined

    Business context implications for IT

    Separation strategy

    Separation roadmap and associated resourcing

    Engagement assessment

    Culture assessment

    Employee transition and functional workplans

    Updated separation project plan

    Evaluated service/technical transaction agreement

    SWOT of transaction

    M&A Sell Playbook refined for future transactions

    Further reading

    Mergers & Acquisitions: The Sell Blueprint

    For IT leaders who want to have a role in the transaction process when their business is engaging in an M&A sale or divestiture.

    EXECUTIVE BRIEF

    Analyst Perspective

    Don’t wait to be invited to the M&A table, make it.

    Photo of Brittany Lutes, Research Analyst, CIO Practice, Info-Tech Research Group.
    Brittany Lutes
    Research Analyst,
    CIO Practice
    Info-Tech Research Group
    Photo of Ibrahim Abdel-Kader, Research Analyst, CIO Practice, Info-Tech Research Group.
    Ibrahim Abdel-Kader
    Research Analyst,
    CIO Practice
    Info-Tech Research Group

    IT has always been an afterthought in the M&A process, often brought in last minute once the deal is nearly, if not completely, solidified. This is a mistake. When IT is brought into the process late, the business misses opportunities to generate value related to the transaction and has less awareness of critical risks or inaccuracies.

    To prevent this mistake, IT leadership needs to develop strong business relationships and gain respect for their innovative suggestions. In fact, when it comes to modern M&A activity, IT should be the ones suggesting potential transactions to meet business needs, specifically when it comes to modernizing the business or adopting digital capabilities.

    IT needs to stop waiting to be invited to the acquisition or divestiture table. IT needs to suggest that the table be constructed and actively work toward achieving the strategic objectives of the business.

    Executive Summary

    Your Challenge

    There are four key scenarios or entry points for IT as the selling/divesting organization in M&As:

    • IT can suggest a divestiture to meet the business objectives of the organization.
    • IT is brought in to strategy plan the sale/divestiture from both the business’ and IT’s perspectives.
    • IT participates in due diligence activities and complies with the purchasing organization’s asks.
    • IT needs to reactively prepare its environment to enable the separation.

    Consider the ideal scenario for your IT organization.

    Common Obstacles

    Some of the obstacles IT faces include:

    • IT is often told about the transaction once the deal has already been solidified and is now forced to meet unrealistic business demands.
    • The business does not trust IT and therefore does not approach IT to define value or reduce risks to the transaction process.
    • The people and culture element is forgotten or not given adequate priority.

    These obstacles often arise when IT waits to be invited into the transaction process and misses critical opportunities.

    Info-Tech's Approach

    Prepare for a sale/divestiture transaction by:

    • Recognizing the trend for organizations to engage in M&A activity and the increased likelihood that, as an IT leader, you will be involved in a transaction in your career.
    • Creating a standard strategy that will enable strong program management.
    • Properly considering all the critical components of the transaction and integration by prioritizing tasks that will reduce risk, deliver value, and meet stakeholder expectations.

    Info-Tech Insight

    As the number of merger, acquisition, and divestiture transactions continues to increase, so too does IT’s opportunity to leverage the growing digital nature of these transactions and get involved at the onset.

    The changing M&A landscape

    Businesses will embrace more digital M&A transactions in the post-pandemic world

    • When the pandemic occurred, businesses reacted by either pausing (61%) or completely cancelling (46%) deals that were in the mid-transaction state (Deloitte, 2020). The uncertainty made many organizations consider whether the risks would be worth the potential benefits.
    • However, many organizations quickly realized the pandemic is not a hindrance to M&A transactions but an opportunity. Over 16,000 American companies were involved in M&A transactions in the first six months of 2021 (The Economist). For reference, this had been averaging around 10,000 per six months from 2016 to 2020.
    • In addition to this transaction growth, organizations have increasingly been embracing digital. These trends increase the likelihood that, as an IT leader, you will engage in an M&A transaction. However, it is up to you when you get involved in the transactions.

    The total value of transactions in the year after the pandemic started was $1.3 billion – a 93% increase in value compared to before the pandemic. (Nasdaq)

    71% of technology companies anticipate that divestitures will take place as a result of the COVID-19 pandemic. (EY, 2020)

    Your challenge

    IT is often not involved in the M&A transaction process. When it is, it’s often too late.

    • The most important driver of an acquisition is the ability to access new technology (DLA Piper), and yet 50% of the time, IT isn’t involved in the M&A transaction at all (IMAA Institute, 2017).
    • Additionally, IT’s lack of involvement in the process negatively impacts the business:
      • Most organizations (60%) do not have a standardized approach to integration (Steeves and Associates), let alone separation.
      • Two-thirds of the time, the divesting organization and acquiring organization will either fail together or succeed together (McKinsey, 2015).
      • Less than half (47%) of organizations actually experience the positive results sought by the M&A transaction (Steeves and Associates).
    • Organizations pursuing M&A and not involving IT are setting themselves up for failure.

    Only half of M&A deals involve IT (Source: IMAA Institute, 2017)

    Common Obstacles

    These barriers make this challenge difficult to address for many organizations:

    • IT is rarely afforded the opportunity to participate in the transaction deal. When IT is invited, this often happens later in the process where separation will be critical to business continuity.
    • IT has not had the opportunity to demonstrate that it is a valuable business partner in other business initiatives.
    • One of the most critical elements that IT often doesn’t take the time or doesn’t have the time to focus on is the people and leadership component.
    • IT waits to be invited to the process rather then actively involving themselves and suggesting how value can be added to the process.

    In hindsight, it’s clear to see: Involving IT is just good business.

    47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion. (Source: IMAA Institute, 2017)

    “Solutions exist that can save well above 50 percent on divestiture costs, while ensuring on-time delivery.” (Source: SNP)

    Info-Tech's approach

    Acquisitions & Divestitures Framework

    Acquisitions and divestitures are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:

    1. The growing trend for organizations to increase, decrease, or evolve through these types of transactions.
    2. Transactions that are driven by digital motivations, requiring IT’s expertise.
    3. A maturing business perspective of IT, preventing the difficulty that IT is faced with when invited into the transaction process late.
    4. There never being such a thing as a true merger, making the majority of M&A activity either acquisitions or divestitures.
    A diagram highlighting the 'IT Executives' Role in Acquisitions and Divestitures' when they are integrated at different points in the 'Core Business Timeline'. There are four main entry points 'Proactive', 'Discovery and Strategy', 'Due Diligence and Preparation', and 'Execution and Value Realized'. It is highlighted that IT can and should start at 'Proactive', but most organizations start at 'Execution and Value Realized'. 'Proactive': suggest opportunities to evolve the organization; prove IT's value and engage in growth opportunities early. Innovators start here. Steps of the business timeline in 'Proactive' are 'Organization strategies are defined' and 'M and A is considered to enable strategy'. After a buy or sell transaction is initiated is 'Discovery and Strategy': pre-transaction state. If it is a Buy transaction, 'Establish IT's involvement and approach'. If it is a Sell transaction, 'Prepare to engage in negotiations'. Business Partners start here. Steps of the business timeline in 'Discovery and Strategy' are 'Searching criteria is set', 'Potential candidates are considered', and 'LOI is sent/received'. 'Due Diligence and Preparation': mid-transaction state. If it is a Buy transaction, 'Identify potential transaction benefits and risks'. If it is a Sell transaction, 'Comply, communicate, and collaborate in transaction'. Trusted Operators start here. Steps of the business timeline in 'Due Diligence and Preparation' are 'Due diligence engagement occurs', 'Final agreement is reached', and 'Preparation for transaction execution occurs'. 'Execution and Value Realization': post-transaction state. If it is a Buy transaction, 'Integrate the IT environments and achieve business value'. If it is a Sell transaction, 'Separate the IT environment and deliver on transaction terms'. Firefighters start here. Steps of the business timeline in 'Execution and Value Realization' are 'Staff and operations are addressed appropriately', 'Day 1 of implementation and integration activities occurs', '1st 100 days of new entity state occur' and 'Ongoing risk mitigating and value creating activities occur'.

    The business’ view of IT will impact how soon IT can get involved

    There are four key entry points for IT

    A colorful visualization of the four key entry points for IT and a fifth not-so-key entry point. Starting from the top: 'Innovator', Information and Technology as a Competitive Advantage, 90% Satisfaction; 'Business Partner', Effective Delivery of Strategic Business Projects, 80% Satisfaction; 'Trusted Operator', Enablement of Business Through Application and Work Orders, 70% Satisfaction; 'Firefighter', Reliable Infrastructure and IT Service Desk, 60% Satisfaction; and then 'Unstable', Inability to Consistently Deliver Basic Services, <60% Satisfaction.
    1. Innovator: IT suggests a sale or divestiture to meet the business objectives of the organization.
    2. Business Partner: IT is brought in to strategy plan the sale/divestiture from both the business’ and IT’s perspective.
    3. Trusted Operator: IT participates in due diligence activities and complies with the purchasing organization’s asks.
    4. Firefighter: IT needs to reactively prepare its environment in order to enable the separation.

    Merger, acquisition, and divestiture defined

    Merger

    A merger looks at the equal combination of two entities or organizations. Mergers are rare in the M&A space, as the organizations will combine assets and services in a completely equal 50/50 split. Two organizations may also choose to divest business entities and merge as a new company.

    Acquisition

    The most common transaction in the M&A space, where an organization will acquire or purchase another organization or entities of another organization. This type of transaction has a clear owner who will be able to make legal decisions regarding the acquired organization.

    Divestiture

    An organization may decide to sell partial elements of a business to an acquiring organization. They will separate this business entity from the rest of the organization and continue to operate the other components of the business.

    Info-Tech Insight

    A true merger does not exist, as there is always someone initiating the discussion. As a result, most M&A activity falls into acquisition or divestiture categories.

    Selling vs. buying

    The M&A process approach differs depending on whether you are the selling or buying organization

    This blueprint is only focused on the sell side:

    • Examples of sell-related scenarios include:
      • Your organization is selling to another organization with the intent of keeping its regular staff, operations, and location. This could mean minimal separation is required.
      • Your organization is selling to another organization with the intent of separating to be a part of the purchasing organization.
      • Your organization is engaging in a divestiture with the intent of:
        • Separating components to be part of the purchasing organization permanently.
        • Separating components to be part of a spinoff and establish a unit as a standalone new company.
    • As the selling organization, you could proactively seek out suitors to purchase all or components of your organization, or you could be approached by an organization.

    The buy side is focused on:

    • More than two organizations could be involved in a transaction.
    • Examples of buy-related scenarios include:
      • Your organization is buying another organization with the intent of having the purchased organization keep its regular staff, operations, and location. This could mean minimal integration is required.
      • Your organization is buying another organization in its entirety with the intent of integrating it into your original company.
      • Your organization is buying components of another organization with the intent of integrating them into your original company.
    • As the purchasing organization, you will probably be initiating the purchase and thus will be valuating the selling organization during due diligence and leading the execution plan.

    For more information on acquisitions or purchases, check out Info-Tech’s Mergers & Acquisitions: The Buy Blueprint.

    Core business timeline

    For IT to be valuable in M&As, you need to align your deliverables and your support to the key activities the business and investors are working on.

    Info-Tech’s methodology for Selling Organizations in Mergers, Acquisitions, or Divestitures

    1. Proactive

    2. Discovery & Strategy

    3. Due Diligence & Preparation

    4. Execution & Value Realization

    Phase Steps

    1. Identify Stakeholders and Their Perspective of IT
    2. Assess IT’s Current Value and Future State
    3. Drive Innovation and Suggest Growth Opportunities
    1. Establish the M&A Program Plan
    2. Prepare IT to Engage in the Separation or Sale
    1. Engage in Due Diligence and Prepare Staff
    2. Prepare to Separate
    1. Execute the Transaction
    2. Reflection and Value Realization

    Phase Outcomes

    Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.

    Create a standardized approach for how your IT organization should address divestitures or sales.

    Comply with due diligence, prepare the IT environment for carve-out possibilities, and establish the separation project plan.

    Deliver on the separation project plan successfully and communicate IT’s transaction value to the business.

    Metrics for each phase

    1. Proactive

    2. Discovery & Strategy

    3. Valuation & Due Diligence

    4. Execution & Value Realization

    • % Share of business innovation spend from overall IT budget
    • % Critical processes with approved performance goals and metrics
    • % IT initiatives that meet or exceed value expectation defined in business case
    • % IT initiatives aligned with organizational strategic direction
    • % Satisfaction with IT's strategic decision-making abilities
    • $ Estimated business value added through IT-enabled innovation
    • % Overall stakeholder satisfaction with IT
    • % Percent of business leaders that view IT as an Innovator
    • % IT budget as a percent of revenue
    • % Assets that are not allocated
    • % Unallocated software licenses
    • # Obsolete assets
    • % IT spend that can be attributed to the business (chargeback or showback)
    • % Share of CapEx of overall IT budget
    • % Prospective organizations that meet the search criteria
    • $ Total IT cost of ownership (before and after M&A, before and after rationalization)
    • % Business leaders that view IT as a Business Partner
    • % Defects discovered in production
    • $ Cost per user for enterprise applications
    • % In-house-built applications vs. enterprise applications
    • % Owners identified for all data domains
    • # IT staff asked to participate in due diligence
    • Change to due diligence
    • IT budget variance
    • Synergy target
    • % Satisfaction with the effectiveness of IT capabilities
    • % Overall end-customer satisfaction
    • $ Impact of vendor SLA breaches
    • $ Savings through cost-optimization efforts
    • $ Savings through application rationalization and technology standardization
    • # Key positions empty
    • % Frequency of staff turnover
    • % Emergency changes
    • # Hours of unplanned downtime
    • % Releases that cause downtime
    • % Incidents with identified problem record
    • % Problems with identified root cause
    • # Days from problem identification to root cause fix
    • % Projects that consider IT risk
    • % Incidents due to issues not addressed in the security plan
    • # Average vulnerability remediation time
    • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
    • # Time (days) to value realization
    • % Projects that realized planned benefits
    • $ IT operational savings and cost reductions that are related to synergies/divestitures
    • % IT staff–related expenses/redundancies
    • # Days spent on IT separation
    • $ Accurate IT budget estimates
    • % Revenue growth directly tied to IT delivery
    • % Profit margin growth

    IT's role in the selling transaction

    And IT leaders have a greater likelihood than ever of needing to support a merger, acquisition, or divestiture.

    1. Reduced Risk

      IT can identify risks that may go unnoticed when IT is not involved.
    2. Increased Accuracy

      The business can make accurate predictions around the costs, timelines, and needs of IT.
    3. Faster Integration

      Faster integration means faster value realization for the business.
    4. Informed Decision Making

      IT leaders hold critical information that can support the business in moving the transaction forward.
    5. Innovation

      IT can suggest new opportunities to generate revenue, optimize processes, or reduce inefficiencies.

    The IT executive’s critical role is demonstrated by:

    • Reduced Risk

      47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion (IMAA Institute, 2017).
    • Increased Accuracy

      Sellers often only provide 15 to 30 days for the acquiring organization to decide (Forbes, 2018), increasing the necessity of accurate pricing.
    • Faster Integration

      36% of CIOs have visibility into only business unit data, making the divestment a challenge (EY, 2021).
    • Informed Decision Making

      Only 38% of corporate and 22% of private equity firms include IT as a significant aspect in their transaction approach (IMAA Institute, 2017).
    • Innovation

      Successful CIOs involved in M&As can spend 70% of their time on aspects outside of IT and 30% of their time on technology and delivery (CIO).

    Playbook benefits

    IT Benefits

    • IT will be seen as an innovative partner to the business, and its suggestions and involvement in the organization will lead to benefits, not hindrances.
    • Develop a streamlined method to prepare the IT environment for potential carve-out and separations, ensuring risk management concerns are brought to the business’ attention immediately.
    • Create a comprehensive list of items that IT needs to do during the separation that can be prioritized and actioned.

    Business Benefits

    • The business will get accurate and relevant information about its IT environment in order to sell or divest the company to the highest bidder for a true price.
    • Fewer business interruptions will happen, because IT can accurately plan for and execute the high-priority separation tasks.
    • The business can obtain a high-value offer for the components of IT being sold and can measure the ongoing value the sale will bring.

    Insight summary

    Overarching Insight

    IT controls if and when it gets invited to support the business through a purchasing growth transaction. Take control of the process, demonstrate the value of IT, and ensure that separation of IT environments does not lead to unnecessary and costly decisions.

    Proactive Insight

    CIOs on the forefront of digital transformation need to actively look for and suggest opportunities to acquire or partner on new digital capabilities to respond to rapidly changing business needs.

    Discovery & Strategy Insight

    IT organizations that have an effective M&A program plan are more prepared for the transaction, enabling a successful outcome. A structured strategy is particularly necessary for organizations expected to deliver M&As rapidly and frequently.

    Due Diligence & Preparation Insight

    IT often faces unnecessary separation challenges because of a lack of preparation. Secure the IT environment and establish how IT will retain employees early in the transaction process.

    Execution & Value Realization Insight

    IT needs to demonstrate value and cost savings within 100 days of the transaction. The most successful transactions are when IT continuously realizes synergies a year after the transaction and beyond.

    Blueprint deliverables

    Key Deliverable: M&A Sell Playbook

    The M&A Sell Playbook should be a reusable document that enables your IT organization to successfully deliver on any divestiture transaction.

    Screenshots of the 'M and A Sell Playbook' deliverable.

    M&A Sell One-Pager

    See a one-page overview of each phase of the transaction.

    Screenshots of the 'M and A Sell One-Pagers' deliverable.

    M&A Sell Case Studies

    Read a one-page case study for each phase of the transaction.

    Screenshots of the 'M and A Sell Case Studies' deliverable.

    M&A Separation Project Management Tool (SharePoint)

    Manage the separation process of the divestiture/sale using this SharePoint template.

    Screenshots of the 'M and A Separation Project Management Tool (SharePoint)' deliverable.

    M&A Separation Project Management Tool (Excel)

    Manage the separation process of the divestiture/sale using this Excel tool if you can’t or don’t want to use SharePoint.

    Screenshots of the 'M and A Separation Project Management Tool (Excel)' deliverable.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Guided Implementation

    What does a typical GI on this topic look like?

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is between 6 to 10 calls over the course of 2 to 4 months.

      Proactive Phase

    • Call #1: Scope requirements, objectives, and your specific challenges.
    • Discovery & Strategy Phase

    • Call #2: Determine stakeholders and business perspectives on IT.
    • Call #3: Identify how M&A could support business strategy and how to communicate.
    • Due Diligence & Preparation Phase

    • Call #4: Establish a transaction team and divestiture/sale strategic direction.
    • Call #5: Create program metrics and identify a standard separation strategy.
    • Call #6: Prepare to carve out the IT environment.
    • Call #7: Identify the separation program plan.
    • Execution & Value Realization Phase

    • Call #8: Establish employee transitions to retain key staff.
    • Call #9: Assess IT’s ability to deliver on the divestiture/sale transaction.

    The Sell Blueprint

    Phase 1

    Proactive

    Phase 1

    Phase 2 Phase 3 Phase 4
    • 1.1 Identify Stakeholders and Their Perspective of IT
    • 1.2 Assess IT’s Current Value and Future State
    • 1.3 Drive Innovation and Suggest Reduction Opportunities
    • 2.1 Establish the M&A Program Plan
    • 2.2 Prepare IT to Engage in the Separation or Sale
    • 3.1 Engage in Due Diligence and Prepare Staff
    • 3.2 Prepare to Separate
    • 4.1 Execute the Transaction
    • 4.2 Reflection and Value Realization

    This phase will walk you through the following activities:

    • Conduct the CEO-CIO Alignment diagnostic
    • Conduct the CIO Business Vision diagnostic
    • Visualize relationships among stakeholders to identify key influencers
    • Group stakeholders into categories
    • Prioritize your stakeholders
    • Plan to communicate
    • Valuate IT
    • Assess the IT/digital strategy
    • Determine pain points and opportunities
    • Align goals to opportunities
    • Recommend reduction opportunities

    This phase involves the following participants:

    • IT and business leadership

    What is the Proactive phase?

    Embracing the digital drivers

    As the number of merger, acquisition, or divestiture transactions driven by digital means continues to increase, IT has an opportunity to not just be involved in a transaction but actively seek out potential deals.

    In the Proactive phase, the business is not currently considering a transaction. However, the business could consider one to reach its strategic goals. IT organizations that have developed respected relationships with the business leaders can suggest these potential transactions.

    Understand the business’ perspective of IT, determine who the critical M&A stakeholders are, valuate the IT environment, and examine how it supports the business goals in order to suggest an M&A transaction.

    In doing so, IT isn’t waiting to be invited to the transaction table – it’s creating it.

    Goal: To support the organization in reaching its strategic goals by suggesting M&A activities that will enable the organization to reach its objectives faster and with greater-value outcomes.

    Proactive Prerequisite Checklist

    Before coming into the Proactive phase, you should have addressed the following:

    • Understand what mergers, acquisitions, and divestitures are.
    • Understand what mergers, acquisitions, and divestitures mean for the business.
    • Understand what mergers, acquisitions, and divestitures mean for IT.

    Review the Executive Brief for more information on mergers, acquisitions, and divestitures for selling organizations.

    Proactive

    Step 1.1

    Identify M&A Stakeholders and Their Perspective of IT

    Activities

    • 1.1.1 Conduct the CEO-CIO Alignment diagnostic
    • 1.1.2 Conduct the CIO Business Vision diagnostic
    • 1.1.3 Visualize relationships among stakeholders to identify key influencers
    • 1.1.4 Group stakeholders into categories
    • 1.1.5 Prioritize your stakeholders
    • 1.16 Plan to communicate

    This step involves the following participants:

    • IT executive leader
    • IT leadership
    • Critical M&A stakeholders

    Outcomes of Step

    Understand how the business perceives IT and establish strong relationships with critical M&A stakeholders.

    Business executives' perspectives of IT

    Leverage diagnostics and gain alignment on IT’s role in the organization

    • To suggest or get involved with a merger, acquisition, or divestiture, the IT executive leader needs to be well respected by other members of the executive leadership team and the business.
    • Specifically, the Proactive phase relies on the IT organization being viewed as an Innovator within the business.
    • Identify how the CEO/business executive currently views IT and where they would like IT to move within the Maturity Ladder.
    • Additionally, understand how other critical department leaders view IT and how they view the partnership with IT.
    A colorful visualization titled 'Maturity Ladder' detailing levels of IT function that a business may choose from based on the business executives' perspectives of IT. Starting from the bottom: 'Struggle', Does not embarrass, Does not crash; 'Support', Keeps business happy, Keeps costs low; 'Optimize', Increases efficiency, Decreases costs; 'Expand', Extends into new business, Generates revenue; 'Transform', Creates new industry.

    Misalignment in target state requires further communication between the CIO and CEO to ensure IT is striving toward an agreed-upon direction.

    Info-Tech’s CIO Business Vision (CIO BV) diagnostic measures a variety of high-value metrics to provide a well-rounded understanding of stakeholder satisfaction with IT.

    Sample of Info-Tech's CIO Business Vision diagnostic measuring percentages of high-value metrics like 'IT Satisfaction' and 'IT Value' regarding business leader satisfaction. A note for these two reads 'Evaluate business leader satisfaction with IT this year and last year'. A section titled 'Relationship' has metrics such as 'Understands Needs' and 'Trains Effectively'. A note for this section reads 'Examine relationship indicators between IT and the business'. A section titled 'Security Friction' has metrics such as 'Regulatory Compliance-Driven' and 'Office/Desktop Security'.

    Business Satisfaction and Importance for Core Services

    The core services of IT are important when determining what IT should focus on. The most important services with the lowest satisfaction offer the largest area of improvement for IT to drive business value.

    Sample of Info-Tech's CIO Business Vision diagnostic specifically comparing the business satisfaction of 12 core services with their importance. Services listed include 'Service Desk', 'IT Security', 'Requirements Gathering', 'Business Apps', 'Data Quality', and more. There is a short description of the services, a percentage for the business satisfaction with the service, a percentage comparing it to last year, and a numbered ranking of importance for each service. A note reads 'Assess satisfaction and importance across 12 core IT capabilities'.

    1.1.1 Conduct the CEO-CIO Alignment diagnostic

    2 weeks

    Input: IT organization expertise and the CEO-CIO Alignment diagnostic

    Output: An understanding of an executive business stakeholder’s perception of IT

    Materials: M&A Sell Playbook, CEO-CIO Alignment diagnostic

    Participants: IT executive/CIO, Business executive/CEO

    1. The CEO-CIO Alignment diagnostic can be a powerful input. Speak with your Info-Tech account representative to conduct the diagnostic. Use the results to inform current IT capabilities.
    2. You may choose to debrief the results of your diagnostic with an Info-Tech analyst. We recommend this to help your team understand how to interpret and draw conclusions from the results.
    3. Examine the results of the survey and note where there might be specific capabilities that could be improved.
    4. Determine whether there are any areas of significant disagreement between the you and the CEO. Mark down those areas for further conversations. Additionally, take note of areas that could be leveraged to support transactions or support your rationale in recommending transactions.

    Download the sample report.

    Record the results in the M&A Sell Playbook.

    1.1.2 Conduct the CIO Business Vision diagnostic

    2 weeks

    Input: IT organization expertise, CIO BV diagnostic

    Output: An understanding of business stakeholder perception of certain IT capabilities and services

    Materials: M&A Buy Playbook, CIO Business Vision diagnostic

    Participants: IT executive/CIO, Senior business leaders

    1. The CIO Business Vision (CIO BV) diagnostic can be a powerful tool for identifying IT capability focus areas. Speak with your account representative to conduct the CIO BV diagnostic. Use the results to inform current IT capabilities.
    2. You may choose to debrief the results of your diagnostic with an Info-Tech analyst. We recommend this to help your team understand how to interpret the results and draw conclusions from the diagnostic.
    3. Examine the results of the survey and take note of any IT services that have low scores.
    4. Read through the diagnostic comments and note any common themes. Especially note which stakeholders identified they have a favorable relationship with IT and which stakeholders identified they have an unfavorable relationship. For those who have an unfavorable relationship, identify if they will have a critical role in a growth transaction.

    Download the sample report.

    Record the results in the M&A Sell Playbook.

    Create a stakeholder network map for M&A transactions

    Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

    Example:

    Diagram of stakeholders and their relationships with other stakeholders, such as 'Board Members', 'CFO/Finance', 'Compliance', etc. with 'CIO/IT Leader' highlighted in the middle. There are unidirectional black arrows and bi-directional green arrows indicating each connection.

      Legend
    • Black arrows indicate the direction of professional influence
    • Dashed green arrows indicate bidirectional, informal influence relationships

    Info-Tech Insight

    Your stakeholder map defines the influence landscape that the M&A transaction will occur within. This will identify who holds various levels of accountability and decision-making authority when a transaction does take place.

    Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantial relationships with your stakeholders.

    1.1.3 Visualize relationships among stakeholders to identify key influencers

    1-3 hours

    Input: List of M&A stakeholders

    Output: Relationships among M&A stakeholders and influencers

    Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

    Participants: IT executive leadership

    1. The purpose of this activity is to list all the stakeholders within your organization that will have a direct or indirect impact on the M&A transaction.
    2. Determine the critical stakeholders, and then determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
    3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
    4. Construct a diagram linking stakeholders and their influencers together.
      • Use black arrows to indicate the direction of professional influence.
      • Use dashed green arrows to indicate bidirectional, informal influence relationships.

    Record the results in the M&A Sell Playbook.

    Categorize your stakeholders with a prioritization map

    A stakeholder prioritization map helps IT leaders categorize their stakeholders by their level of influence and ownership in the merger, acquisition, or divestiture process.

    A prioritization map of stakeholder categories split into four quadrants. The vertical axis is 'Influence', from low on the bottom to high on top. The horizontal axis is 'Ownership/Interest', from low on the left to high on the right. 'Spectators' are low influence, low ownership/interest. 'Mediators' are high influence, low ownership/interest. 'Noisemakers' are low influence, high ownership/interest. 'Players' are high influence, high ownership/interest.

    There are four areas in the map, and the stakeholders within each area should be treated differently.

    Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.

    Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.

    Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.

    Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.

    1.1.4 Group stakeholders into categories

    30 minutes

    Input: Stakeholder map, Stakeholder list

    Output: Categorization of stakeholders and influencers

    Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

    Participants: IT executive leadership, Stakeholders

    1. Identify your stakeholders’ interest in and influence on the M&A process as high, medium, or low by rating the attributes below.
    2. Map your results to the model to the right to determine each stakeholder’s category.

    Same prioritization map of stakeholder categories as before. This one has specific stakeholders mapped onto it. 'CFO' is mapped as low interest and middling influence, between 'Mediator' and 'Spectator'. 'CIO' is mapped as higher than average interest and high influence, a 'Player'. 'Board Member' is mapped as high interest and high influence, a 'Player'.

    Level of Influence
    • Power: Ability of a stakeholder to effect change.
    • Urgency: Degree of immediacy demanded.
    • Legitimacy: Perceived validity of stakeholder’s claim.
    • Volume: How loud their “voice” is or could become.
    • Contribution: What they have that is of value to you.
    Level of Interest

    How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?

    Record the results in the M&A Sell Playbook.

    Prioritize your stakeholders

    There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

    Level of Support

    Supporter

    Evangelist

    Neutral

    Blocker

    Stakeholder Category Player Critical High High Critical
    Mediator Medium Low Low Medium
    Noisemaker High Medium Medium High
    Spectator Low Irrelevant Irrelevant Low

    Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by answering the following question: How significant is that stakeholder to the M&A or divestiture process?

    These parameters are used to prioritize which stakeholders are most important and should receive your focused attention.

    1.1.5 Prioritize your stakeholders

    30 minutes

    Input: Stakeholder matrix

    Output: Stakeholder and influencer prioritization

    Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

    Participants: IT executive leadership, M&A/divestiture stakeholders

    1. Identify the level of support of each stakeholder by answering the following question: How significant is that stakeholder to the M&A transaction process?
    2. Prioritize your stakeholders using the prioritization scheme on the previous slide.

    Stakeholder

    Category

    Level of Support

    Prioritization

    CMO Spectator Neutral Irrelevant
    CIO Player Supporter Critical

    Record the results in the M&A Sell Playbook.

    Define strategies for engaging stakeholders by type

    A revisit to the map of stakeholder categories, but with strategies listed for each one, and arrows on the side instead of an axis. The vertical arrow is 'Authority', which increases upward, and the horizontal axis is Ownership/Interest which increases as it moves to the right. The strategy for 'Players' is 'Engage', for 'Mediators' is 'Satisfy', for 'Noisemakers' is 'Inform', and for 'Spectators' is 'Monitor'.

    Type

    Quadrant

    Actions

    Players High influence, high interest – actively engage Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success.
    Mediators High influence, low interest – keep satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.
    Noisemakers Low influence, high interest – keep informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.
    Spectators Low influence, low interest – monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates.

    Info-Tech Insight

    Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying stakeholder groups, the IT executive leader can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers while ensuring the needs of Mediators and Players are met.

    1.1.6 Plan to communicate

    30 minutes

    Input: Stakeholder priority, Stakeholder categorization, Stakeholder influence

    Output: Stakeholder communication plan

    Materials: Flip charts, Markers, Sticky notes, M&A Sell Playbook

    Participants: IT executive leadership, M&A/divestiture stakeholders

    The purpose of this activity is to make a communication plan for each of the stakeholders identified in the previous activities, especially those who will have a critical role in the M&A transaction process.

    1. In the M&A Sell Playbook, input the type of influence each stakeholder has on IT, how they would be categorized in the M&A process, and their level of priority. Use this information to create a communication plan.
    2. Determine the methods and frequency of communication to keep the necessary stakeholder satisfied and maintain or enhance IT’s profile within the organization.

    Record the results in the M&A Sell Playbook.

    Proactive

    Step 1.2

    Assess IT’s Current Value and Method to Achieve a Future State

    Activities

    • 1.2.1 Valuate IT
    • 1.2.2 Assess the IT/digital strategy

    This step involves the following participants:

    • IT executive leader
    • IT leadership
    • Critical stakeholders to M&A

    Outcomes of Step

    Identify critical opportunities to optimize IT and meet strategic business goals through a merger, acquisition, or divestiture.

    How to valuate your IT environment

    And why it matters so much

    • Valuating your current organization’s IT environment is a critical step that all IT organizations should take, whether involved in an M&A or not, to fully understand what it might be worth.
    • The business investments in IT can be directly translated into a value amount. For every $1 invested in IT, the business might be gaining $100 in value back or possibly even loosing $100.
    • Determining, documenting, and communicating this information ensures that the business takes IT’s suggestions seriously and recognizes why investing in IT is so critical.
    • There are three ways a business or asset can be valuated:
      • Cost Approach: Look at the costs associated with building, purchasing, replacing, and maintaining a given aspect of the business.
      • Market Approach: Look at the relative value of a particular aspect of the business. Relative value can fluctuate and depends on what the markets and consequently society believe that particular element is worth.
      • Discounted Cash Flow Approach: Focus on what the potential value of the business could be or the intrinsic value anticipated due to future profitability.
    • (Source: “Valuation Methods,” Corporate Finance Institute)

    Four ways to create value through digital

    1. Reduced costs
    2. Improved customer experience
    3. New revenue sources
    4. Better decision making
    5. (Source: McKinsey & Company)

    1.2.1 Valuate IT

    1 day

    Input: Valuation of data, Valuation of applications, Valuation of infrastructure and operations, Valuation of security and risk

    Output: Valuation of IT

    Materials: Relevant templates/tools listed on the following slides, Capital budget, Operating budget, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership

    The purpose of this activity is to demonstrate that IT is not simply an operational functional area that diminishes business resources. Rather, IT contributes significant value to the business.

    1. Review each of the following slides to valuate IT’s data, applications, infrastructure and operations, and security and risk. These valuations consider several tangible and intangible factors and result in a final dollar amount.
    2. Input the financial amounts identified for each critical area into a summary slide. Use this information to determine where IT is delivering value to the organization.

    Info-Tech Insight

    Consistency is key when valuating your IT organization as well as other IT organizations throughout the transaction process.

    Record the results in the M&A Sell Playbook.

    Data valuation

    Data valuation identifies how you monetize the information that your organization owns.

    Create a data value chain for your organization

    When valuating the information and data that exists in an organization, there are many things to consider.

    Info-Tech has two tools that can support this process:

    1. Information Asset Audit Tool: Use this tool first to take inventory of the different information assets that exist in your organization.
    2. Data Valuation Tool: Once information assets have been accounted for, valuate the data that exists within those information assets.

    Data Collection

    Insight Creation

    Value Creation

    Data Valuation

    01 Data Source
    02 Data Collection Method
    03 Data
    04 Data Analysis
    05 Insight
    06 Insight Delivery
    07 Consumer
    08 Value in Data
    09 Value Dimension
    10 Value Metrics Group
    11 Value Metrics
    Screenshots of Tab 2 of Info-Tech's Data Valuation Tool.

    Instructions

    1. Using the Data Valuation Tool, start gathering information based on the eight steps above to understand your organization’s journey from data to value.
    2. Identify the data value spectrum. (For example: customer sales service, citizen licensing service, etc.)
    3. Fill out the columns for data sources, data collection, and data first.
    4. Capture data analysis and related information.
    5. Then capture the value in data.
    6. Add value dimensions such as usage, quality, and economic dimensions.
      • Remember that economic value is not the only dimension, and usage/quality has a significant impact on economic value.
    7. Collect evidence to justify your data valuation calculator (market research, internal metrics, etc.).
    8. Finally, calculate the value that has a direct correlation with underlying value metrics.

    Application valuation

    Calculate the value of your IT applications

    When valuating the applications and their users in an organization, consider using a business process map. This shows how business is transacted in the company by identifying which IT applications support these processes and which business groups have access to them. Info-Tech has a business process mapping tool that can support this process:

    • Enterprise Integration Process Mapping Tool: Complete this tool first to map the different business processes to the supporting applications in your organization.

    Instructions

    1. Start by calculating user costs. This is the multiplication of: (# of users) × (% of time spent using IT) × (fully burdened salary).
    2. Identify the revenue per employee and divide that by the average cost per employee to calculate the derived productivity ratio (DPR).
    3. Once you have calculated the user costs and DPR, multiply those total values together to get the application value.
    4. User Costs

      Total User Costs

      Derived Productivity Ratio (DPR)

      Total DPR

      Application Value

      # of users % time spent using IT Fully burdened salary Multiply values from the 3 user costs columns Revenue per employee Average cost per employee (Revenue P.E) ÷ (Average cost P.E) (User costs) X (DPR)

    5. Once the total application value is established, calculate the combined IT and business costs of delivering that value. IT and business costs include inflexibility (application maintenance), unavailability (downtime costs, including disaster exposure), IT costs (common costs statistically allocated to applications), and fully loaded cost of active (full-time equivalent [FTE]) users.
    6. Calculate the net value of applications by subtracting the total IT and business costs from the total application value calculated in step 3.
    7. IT and Business Costs

      Total IT and Business Costs

      Net Value of Applications

      Application maintenance Downtime costs (include disaster exposure) Common costs allocated to applications Fully loaded costs of active (FTE) users Sum of values from the four IT and business costs columns (Application value) – (IT and business costs)

    (Source: CSO)

    Infrastructure valuation

    Assess the foundational elements of the business’ information technology

    The purpose of this exercise is to provide a high-level infrastructure valuation that will contribute to valuating your IT environment.

    Calculating the value of the infrastructure will require different methods depending on the environment. For example, a fully cloud-hosted organization will have different costs than a fully on-premises IT environment.

    Instructions:

    1. Start by listing all of the infrastructure-related items that are relevant to your organization.
    2. Once you have finalized your items column, identify the total costs/value of each item.
      • For example, total software costs would include servers and storage.
    3. Calculate the total cost/value of your IT infrastructure by adding all of values in the right column.

    Item

    Costs/Value

    Hardware Assets Total Value +$3.2 million
    Hardware Leased/Service Agreement -$
    Software Purchased +$
    Software Leased/Service Agreement -$
    Operational Tools
    Network
    Disaster Recovery
    Antivirus
    Data Centers
    Service Desk
    Other Licenses
    Total:

    For additional support, download the M&A Runbook for Infrastructure and Operations.

    Risk and security

    Assess risk responses and calculate residual risk

    The purpose of this exercise is to provide a high-level risk assessment that will contribute to valuating your IT environment. For a more in-depth risk assessment, please refer to the Info-Tech tools below:

    1. Risk Register Tool
    2. Security M&A Due Diligence Tool

    Instructions

    1. Review the probability and impact scales below and ensure you have the appropriate criteria that align to your organization before you conduct a risk assessment.
    2. Identify the probability of occurrence and estimated financial impact for each risk category detail and fill out the table on the right. Customize the table as needed so it aligns to your organization.
    3. Probability of Risk Occurrence

      Occurrence Criteria
      (Classification; Probability of Risk Event Within One Year)

      Negligible Very Unlikely; ‹20%
      Very Low Unlikely; 20 to 40%
      Low Possible; 40 to 60%
      Moderately Low Likely; 60 to 80%
      Moderate Almost Certain; ›80%

    Note: If needed, you can customize this scale with the severity designations that you prefer. However, make sure you are always consistent with it when conducting a risk assessment.

    Financial & Reputational Impact

    Budgetary and Reputational Implications
    (Financial Impact; Reputational Impact)

    Negligible (‹$10,000; Internal IT stakeholders aware of risk event occurrence)
    Very Low ($10,000 to $25,000; Business customers aware of risk event occurrence)
    Low ($25,000 to $50,000; Board of directors aware of risk event occurrence)
    Moderately Low ($50,000 to $100,000; External customers aware of risk event occurrence)
    Moderate (›$100,000; Media coverage or regulatory body aware of risk event occurrence)

    Risk Category Details

    Probability of Occurrence

    Estimated Financial Impact

    Estimated Severity (Probability X Impact)

    Capacity Planning
    Enterprise Architecture
    Externally Originated Attack
    Hardware Configuration Errors
    Hardware Performance
    Internally Originated Attack
    IT Staffing
    Project Scoping
    Software Implementation Errors
    Technology Evaluation and Selection
    Physical Threats
    Resource Threats
    Personnel Threats
    Technical Threats
    Total:

    1.2.2 Assess the IT/digital strategy

    4 hours

    Input: IT strategy, Digital strategy, Business strategy

    Output: An understanding of an executive business stakeholder’s perception of IT, Alignment of IT/digital strategy and overall organization strategy

    Materials: Computer, Whiteboard and markers, M&A Sell Playbook

    Participants: IT executive/CIO, Business executive/CEO

    The purpose of this activity is to review the business and IT strategies that exist to determine if there are critical capabilities that are not being supported.

    Ideally, the IT and digital strategies would have been created following development of the business strategy. However, sometimes the business strategy does not directly call out the capabilities it requires IT to support.

    1. On the left half of the corresponding slide in the M&A Sell Playbook, document the business goals, initiatives, and capabilities. Input this information from the business or digital strategies. (If more space for goals, initiatives, or capabilities is needed, duplicate the slide).
    2. On the other half of the slide, document the IT goals, initiatives, and capabilities. Input this information from the IT strategy and digital strategy.

    For additional support, see Build a Business-Aligned IT Strategy.

    Record the results in the M&A Sell Playbook.

    Proactive

    Step 1.3

    Drive Innovation and Suggest Growth Opportunities

    Activities

    • 1.3.1 Determine pain points and opportunities
    • 1.3.2 Align goals with opportunities
    • 1.3.3 Recommend reduction opportunities

    This step involves the following participants:

    • IT executive leader
    • IT leadership
    • Critical M&A stakeholders

    Outcomes of Step

    Establish strong relationships with critical M&A stakeholders and position IT as an innovative business partner that can suggest reduction opportunities.

    1.3.1 Determine pain points and opportunities

    1-2 hours

    Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade

    Output: List of pain points or opportunities that IT can address

    Materials: Computer, Whiteboard and markers, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Business stakeholders

    The purpose of this activity is to determine the pain points and opportunities that exist for the organization. These can be external or internal to the organization.

    1. Identify what opportunities exist for your organization. Opportunities are the potential positives that the organization would want to leverage.
    2. Next, identify pain points, which are the potential negatives that the organization would want to alleviate.
    3. Spend time considering all the options that might exist, and keep in mind what has been identified previously.

    Opportunities and pain points can be trends, other departments’ initiatives, business perspectives of IT, etc.

    Record the results in the M&A Sell Playbook.

    1.3.2 Align goals with opportunities

    1-2 hours

    Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade, List of pain points and opportunities

    Output: An understanding of an executive business stakeholder’s perception of IT, Foundations for reduction strategy

    Materials: Computer, Whiteboard and markers, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Business stakeholders

    The purpose of this activity is to determine whether a growth or separation strategy might be a good suggestion to the business in order to meet its business objectives.

    1. For the top three to five business goals, consider:
      1. Underlying drivers
      2. Digital opportunities
      3. Whether a growth or reduction strategy is the solution
    2. Just because a growth or reduction strategy is a solution for a business goal does not necessarily indicate M&A is the way to go. However, it is important to consider before you pursue suggesting M&A.

    Record the results in the M&A Sell Playbook.

    1.3.3 Recommend reduction opportunities

    1-2 hours

    Input: Growth or separation strategy opportunities to support business goals, Stakeholder communication plan, Rationale for the suggestion

    Output: M&A transaction opportunities suggested

    Materials: M&A Sell Playbook

    Participants: IT executive/CIO, Business executive/CEO

    The purpose of this activity is to recommend a merger, acquisition, or divestiture to the business.

    1. Identify which of the business goals the transaction would help solve and why IT is the one to suggest such a goal.
    2. Leverage the stakeholder communication plan identified previously to give insight into stakeholders who would have a significant level of interest, influence, or support in the process.

    Info-Tech Insight

    With technology and digital driving many transactions, leverage your organizations’ IT environment as an asset and reason why the divestiture or sale should happen, suggesting the opportunity yourself.

    Record the results in the M&A Sell Playbook.

    By the end of this Proactive phase, you should:

    Be prepared to suggest M&A opportunities to support your company’s goals through sale or divestiture transactions

    Key outcome from the Proactive phase

    Develop progressive relationships and strong communication with key stakeholders to suggest or be aware of transformational opportunities that can be achieved through sale or divestiture strategies.

    Key deliverables from the Proactive phase
    • Business perspective of IT examined
    • Key stakeholders identified and relationship to the M&A process outlined
    • Ability to valuate the IT environment and communicate IT’s value to the business
    • Assessment of the business, digital, and IT strategies and how M&As could support those strategies
    • Pain points and opportunities that could be alleviated or supported through an M&A transaction
    • Sale or divestiture recommendations

    The Sell Blueprint

    Phase 2

    Discovery & Strategy

    Phase 1

    Phase 2

    Phase 3Phase 4
    • 1.1 Identify Stakeholders and Their Perspective of IT
    • 1.2 Assess IT’s Current Value and Future State
    • 1.3 Drive Innovation and Suggest Reduction Opportunities
    • 2.1 Establish the M&A Program Plan
    • 2.2 Prepare IT to Engage in the Separation or Sale
    • 3.1 Engage in Due Diligence and Prepare Staff
    • 3.2 Prepare to Separate
    • 4.1 Execute the Transaction
    • 4.2 Reflection and Value Realization

    This phase will walk you through the following activities:

    • Create the mission and vision
    • Identify the guiding principles
    • Create the future-state operating model
    • Determine the transition team
    • Document the M&A governance
    • Create program metrics
    • Establish the separation strategy
    • Conduct a RACI
    • Create the communication plan
    • Assess the potential organization(s)

    This phase involves the following participants:

    • IT executive/CIO
    • IT senior leadership
    • Company M&A team

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Pre-Work

    Day 1

    Day 2

    Day 3

    Day 4

    Day 5

    Establish the Transaction FoundationDiscover the Motivation for Divesting or SellingFormalize the Program PlanCreate the Valuation FrameworkStrategize the TransactionNext Steps and Wrap-Up (offsite)

    Activities

    • 0.1 Conduct the CIO Business Vision and CEO-CIO Alignment diagnostics
    • 0.2 Identify key stakeholders and outline their relationship to the M&A process
    • 0.3 Identify the rationale for the company's decision to pursue a divestiture or sale
    • 1.1 Review the business rationale for the divestiture/sale
    • 1.2 Assess the IT/digital strategy
    • 1.3 Identify pain points and opportunities tied to the divestiture/sale
    • 1.4 Create the IT vision statement, create the IT mission statement, and identify IT guiding principles
    • 2.1 Create the future-state operating model
    • 2.2 Determine the transition team
    • 2.3 Document the M&A governance
    • 2.4 Establish program metrics
    • 3.1 Valuate your data
    • 3.2 Valuate your applications
    • 3.3 Valuate your infrastructure
    • 3.4 Valuate your risk and security
    • 3.5 Combine individual valuations to make a single framework
    • 4.1 Establish the separation strategy
    • 4.2 Conduct a RACI
    • 4.3 Review best practices for assessing target organizations
    • 4.4 Create the communication plan
    • 5.1 Complete in-progress deliverables from previous four days
    • 5.2 Set up review time for workshop deliverables and to discuss next steps

    Deliverables

    1. Business perspectives of IT
    2. Stakeholder network map for M&A transactions
    1. Business context implications for IT
    2. IT’s divestiture/sale strategic direction
    1. Operating model for future state
    2. Transition team
    3. Governance structure
    4. M&A program metrics
    1. IT valuation framework
    1. Separation strategy
    2. RACI
    3. Communication plan
    1. Completed M&A program plan and strategy
    2. Prepared to assess target organization(s)

    What is the Discovery & Strategy phase?

    Pre-transaction state

    The Discovery & Strategy phase during a sale or divestiture is a unique opportunity for many IT organizations. IT organizations that can participate in the transaction at this stage are likely considered a strategic partner of the business.

    For one-off sales/divestitures, IT being invited during this stage of the process is rare. However, for organizations that are preparing to engage in many divestitures over the coming years, this type of strategy will greatly benefit from IT involvement. Again, the likelihood of participating in an M&A transaction is increasing, making it a smart IT leadership decision to, at the very least, loosely prepare a program plan that can act as a strategic pillar throughout the transaction.

    During this phase of the pre-transaction state, IT may be asked to participate in ensuring that the IT environment is able to quickly and easily carve out components/business lines and deliver on service-level agreements (SLAs).

    Goal: To identify a repeatable program plan that IT can leverage when selling or divesting all or parts of the current IT environment, ensuring customer satisfaction and business continuity

    Discovery & Strategy Prerequisite Checklist

    Before coming into the Discovery & Strategy phase, you should have addressed the following:

    • Understand the business perspective of IT.
    • Know the key stakeholders and have outlined their relationship to the M&A process.
    • Be able to valuate the IT environment and communicate IT's value to the business.
    • Understand the rationale for the company's decision to pursue a sale or divestiture and the opportunities or pain points the sale should address.

    Discovery & Strategy

    Step 2.1

    Establish the M&A Program Plan

    Activities

    • 2.1.1 Create the mission and vision
    • 2.1.2 Identify the guiding principles
    • 2.1.3 Create the future-state operating model
    • 2.1.4 Determine the transition team
    • 2.1.5 Document the M&A governance
    • 2.1.6 Create program metrics

    This step involves the following participants:

    • IT executive/CIO
    • IT senior leadership
    • Company M&A team

    Outcomes of Step

    Establish an M&A program plan that can be repeated across sales/divestitures.

    The vision and mission statements clearly articulate IT’s aspirations and purpose

    The IT vision statement communicates a desired future state of the IT organization, whereas the IT mission statement portrays the organization’s reason for being. While each serves its own purpose, they should both be derived from the business context implications for IT.

    Vision Statements

    Mission Statements

    Characteristics

    • Describe a desired future
    • Focus on ends, not means
    • Concise
    • Aspirational
    • Memorable
    • Articulate a reason for existence
    • Focus on how to achieve the vision
    • Concise
    • Easy to grasp
    • Sharply focused
    • Inspirational

    Samples

    To be a trusted advisor and partner in enabling business innovation and growth through an engaged IT workforce. (Source: Business News Daily) IT is a cohesive, proactive, and disciplined team that delivers innovative technology solutions while demonstrating a strong customer-oriented mindset. (Source: Forbes, 2013)

    2.1.1 Create the mission and vision statements

    2 hours

    Input: Business objectives, IT capabilities, Rationale for the transaction

    Output: IT’s mission and vision statements for reduction strategies tied to mergers, acquisitions, and divestitures

    Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company M&A team

    The purpose of this activity is to create mission and vision statements that reflect IT’s intent and method to support the organization as it pursues a reduction strategy.

    1. Review the definitions and characteristics of mission and vision statements.
    2. Brainstorm different versions of the mission and vision statements.
    3. Edit the statements until you get to a single version of each that accurately reflects IT’s role in the reduction process.

    Record the results in the M&A Sell Playbook.

    Guiding principles provide a sense of direction

    IT guiding principles are shared, long-lasting beliefs that guide the use of IT in constructing, transforming, and operating the enterprise by informing and restricting IT investment portfolio management, solution development, and procurement decisions.

    A diagram illustrating the place of 'IT guiding principles' in the process of making 'Decisions on the use of IT'. There are four main items, connecting lines naming the type of process in getting from one step to the next, and a line underneath clarifying the questions asked at each step. On the far left, over the question 'What decisions should be made?', is 'Business context and IT implications'. This flows forward to 'IT guiding principles', and they are connected by 'Influence'. Next, over the question 'How should decisions be made?', is the main highlighted section. 'IT guiding principles' flows forward to 'Decisions on the use of IT', and they are connected by 'Guide and inform'. On the far right, over the question 'Who has the accountability and authority to make decisions?', is 'IT policies'. This flows back to 'Decisions on the use of IT', and they are connected by 'Direct and control'.

    IT principles must be carefully constructed to make sure they are adhered to and relevant

    Info-Tech has identified a set of characteristics that IT principles should possess. These characteristics ensure the IT principles are relevant and followed in the organization.

    Approach focused. IT principles should be focused on the approach – how the organization is built, transformed, and operated – as opposed to what needs to be built, which is defined by both functional and non-functional requirements.

    Business relevant. Create IT principles that are specific to the organization. Tie IT principles to the organization’s priorities and strategic aspirations.

    Long lasting. Build IT principles that will withstand the test of time.

    Prescriptive. Inform and direct decision making with actionable IT principles. Avoid truisms, general statements, and observations.

    Verifiable. If compliance can’t be verified, people are less likely to follow the principle.

    Easily Digestible. IT principles must be clearly understood by everyone in IT and by business stakeholders. IT principles aren’t a secret manuscript of the IT team. IT principles should be succinct; wordy principles are hard to understand and remember.

    Followed. Successful IT principles represent a collection of beliefs shared among enterprise stakeholders. IT principles must be continuously communicated to all stakeholders to achieve and maintain buy-in.

    In organizations where formal policy enforcement works well, IT principles should be enforced through appropriate governance processes.

    Consider the example principles below

    IT Principle Name

    IT Principle Statement

    1. Risk Management We will ensure that the organization’s IT Risk Management Register is properly updated to reflect all potential risks and that a plan of action against those risks has been identified.
    2. Transparent Communication We will ensure employees are spoken to with respect and transparency throughout the transaction process.
    3. Separation for Success We will create a carve-out strategy that enables the organization and clearly communicates the resources required to succeed.
    4. Managed Data We will handle data creation, modification, separation, and use across the enterprise in compliance with our data governance policy.
    5.Deliver Better Customer Service We will reduce the number of products offered by IT, enabling a stronger focus on specific products or elements to increase customer service delivery.
    6. Compliance With Laws and Regulations We will operate in compliance with all applicable laws and regulations for both our organization and the potentially purchasing organization.
    7. Defined Value We will create a plan of action that aligns with the organization’s defined value expectations.
    8. Network Readiness We will ensure that employees and customers have immediate access to the network with minimal or no outages.
    9. Value Generator We will leverage the current IT people, processes, and technology to turn the IT organization into a value generator by developing and selling our services to purchasing organizations.

    2.1.2 Identify the guiding principles

    2 hours

    Input: Business objectives, IT capabilities, Rationale for the transaction, Mission and vision statements

    Output: IT’s guiding principles for reduction strategies tied to mergers, acquisitions, and divestitures

    Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company M&A team

    The purpose of this activity is to create the guiding principles that will direct the IT organization throughout the reduction strategy process.

    1. Review the role of guiding principles and the examples of guiding principles that organizations have used.
    2. Brainstorm different versions of the guiding principles. Each guiding principle should start with the phrase “We will…”
    3. Edit and consolidate the statements until you have a list of approximately eight to ten statements that accurately reflect IT’s role in the reduction process.
    4. Review the guiding principles every six months to ensure they continue to support the delivery of the business’ reduction strategy goals.

    Record the results in the M&A Sell Playbook.

    Create two IT teams to support the transaction

    IT M&A Transaction Team

    • The IT M&A Transaction Team should consist of the strongest members of the IT team who can be expected to deliver on unusual or additional tasks not asked of them in normal day-to-day operations.
    • The roles selected for this team will have very specific skills sets or deliver on critical separation capabilities, making their involvement in the combination of two or more IT environments paramount.
    • These individuals need to have a history of proving themselves very trustworthy, as they will likely be required to sign an NDA as well.
    • Expect to have to certain duplicate capabilities or roles across the M&A Team and Operational Team.

    IT Operational Team

    • This group is responsible for ensuring the business operations continue.
    • These employees might be those who are newer to the organization but can be counted on to deliver consistent IT services and products.
    • The roles of this team should ensure that end users or external customers remain satisfied.

    Key capabilities to support M&A

    Consider the following capabilities when looking at who should be a part of the IT Transaction Team.

    Employees who have a significant role in ensuring that these capabilities are being delivered will be a top priority.

    Infrastructure & Operations

    • System Separation
    • Data Management
    • Helpdesk/Desktop Support
    • Cloud/Server Management

    Business Focus

    • Service-Level Management
    • Enterprise Architecture
    • Stakeholder Management
    • Project Management

    Risk & Security

    • Privacy Management
    • Security Management
    • Risk & Compliance Management

    Build a lasting and scalable operating model

    An operating model is an abstract visualization, used like an architect’s blueprint, that depicts how structures and resources are aligned and integrated to deliver on the organization’s strategy.

    It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint before embarking on detailed organizational design.

    The visual should highlight which capabilities are critical to attaining strategic goals and clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization.

    As you assess the current operating model, consider the following:

    • Does the operating model contain all the necessary capabilities your IT organization requires to be successful?
    • What capabilities should be duplicated?
    • Are there individuals with the skill set to support those roles? If not, is there a plan to acquire or develop those skills?
    • A dedicated project team strictly focused on M&A is great. However, is it feasible for your organization? If not, what blockers exist?
    A diagram with 'Initiatives' and 'Solutions' on the left and right of an area chart, 'Customer' at the top, the area between them labelled 'Functional Area n', and six horizontal bars labelled 'IT Capability' stacked on top of each other. The 'IT Capability' bars are slightly skewed to the 'Solutions' side of the chart.

    Info-Tech Insight

    Investing time up-front getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and allowing your model to change as the business changes.

    2.1.3 Create the future-state operating model

    4 hours

    Input: Current operating model, IT strategy, IT capabilities, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements

    Output: Future-state operating model for divesting organizations

    Materials: Operating model, Capability overlay, Flip charts/whiteboard, Markers, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company M&A team

    The purpose of this activity is to establish what the future-state operating model will be if your organization needs to adjust to support a divestiture transaction. If your organization plans to sell in its entirety, you may choose to skip this activity.

    1. Ensuring that all the IT capabilities are identified by the business and IT strategy, document your organization’s current operating model.
    2. Identify what core capabilities would be critical to the divesting transaction process and separation. Highlight and make copies of those capabilities in the M&A Sell Playbook. As a result of divesting, there may also be capabilities that will become irrelevant in your future state.
    3. Ensure the capabilities that will be decentralized are clearly identified. Decentralized capabilities do not exist within the central IT organization but rather in specific lines of businesses, products, or locations to better understand needs and deliver on the capability.

    An example operating model is included in the M&A Sell Playbook. This process benefits from strong reference architecture and capability mapping ahead of time.

    Record the results in the M&A Sell Playbook.

    2.1.4 Determine the transition team

    3 hours

    Input: IT capabilities, Future-state operating model, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements

    Output: Transition team

    Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers

    Participants: IT executive/CIO, IT senior leadership, Company M&A team

    The purpose of this activity is to create a team that will support your IT organization throughout the transaction. Determining which capabilities and therefore which roles will be required ensures that the business will continue to get the operational support it needs.

    1. Based on the outcome of activity 2.1.3, review the capabilities that your organization will require on the transition team. Group capabilities into functional groups containing capabilities that are aligned well with one another because they have similar responsibilities and functionalities.
    2. Replace the capabilities with roles. For example, stakeholder management, requirements gathering, and project management might be one functional group. Project management and stakeholder management might combine to create a project manager role.
    3. Review the examples in the M&A Sell Playbook and identify which roles will be a part of the transition team.

    For more information, see Redesign Your Organizational Structure

    What is governance?

    And why does it matter so much to IT and the M&A process?

    • Governance is the method in which decisions get made, specifically as they impact various resources (time, money, and people).
    • Because M&A is such a highly governed transaction, it is important to document the governance bodies that exist in your organization.
    • This will give insight into what types of governing bodies there are, what decisions they make, and how that will impact IT.
    • For example, funds to support separation need to be discussed, approved, and supplied to IT from a governing body overseeing the acquisition.
    • A highly mature IT organization will have automated governance, while a seemingly non-existent governance process will be considered ad hoc.
    A pyramid with four levels representing the types of governing bodies that are available with differing levels of IT maturity. An arrow beside the pyramid points upward. The bottom of the arrow is labelled 'Traditional (People and document centric)' and the top is labelled 'Adaptive (Data centric)'. Starting at the bottom of the pyramid is level 1 'Ad Hoc Governance', 'Governance that is not well defined or understood within the organization. It occurs out of necessity but often not by the right people'. Level 2 is 'Controlled Governance', 'Governance focused on compliance and decisions driven by hierarchical authority. Levels of authority are defined and often driven by regulatory'. Level 3 is 'Agile Governance', 'Governance that is flexible to support different needs and quick response in the organization. Driven by principles and delegated throughout the company'. At the top of the pyramid is level 4 'Automated Governance', 'Governance that is entrenched and automated into organizational processes and product/service design. Empowered and fully delegated governance to maintain fit and drive organizational success and survival'.

    2.1.5 Document M&A governance

    1-2 hours

    Input: List of governing bodies, Governing body committee profiles, Governance structure

    Output: Documented method on how decisions are made as it relates to the M&A transaction

    Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company M&A team

    The purpose of this activity is to determine the method in which decisions are made throughout the M&A transaction as it relates to IT. This will require understanding both governing bodies internal to IT and those external to IT.

    1. First, determine the other governance structures within the organization that will impact the decisions made about M&A. List out these bodies or committees.
    2. Create a profile for each committee that looks at the membership, purpose of the committee, decision areas (authority), and the process of inputs and outputs. Ensure IT committees that will have a role in this process are also documented. Consider the benefits realized, risks, and resources required for each.
    3. Organize the committees into a structure, identifying the committees that have a role in defining the strategy, designing and building, and running.

    Record the results in the M&A Sell Playbook.

    Current-state structure map – definitions of tiers

    Strategy: These groups will focus on decisions that directly connect to the strategic direction of the organization.

    Design & Build: The second tier of groups will oversee prioritization of a certain area of governance as well as design and build decisions that feed into strategic decisions.

    Run: The lowest level of governance will be oversight of more-specific initiatives and capabilities within IT.

    Expect tier overlap. Some committees will operate in areas that cover two or three of these governance tiers.

    Measure the IT program’s success in terms of its ability to support the business’ M&A goals

    Upper management will measure IT’s success based on your ability to support the underlying reasons for the M&A. Using business metrics will help assure business stakeholders that IT understands their needs and is working with the business to achieve them.

    Business-Specific Metrics

    • Revenue Growth: Increase in the top line as seen by market expansion, product expansion, etc. by percentage/time.
    • Synergy Extraction: Reduction in costs as determined by the ability to identify and eliminate redundancies over time.
    • Profit Margin Growth: Increase in the bottom line as a result of increased revenue growth and/or decreased costs over time.

    IT-Specific Metrics

    • IT operational savings and cost reductions due to synergies: Operating expenses, capital expenditures, licenses, contracts, applications, infrastructure over time.
    • Reduction in IT staff expense and headcount: Decreased budget allocated to IT staff, and ability to identify and remove redundancies in staff.
    • Meeting or improving on IT budget estimates: Delivering successful IT separation on a budget that is the same or lower than the budget estimated during due diligence.
    • Meeting or improving on IT time-to-separation estimates: Delivering successful IT carve-out on a timeline that is the same or shorter than the timeline estimated during due diligence.
    • Business capability support: Delivering the end state of IT that supports the expected business capabilities and growth.

    Establish your own metrics to gauge the success of IT

    Establish SMART M&A Success Metrics

    S pecific Make sure the objective is clear and detailed.
    M easurable Objectives are measurable if there are specific metrics assigned to measure success. Metrics should be objective.
    A ctionable Objectives become actionable when specific initiatives designed to achieve the objective are identified.
    R ealistic Objectives must be achievable given your current resources or known available resources.
    T ime-Bound An objective without a timeline can be put off indefinitely. Furthermore, measuring success is challenging without a timeline.
    • What should IT consider when looking to identify potential additions, deletions, or modifications that will either add value to the organization or reduce costs/risks?
    • Provide a definition of synergies.
    • IT operational savings and cost reductions due to synergies: Operating expenses, capital expenditures, licenses, contracts, applications, infrastructure.
    • Reduction in IT staff expense and headcount: Decreased budget allocated to IT staff, and ability to identify and remove redundancies in staff.
    • Meeting or improving on IT budget estimates: Delivering successful IT separation on a budget that is the same or lower than the budget estimated during due diligence.
    • Meeting or improving on IT time-to-separation estimates: Delivering successful IT carve-out on a timeline that is the same or shorter than the timeline estimated during due diligence.
    • Revenue growth: Increase in the top line as a result, as seen by market expansion, product expansion, etc., as a result of divesting lines of the business and selling service-level agreements to the purchasing organization.
    • Synergy extraction: Reduction in costs, as determined by the ability to identify and eliminate redundancies.
    • Profit margin growth: Increase in the bottom line as a result of increased revenue growth and/or decreased costs.

    Metrics for each phase

    1. Proactive

    2. Discovery & Strategy

    3. Valuation & Due Diligence

    4. Execution & Value Realization

    • % Share of business innovation spend from overall IT budget
    • % Critical processes with approved performance goals and metrics
    • % IT initiatives that meet or exceed value expectation defined in business case
    • % IT initiatives aligned with organizational strategic direction
    • % Satisfaction with IT's strategic decision-making abilities
    • $ Estimated business value added through IT-enabled innovation
    • % Overall stakeholder satisfaction with IT
    • % Percent of business leaders that view IT as an Innovator
    • % IT budget as a percent of revenue
    • % Assets that are not allocated
    • % Unallocated software licenses
    • # Obsolete assets
    • % IT spend that can be attributed to the business (chargeback or showback)
    • % Share of CapEx of overall IT budget
    • % Prospective organizations that meet the search criteria
    • $ Total IT cost of ownership (before and after M&A, before and after rationalization)
    • % Business leaders that view IT as a Business Partner
    • % Defects discovered in production
    • $ Cost per user for enterprise applications
    • % In-house-built applications vs. enterprise applications
    • % Owners identified for all data domains
    • # IT staff asked to participate in due diligence
    • Change to due diligence
    • IT budget variance
    • Synergy target
    • % Satisfaction with the effectiveness of IT capabilities
    • % Overall end-customer satisfaction
    • $ Impact of vendor SLA breaches
    • $ Savings through cost-optimization efforts
    • $ Savings through application rationalization and technology standardization
    • # Key positions empty
    • % Frequency of staff turnover
    • % Emergency changes
    • # Hours of unplanned downtime
    • % Releases that cause downtime
    • % Incidents with identified problem record
    • % Problems with identified root cause
    • # Days from problem identification to root cause fix
    • % Projects that consider IT risk
    • % Incidents due to issues not addressed in the security plan
    • # Average vulnerability remediation time
    • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
    • # Time (days) to value realization
    • % Projects that realized planned benefits
    • $ IT operational savings and cost reductions that are related to synergies/divestitures
    • % IT staff–related expenses/redundancies
    • # Days spent on IT separation
    • $ Accurate IT budget estimates
    • % Revenue growth directly tied to IT delivery
    • % Profit margin growth

    2.1.6 Create program metrics

    1-2 hours

    Input: IT capabilities, Mission, vision, and guiding principles, Rationale for the acquisition

    Output: Program metrics to support IT throughout the M&A process

    Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company M&A team

    The purpose of this activity is to determine how IT’s success throughout a growth transaction will be measured and determined.

    1. Document a list of appropriate metrics on the whiteboard. Remember to include metrics that demonstrate the business impact. You can use the sample metrics listed on the previous slide as a starting point.
    2. Set a target and deadline for each metric. This will help the group determine when it is time to evaluate progression.
    3. Establish a baseline for each metric based on information collected within your organization.
    4. Assign an owner for tracking each metric as well as someone to be accountable for performance.

    Record the results in the M&A Sell Playbook.

    Discovery & Strategy

    Step 2.2

    Prepare IT to Engage in the Separation or Sale

    Activities

    • 2.2.1 Establish the separation strategy
    • 2.2.2 Conduct a RACI
    • 2.2.3 Create the communication plan
    • 2.2.4 Assess the potential organization(s)

    This step involves the following participants:

    • IT executive/CIO
    • IT senior leadership
    • Company M&A team

    Outcomes of Step

    Identify IT’s plan of action when it comes to the separation/sale and align IT’s separation/sale strategy with the business’ M&A strategy.

    Separation strategies

    There are several IT separation strategies that will let you achieve your target technology environment.

    IT Separation Strategies
    • Divest. Carve out elements of the IT organization and sell them to a purchasing organization with or without a service-level agreement.
    • Sell. Sell the entire IT environment to a purchasing organization. The purchasing organization takes full responsibility in delivering and running the IT environment.
    • Spin-Off Joint Venture. Carve out elements of the IT organization and combine them with elements of a new or purchasing organization to create a new entity.

    The approach IT takes will depend on the business objectives for the M&A.

    • Generally speaking, the separation strategy is well understood and influenced by the frequency of and rationale for selling.
    • Based on the initiatives generated by each business process owner, you need to determine the IT separation strategy that will best support the desired target technology environment, especially if you are still operating or servicing elements of that IT environment.

    Key considerations when choosing an IT separation strategy include:

    • What are the main business objectives of the M&A?
    • What are the key synergies expected from the transaction?
    • What IT separation strategy best helps obtain these benefits?
    • What opportunities exist to position the business for sustainable and long-term growth?

    Separation strategies in detail

    Review highlights and drawbacks of different separation strategies

    Divest
      Highlights
    • Recommended for businesses striving to reduce costs and potentially even generate revenue for the business through the delivery of SLAs.
    • Opportunity to reduce or scale back on lines of business or products that are not driving profits.
      Drawbacks
    • May be forced to give up critical staff that have been known to deliver high value.
    • The IT department is left to deliver services to the purchasing organization with little support or consideration from the business.
    • There can be increased risk and security concerns that need to be addressed.
    Sell
      Highlights
    • Recommended for businesses looking to gain capital to exit the market profitably or to enter a new market with a large sum of capital.
    • The business will no longer exist, and as a result all operational costs, including IT, will become redundant.
      Drawbacks
    • IT is no longer needed as an operating or capital service for the organization.
    • Lost resources, including highly trained and critical staff.
    • May require packaging employees off and using the profit or capital generated to cover any closing costs.
    Spin-Off or Joint Venture
      Highlights
    • Recommended for businesses looking to expand their market presence or acquire new products. Essentially aligning the two organizations in the same market.
    • Each side has a unique offering but complementing capabilities.
      Drawbacks
    • As much as the organization is going through a separation from the original company, it will be going through an integration with the new company.
    • There could be differences in culture.
    • This could require a large amount of investment without a guarantee of profit or success.

    2.2.1 Establish the separation strategy

    1-2 hours

    Input: Business separation strategy, Guiding principles, M&A governance

    Output: IT’s separation strategy

    Materials: Flip charts/whiteboard, Markers, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company M&A team

    The purpose of this activity is to determine IT’s approach to separating or selling. This approach might differ slightly from transaction to transaction. However, the businesses approach to transactions should give insight into the general separation strategy IT should adopt.

    1. Make sure you have clearly articulated the business objectives for the M&A, the technology end state for IT, and the magnitude of the overall separation.
    2. Review and discuss the highlights and drawbacks of each type of separation.
    3. Use Info-Tech’s Separation Posture Selection Framework on the next slide to select the separation posture that will appropriately enable the business. Consider these questions during your discussion:
      1. What are the main business objectives of the M&A? What key IT capabilities will need to support business objectives?
      2. What key synergies are expected from the transaction? What opportunities exist to position the business for sustainable growth?
      3. What IT separation best helps obtain these benefits?

    Record the results in the M&A Sell Playbook.

    Separation Posture Selection Framework

    Business M&A Strategy

    Resultant Technology Strategy

    M&A Magnitude (% of Seller Assets, Income, or Market Value)

    IT Separation Posture

    A. Horizontal Adopt One Model ‹100% Divest
    ›99% Sell
    B. Vertical Create Links Between Critical Systems Any Divest
    C. Conglomerate Independent Model Any Joint Venture
    Divest
    D. Hybrid: Horizontal & Conglomerate Create Links Between Critical Systems Any Divest
    Joint Venture

    M&A separation strategy

    Business M&A Strategy Resultant Technology Strategy M&A Magnitude (% of Seller Assets, Income, or Market Value) IT Separation Posture

    You may need a hybrid separation posture to achieve the technology end state.

    M&A objectives may not affect all IT domains and business functions in the same way. Therefore, the separation requirements for each business function may differ. Organizations will often choose to select and implement a hybrid separation posture to realize the technology end state.

    Each business division may have specific IT domain and capability needs that require an alternative separation strategy.

    • Example: Even when conducting a joint venture by forming a new organization, some partners might view themselves as the dominant partner and want to influence the IT environment to a greater degree.
    • Example: Some purchasing organizations will expect service-level agreements to be available for a significant period of time following the divestiture, while others will be immediately independent.

    2.2.2 Conduct a RACI

    1-2 hours

    Input: IT capabilities, Transition team, Separation strategy

    Output: Completed RACI for Transition team

    Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company M&A team

    The purpose of this activity is to identify the core accountabilities and responsibilities for the roles identified as critical to your transition team. While there might be slight variation from transaction to transaction, ideally each role should be performing certain tasks.

    1. First, identify a list of critical tasks that need to be completed to support the sale or separation. For example:
      • Communicate with the company M&A team.
      • Identify the key IT solutions that can and cannot be carved out.
      • Gather data room artifacts and provide them to acquiring organization.
    2. Next, identify at the activity level which role is accountable or responsible for each activity. Enter an A for accountable, R for responsible, or A/R for both.

    Record the results in the M&A Sell Playbook.

    Communication and change

    Prepare key stakeholders for the potential changes

    • Anytime you are starting a project or program that will depend on users and stakeholders to give up their old way of doing things, change will force people to become novices again, leading to lost productivity and added stress.
    • Change management can improve outcomes for any project where you need people to adopt new tools and procedures, comply with new policies, learn new skills and behaviors, or understand and support new processes.
    • M&As move very quickly, and it can be very difficult to keep track of which stakeholders you need to be communicating with and what you should be communicating.
    • Not all organizations embrace or resist change in the same ways. Base your change communications on your organization’s cultural appetite for change in general.
      • Organizations with a low appetite for change will require more direct, assertive communications.
      • Organizations with a high appetite for change are more suited to more open, participatory approaches.

    Three key dimensions determine the appetite for cultural change:

    • Power Distance. Refers to the acceptance that power is distributed unequally throughout the organization.
      In organizations with a high power distance, the unequal power distribution is accepted by the less powerful employees.
    • Individualism. Organizations that score high in individualism have employees who are more independent. Those who score low in individualism fall into the collectivism side, where employees are strongly tied to one another or their groups.
    • Uncertainty Avoidance. Describes the level of acceptance that an organization has toward uncertainty. Those who score high in this area find that their employees do not favor uncertain situations, while those that score low in this area find that their employees are comfortable with change and uncertainty.

    2.2.3 Create the communication plan

    1-2 hours

    Input: IT’s M&A mission, vision, and guiding principles, M&A transition team, IT separation strategy, RACI

    Output: IT’s M&A communication plan

    Materials: Flip charts/whiteboard, Markers, RACI, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company M&A team

    The purpose of this activity is to create a communication plan that IT can leverage throughout the initiative.

    1. Create a structured communication plan that allows for continuous communication with the integration management office, senior management, and the business functional heads.
    2. Outline key topics of communication, with stakeholders, inputs, and outputs for each topic.
    3. Review Info-Tech’s example communication plan in the M&A Sell Playbook and update it with relevant information.
    4. Does this communication plan make sense for your organization? What doesn’t make sense? Adjust the communication guide to suit your organization.

    Record the results in the M&A Sell Playbook.

    Assessing potential organizations

    As soon as you have identified organizations to consider, it’s imperative to assess critical risks. Most IT leaders can attest that they will receive little to no notice when the business is pursuing a sale and IT has to assess the IT organization. As a result, having a standardized template to quickly assess the potential acquiring organization is important.

    Ways to Assess

    1. News: Assess what sort of news has been announced in relation to the organization. Have they had any risk incidents? Has a critical vendor announced working with them?
    2. LinkedIn: Scan through the LinkedIn profiles of employees. This will give you a sense of what platforms they have based on employees. It will also give insight into positive or negative employee experiences that could impact retention.
    3. Trends: Some industries will have specific solutions that are relevant and popular. Assess what the key players are (if you don’t already know) to determine the solution.
    4. Business Architecture: While this assessment won’t perfect, try to understand the business’ value streams and the critical business and IT capabilities that would be needed to support them. Will your organization or employee skills be required to support these long term?

    Info-Tech Insight

    Assessing potential organizations is not just for the purchaser. The seller should also know what the purchasing organization’s history with M&As is and what potential risks could occur if remaining connected through ongoing SLAs.

    2.2.4 Assess the potential organization(s)

    1-2 hours

    Input: Publicized historical risk events, Solutions and vendor contracts likely in the works, Trends

    Output: IT’s valuation of the potential organization(s) for selling or divesting

    Materials: M&A Sell Playbook

    Participants: IT executive/CIO

    The purpose of this activity is to assess the organization(s) that your organization is considering selling or divesting to.

    1. Complete the Historical Valuation Worksheet in the M&A Sell Playbook to understand the type of IT organization that your company may support.
      • The business likely isn’t looking for in-depth details at this time. However, as the IT leader, it is your responsibility to ensure critical risks are identified and communicated to the business.
    2. Use the information identified to help the business narrow down which organizations could be the right organizations to sell or divest to.

    Record the results in the M&A Sell Playbook.

    By the end of this pre-transaction phase you should:

    Have a program plan for M&As and a repeatable M&A strategy for IT when engaging in reduction transactions

    Key outcomes from the Discovery & Strategy phase
    • Prepare the IT environment to support the potential sale or divestiture by identifying critical program plan elements and establishing a separation or carve-out strategy that will enable the business to reach its goals.
    • Create a M&A strategy that accounts for all the necessary elements of a transaction and ensures sufficient governance, capabilities, and metrics exist.
    Key deliverables from the Discovery & Strategy phase
    • Create vision and mission statements
    • Establish guiding principles
    • Create a future-state operating model
    • Identify the key roles for the transaction team
    • Identify and communicate the M&A governance
    • Determine target metrics
    • Identify the M&A operating model
    • Select the separation strategy framework
    • Conduct a RACI for key transaction tasks for the transaction team
    • Document the communication plan

    M&A Sell Blueprint

    Phase 3

    Due Diligence & Preparation

    Phase 1Phase 2

    Phase 3

    Phase 4
    • 1.1 Identify Stakeholders and Their Perspective of IT
    • 1.2 Assess IT’s Current Value and Future State
    • 1.3 Drive Innovation and Suggest Reduction Opportunities
    • 2.1 Establish the M&A Program Plan
    • 2.2 Prepare IT to Engage in the Separation or Sale
    • 3.1 Engage in Due Diligence and Prepare Staff
    • 3.2 Prepare to Separate
    • 4.1 Execute the Transaction
    • 4.2 Reflection and Value Realization

    This phase will walk you through the following activities:

    • Drive value with a due diligence charter
    • Gather data room artifacts
    • Measure staff engagement
    • Assess culture
    • Create a carve-out roadmap
    • Prioritize separation tasks
    • Establish the separation roadmap
    • Identify the buyer’s IT expectations
    • Create a service/transaction agreement
    • Estimate separation costs
    • Create an employee transition plan
    • Create functional workplans for employees
    • Align project metrics with identified tasks

    This phase involves the following participants:

    • IT executive/CIO
    • IT senior leadership
    • Company M&A team
    • Business leaders
    • Purchasing organization
    • Transition team

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Pre-Work

    Day 1

    Day 2

    Day 3

    Day 4

    Day 5

    Establish the Transaction FoundationDiscover the Motivation for SeparationIdentify Expectations and Create the Carve-Out RoadmapPrepare and Manage EmployeesPlan the Separation RoadmapNext Steps and Wrap-Up (offsite)

    Activities

    • 0.1 Identify the rationale for the company's decision to pursue a divestiture/sale.
    • 0.2 Identify key stakeholders and determine the IT transaction team.
    • 0.3 Gather and evaluate the M&A strategy, future-state operating model, and governance.
    • 1.1 Review the business rationale for the divestiture/sale.
    • 1.2 Identify pain points and opportunities tied to the divestiture/sale.
    • 1.3 Establish the separation strategy.
    • 1.4 Create the due diligence charter.
    • 2.1 Identify the buyer’s IT expectations.
    • 2.2 Create a list of IT artifacts to be reviewed in the data room.
    • 2.3 Create a carve-out roadmap.
    • 2.4 Create a service/technical transaction agreement.
    • 3.1 Measure staff engagement.
    • 3.2 Assess the current culture and identify the goal culture.
    • 3.3 Create an employee transition plan.
    • 3.4 Create functional workplans for employees.
    • 4.1 Prioritize separation tasks.
    • 4.2 Establish the separation roadmap.
    • 4.3 Establish and align project metrics with identified tasks.
    • 4.4 Estimate separation costs.
    • 5.1 Complete in-progress deliverables from previous four days.
    • 5.2 Set up review time for workshop deliverables and to discuss next steps.

    Deliverables

    1. IT strategy
    2. IT operating model
    3. IT governance structure
    4. M&A transaction team
    1. Business context implications for IT
    2. Separation strategy
    3. Due diligence charter
    1. Data room artifacts identified
    2. Carve-out roadmap
    3. Service/technical transaction agreement
    1. Engagement assessment
    2. Culture assessment
    3. Employee transition plans and workplans
    1. Separation roadmap and associated resourcing
    1. Divestiture separation strategy for IT

    What is the Due Diligence & Preparation phase?

    Mid-transaction state

    The Due Diligence & Preparation phase during a sale or divestiture is a critical time for IT. If IT fails to proactively participate in this phase, IT will have to merely react to separation expectations set by the business.

    If your organization is being sold in its entirety, staff will have major concerns about their future in the new organization. Making this transition as smooth as possible and being transparent could go a long way in ensuring their success in the new organization.

    In a divestiture, this is the time to determine where it’s possible for the organization to divide or separate from itself. A lack of IT involvement in these conversations could lead to an overcommitment by the business and under-delivery by IT.

    Goal: To ensure that, as the selling or divesting organization, you comply with regulations, prepare staff for potential changes, and identify a separation strategy if necessary

    Due Diligence Prerequisite Checklist

    Before coming into the Due Diligence & Preparation phase, you must have addressed the following:

    • Understand the rationale for the company's decision to pursue a sale or divestiture and what opportunities or pain points the sale should alleviate.
    • Identify the key roles for the transaction team.
    • Identify the M&A governance.
    • Determine target metrics.
    • Select a separation strategy framework.
    • Conduct a RACI for key transaction tasks for the transaction team.

    Before coming into the Due Diligence & Preparation phase, we recommend addressing the following:

    • Create vision and mission statements.
    • Establish guiding principles.
    • Create a future-state operating model.
    • Identify the M&A operating model.
    • Document the communication plan.
    • Examine the business perspective of IT.
    • Identify key stakeholders and outline their relationship to the M&A process.
    • Be able to valuate the IT environment and communicate IT’s value to the business.

    The Technology Value Trinity

    Delivery of Business Value & Strategic Needs

    • Digital & Technology Strategy
      The identification of objectives and initiatives necessary to achieve business goals.
    • IT Operating Model
      The model for how IT is organized to deliver on business needs and strategies.
    • Information & Technology Governance
      The governance to ensure the organization and its customers get maximum value from the use of information and technology.

    All three elements of the Technology Value Trinity work in harmony to deliver business value and achieve strategic needs. As one changes, the others need to change as well.

    • Digital and IT Strategy tells you what you need to achieve to be successful.
    • IT Operating Model and Organizational Design is the alignment of resources to deliver on your strategy and priorities.
    • Information & Technology Governance is the confirmation of IT’s goals and strategy, which ensures the alignment of IT and business strategy. It’s the mechanism by which you continuously prioritize work to ensure that what is delivered is in line with the strategy. This oversight evaluates, directs, and monitors the delivery of outcomes to ensure that the use of resources results in the achieving the organization’s goals.

    Too often strategy, operating model and organizational design, and governance are considered separate practices. As a result, “strategic documents” end up being wish lists, and projects continue to be prioritized based on who shouts the loudest – not based on what is in the best interest of the organization.

    Due Diligence & Preparation

    Step 3.1

    Engage in Due Diligence and Prepare Staff

    Activities

    • 3.1.1 Drive value with a due diligence charter
    • 3.1.2 Gather data room artifacts
    • 3.1.3 Measure staff engagement
    • 3.1.4 Assess culture

    This step involves the following participants:

    • IT executive/CIO
    • IT senior leadership
    • Company M&A team
    • Business leaders
    • Prospective IT organization
    • Transition team

    Outcomes of Step

    This step of the process is when IT should prepare and support the business in due diligence and gather the necessary information about staff changes.

    3.1.1 Drive value with a due diligence charter

    1-2 hours

    Input: Key roles for the transaction team, M&A governance, Target metrics, Selected separation strategy framework, RACI of key transaction tasks for the transaction team

    Output: IT Due Diligence Charter

    Materials: M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company M&A team

    The purpose of this activity is to create a charter leveraging the items completed in the previous phase, as listed on the Due Diligence Prerequisite Checklist slide, to gain executive sign-off.

    1. In the IT Due Diligence Charter in the M&A Sell Playbook, complete the aspects of the charter that are relevant for you and your organization.
    2. We recommend including these items in the charter:
      • Communication plan
      • Transition team roles
      • Goals and metrics for the transaction
      • Separation strategy
      • Sale/divestiture RACI
    3. Once the charter has been completed, ensure that business executives agree to the charter and sign off on the plan of action.

    Record the results in the M&A Sell Playbook.

    3.1.2 Gather data room artifacts

    4 hours

    Input: Future-state operating model, M&A governance, Target metrics, Selected separation strategy framework, RACI of key transaction tasks for the transaction team

    Output: List of items to acquire and verify can be provided to the purchasing organization while in the data room

    Materials: Critical domain lists on following slides, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team, Legal team, Compliance/privacy officers

    The purpose of this activity is to create a list of the key artifacts that you could be asked for during the due diligence process.

    1. Review the lists on the following pages as a starting point. Identify which domains, stakeholders, artifacts, and information should be requested for the data room.
    2. IT leadership may or may not be asked to enter the data room directly. The short notice for having to find these artifacts for the purchasing organization can leave your IT organization scrambling. Identify the critical items worth obtaining ahead of time.
    3. Once you have identified the artifacts, provide the list to the legal team or compliance/privacy officers and ensure they also agree those items can be provided. If changes to the documents need to be made, take the time to do so.
    4. Store all items in a safe and secure file or provide to the M&A team ahead of due diligence.

    **Note that if your organization is not leading/initiating the data room, then you can ignore this activity.

    Record the results in the M&A Sell Playbook.

    Critical domains

    Understand the key stakeholders and outputs for each domain

    Domain

    Stakeholders

    Key Artifacts

    Key Information to request

    Business
    • Enterprise Architecture
    • Business Relationship Manager
    • Business Process Owners
    • Business capability map
    • Capability map (the M&A team should be taking care of this, but make sure it exists)
    • Business satisfaction with various IT systems and services
    Leadership/IT Executive
    • CIO
    • CTO
    • CISO
    • IT budgets
    • IT capital and operating budgets (from current year and previous year)
    Data & Analytics
    • Chief Data Officer
    • Data Architect
    • Enterprise Architect
    • Master data domains, system of record for each
    • Unstructured data retention requirements
    • Data architecture
    • Master data domains, sources, and storage
    • Data retention requirements
    Applications
    • Applications Manager
    • Application Portfolio Manager
    • Application Architect
    • Applications map
    • Applications inventory
    • Applications architecture
    • Copy of all software license agreements
    • Copy of all software maintenance agreements
    Infrastructure
    • Head of Infrastructure
    • Enterprise Architect
    • Infrastructure Architect
    • Infrastructure Manager
    • Infrastructure map
    • Infrastructure inventory
    • Network architecture (including which data centers host which infrastructure and applications)
    • Inventory (including separation capabilities of vendors, versions, switches, and routers)
    • Copy of all hardware lease or purchase agreements
    • Copy of all hardware maintenance agreements
    • Copy of all outsourcing/external service provider agreements
    • Copy of all service-level agreements for centrally provided, shared services and systems
    Products and Services
    • Product Manager
    • Head of Customer Interactions
    • Product lifecycle
    • Product inventory
    • Customer market strategy

    Critical domains (continued)

    Understand the key stakeholders and outputs for each domain

    Domain

    Stakeholders

    Key Artifacts

    Key Information to request

    Operations
    • Head of Operations
    • Service catalog
    • Service overview
    • Service owners
    • Access policies and procedures
    • Availability and service levels
    • Support policies and procedures
    • Costs and approvals (internal and customer costs)
    IT Processes
    • CIO
    • IT Management
    • VP of IT Governance
    • VP of IT Strategy
    • IT process flow diagram
    • Processes in place and productivity levels (capacity)
    • Critical processes/processes the organization feels they do particularly well
    IT People
    • CIO
    • VP of Human Resources
    • IT organizational chart
    • Competency & capacity assessment
    • IT organizational structure (including resources from external service providers such as contractors) with appropriate job descriptions or roles and responsibilities
    • IT headcount and location
    Security
    • CISO
    • Security Architect
    • Security posture
    • Information security staff
    • Information security service providers
    • Information security tools
    • In-flight information security projects
    Projects
    • Head of Projects
    • Project portfolio
    • List of all future, ongoing, and recently completed projects
    Vendors
    • Head of Vendor Management
    • License inventory
    • Inventory (including what will and will not be transitioning, vendors, versions, number of licenses)

    Retain top talent throughout the transition

    Focus on retention and engagement

    • People are such a critical component of this process, especially in the selling organization.
    • Retaining employees, especially the critical employees who hold specific skills or knowledge, will ensure the success and longevity of the divesting organization, purchasing organization, or the new company.
    • Giving employees a role in the organization and ensuring they do not see their capabilities as redundant will be critical to the process.
    • It is okay if employees need to change what they were doing temporarily or even long-term. However, being transparent about these changes and highlighting their value to the process and organization(s) will help.
    • The first step to moving forward with retention is to look at the baseline engagement and culture of employees and the organization. This will help determine where to focus and allow you to identify changes in engagement that resulted from the transaction.
    • Job engagement drivers are levers that influence the engagement of employees in their day-to-day roles.
    • Organizational engagement drivers are levers that influence an employee’s engagement with the broader organization.
    • Retention drivers are employment needs. They don’t necessarily drive engagement, but they must be met for engagement to be possible.

    3.1.3 Measure staff engagement

    3-4 hours

    Input: Engagement survey

    Output: Baseline engagement scores

    Materials: Build an IT Employee Engagement Program

    Participants: IT executive/CIO, IT senior leadership, IT employees of current organization

    The purpose of this activity is to measure current staff engagement to have a baseline to measure against in the future state. This is a good activity to complete if you will be divesting or selling in entirety.

    The results from the survey should act as a baseline to determine what the organization is doing well in terms of employee engagement and what drivers could be improved upon.

    1. Review Info-Tech’s Build an IT Employee Engagement Program research and select a survey that will best meet your needs.
    2. Conduct the survey and note which drivers employees are currently satisfied with. Likewise, note where there are opportunities.
    3. Document actions that should be taken to mitigate the negative engagement drivers throughout the transaction and enhance or maintain the positive engagement drivers.

    Record the results in the M&A Sell Playbook.

    Assess culture as a part of engagement

    Culture should not be overlooked, especially as it relates to the separation of IT environments

    • There are three types of culture that need to be considered.
    • Most importantly, this transition is an opportunity to change the culture that might exist in your organization’s IT environment.
    • Make a decision on which type of culture you’d like IT to have post transition.

    Target Organization's Culture. The culture that the target organization is currently embracing. Their established and undefined governance practices will lend insight into this.

    Your Organization’s Culture. The culture that your organization is currently embracing. Examine people’s attitudes and behaviors within IT toward their jobs and the organization.

    Ideal Culture. What will the future culture of the IT organization be once separation is complete? Are there aspects that your current organization and the target organization embrace that are worth considering?

    Culture categories

    Map the results of the IT Culture Diagnostic to an existing framework

    Competitive
    • Autonomy
    • Confront conflict directly
    • Decisive
    • Competitive
    • Achievement oriented
    • Results oriented
    • High performance expectations
    • Aggressive
    • High pay for good performance
    • Working long hours
    • Having a good reputation
    • Being distinctive/different
    Innovative
    • Adaptable
    • Innovative
    • Quick to take advantage of opportunities
    • Risk taking
    • Opportunities for professional growth
    • Not constrained by rules
    • Tolerant
    • Informal
    • Enthusiastic
    Traditional
    • Stability
    • Reflective
    • Rule oriented
    • Analytical
    • High attention to detail
    • Organized
    • Clear guiding philosophy
    • Security of employment
    • Emphasis on quality
    • Focus on safety
    Cooperative
    • Team oriented
    • Fair
    • Praise for good performance
    • Supportive
    • Calm
    • Developing friends at work
    • Socially responsible

    Culture Considerations

    • What culture category was dominant for each IT organization?
    • Do you share the same dominant category?
    • Is your current dominant culture category the most ideal to have post-separation?

    3.1.4 Assess Culture

    3-4 hours

    Input: Cultural assessments for current IT organization, Cultural assessment for target IT organization

    Output: Goal for IT culture

    Materials: IT Culture Diagnostic

    Participants: IT executive/CIO, IT senior leadership, IT employees of current organization, IT employees of target organization, Company M&A team

    The purpose of this activity is to assess the different cultures that might exist within the IT environments of the organizations involved. By understanding the culture that exists in the purchasing organization, you can identify the fit and prepare impacted staff for potential changes.

    1. Complete this activity by leveraging the blueprint Fix Your IT Culture, specifically the IT Culture Diagnostic.
    2. Fill out the diagnostic for the IT department in your organization:
      1. Answer the 16 questions in tab 2, Diagnostic.
      2. Find out your dominant culture and review recommendations in tab 3, Results.
    3. Document the results from tab 3, Results, in the M&A Sell Playbook if you are trying to record all artifacts related to the transaction in one place.
    4. Repeat the activity for the purchasing organization.
    5. Leverage the information to determine what the goal for the culture of IT will be post-separation if it will differ from the current culture.

    Record the results in the M&A Sell Playbook.

    Due Diligence & Preparation

    Step 3.2

    Prepare to Separate

    Activities

    • 3.2.1 Create a carve-out roadmap
    • 3.2.2 Prioritize separation tasks
    • 3.2.3 Establish the separation roadmap
    • 3.2.4 Identify the buyer’s IT expectations
    • 3.2.5 Create a service/transaction agreement
    • 3.2.6 Estimate separation costs
    • 3.2.7 Create an employee transition plan
    • 3.2.8 Create functional workplans for employees
    • 3.2.9 Align project metrics with identified tasks

    This step involves the following participants:

    • IT executive/CIO
    • IT senior leadership
    • Transition team
    • Company M&A team
    • Purchasing organization

    Outcomes of Step

    Have an established plan of action toward separation across all domains and a strategy toward resources.

    Don’t underestimate the importance of separation preparation

    Separation involves taking the IT organization and dividing it into two or more separate entities.

    Testing the carve capabilities of the IT organization often takes 3 months. (Source: Cognizant, 2014)

    Daimler-Benz lost nearly $19 billion following its purchase of Chrysler by failing to recognize the cultural differences that existed between the two car companies. (Source: Deal Room)

    Info-Tech Insight

    Separating the IT organization requires more time and effort than business leaders will know. Frequently communicate challenges and lost opportunities when carving the IT environment out.

    Separation needs

    Identify the business objectives of the sale to determine the IT strategy

    Set up a meeting with your IT due diligence team to:

    • Ensure there will be no gaps in the delivery of products and services in the future state.
    • Discuss the people and processes necessary to achieve the target technology environment and support M&A business objectives.

    Use this opportunity to:

    • Identify data and application complexities between the involved organizations.
    • Identify the IT people and process gaps, initiatives, and levels of support expected.
    • Determine your infrastructure needs to ensure effectiveness and delivery of services:
      • Does IT have the infrastructure to support the applications and business capabilities?
      • Identify any gaps between the current infrastructure in both organizations and the infrastructure required.
      • Identify any redundancies/gaps.
      • Determine the appropriate IT separation strategies.
    • Document your gaps, redundancies, initiatives, and assumptions to help you track and justify the initiatives that must be undertaken and help estimate the cost of separation.

    Separation strategies

    There are several IT separation strategies that will let you achieve your target technology environment.

    IT Separation Strategies
    • Divest. Carve out elements of the IT organization and sell them to a purchasing organization with or without a service-level agreement.
    • Sell. Sell the entire IT environment to a purchasing organization. The purchasing organization takes full responsibility in delivering and running the IT environment.
    • Spin-Off Joint Venture. Carve out elements of the IT organization and combine them with elements of a new or purchasing organization to create a new entity.

    The approach IT takes will depend on the business objectives for the M&A.

    • Generally speaking, the separation strategy is well understood and influenced by the frequency of and rationale for selling.
    • Based on the initiatives generated by each business process owner, you need to determine the IT separation strategy that will best support the desired target technology environment, especially if you are still operating or servicing elements of that IT environment.

    Key considerations when choosing an IT separation strategy include:

    • What are the main business objectives of the M&A?
    • What are the key synergies expected from the transaction?
    • What IT separation strategy best helps obtain these benefits?
    • What opportunities exist to position the business for sustainable and long-term growth?

    Separation strategies in detail

    Review highlights and drawbacks of different separation strategies

    Divest
      Highlights
    • Recommended for businesses striving to reduce costs and potentially even generate revenue for the business through the delivery of SLAs.
    • Opportunity to reduce or scale back on lines of business or products that are not driving profits.
      Drawbacks
    • May be forced to give up critical staff that have been known to deliver high value.
    • The IT department is left to deliver services to the purchasing organization with little support or consideration from the business.
    • There can be increased risk and security concerns that need to be addressed.
    Sell
      Highlights
    • Recommended for businesses looking to gain capital to exit the market profitably or to enter a new market with a large sum of capital.
    • The business will no longer exist, and as a result all operational costs, including IT, will become redundant.
      Drawbacks
    • IT is no longer needed as an operating or capital service for the organization.
    • Lost resources, including highly trained and critical staff.
    • May require packaging employees off and using the profit or capital generated to cover any closing costs.
    Spin-Off or Joint Venture
      Highlights
    • Recommended for businesses looking to expand their market presence or acquire new products. Essentially aligning the two organizations in the same market.
    • Each side has a unique offering but complementing capabilities.
      Drawbacks
    • As much as the organization is going through a separation from the original company, it will be going through an integration with the new company.
    • There could be differences in culture.
    • This could require a large amount of investment without a guarantee of profit or success.

    Preparing the carve-out roadmap

    And why it matters so much

    • When carving out the IT environment in preparation for a divestiture, it’s important to understand the infrastructure, application, and data connections that might exist.
    • Much to the business’ surprise, carving out the IT environment is not easy, especially when considering the services and products that might depend on access to certain applications or data sets.
    • Once the business has indicated which elements they anticipate divesting, be prepared for testing the functionality and ability of this carve-out, either through automation or manually. There are benefits and drawbacks to both methods:
      • Automated requires a solution and a developer to code the tests.
      • Manual requires time to find the errors, possibly more time than automated testing.
    • Identify if there are dependencies that will make the carve-out difficult.
      • For example, the business is trying to divest Product X, but that product is integrated with Product Y, which is not being sold.
      • Consider all the processes and products that specific data might support as well.
      • Moreover, the data migration tool will need to enter the ERP system and identify not just the data but all supporting and historical elements that underlie the data.

    Critical components to consider:

    • Selecting manual or automated testing
    • Determining data dependencies
    • Data migration capabilities
    • Auditing approval
    • People and skills that support specific elements being carved out

    3.2.1 Create a carve-out roadmap

    6 hours

    Input: Items included in the carve-out, Dependencies, Whether testing is completed, If the carve-out will pass audit, If the carve-out item is prepared to be separated

    Output: Carve-out roadmap

    Materials: Business’ divestiture plan, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Business leaders, Transition team

    The purpose of this activity is to prepare the IT environment by identifying a carve-out roadmap, specifically looking at data, infrastructure, and applications. Feel free to expand the roadmap to include other categories as your organization sees fit.

    1. In the Carve-Out Roadmap in the M&A Sell Playbook, identify the key elements of the carve-out in the first column.
    2. Note any dependencies the items might have. For example:
      • The business is selling Product X, which is linked to Data X and Data Y. The organization does not want to sell Data Y. Data X would be considered dependent on Data Y.
    3. Once the dependencies have been confirmed, begin automated or manual testing to examine the possibility of separating the data sets (or other dependencies) from one another.
    4. After identifying an acceptable method of separation, inform the auditing individual or body and confirm that there would be no repercussions for the planned process.

    Record the results in the M&A Sell Playbook.

    3.2.2 Prioritize separation tasks

    2 hours

    Input: Separation tasks, Transition team, M&A RACI

    Output: Prioritized separation list

    Materials: Separation task checklist, Separation roadmap

    Participants: IT executive/CIO, IT senior leadership, Company M&A team

    The purpose of this activity is to prioritize the different separation tasks that your organization has identified as necessary to this transaction. Some tasks might not be relevant for this particular transaction, and others might be critical.

    1. Begin by downloading the SharePoint or Excel version of the M&A Separation Project Management Tool.
    2. Identify which separation tasks you want to have as part of your project plan. Alter or remove any tasks that are irrelevant to your organization. Add in tasks you think are missing.
    3. When deciding criticality of the task, consider the effect on stakeholders, those who are impacted or influenced in the process of the task, and dependencies (e.g. data strategy needs to be addressed first before you can tackle its dependencies, like data quality).
    4. Feel free to edit the way you measure criticality. The standard tool leverages a three-point scale. At the end, you should have a list of tasks in priority order based on criticality.

    Record the updates in the M&A Separation Project Management Tool (SharePoint).

    Record the updates in the M&A Separation Project Management Tool (Excel).

    Separation checklists

    Prerequisite Checklist
    • Build the project plan for separation and prioritize activities
      • Plan first day
      • Plan first 30/100 days
      • Plan first year
    • Create an organization-aligned IT strategy
    • Identify critical stakeholders
    • Create a communication strategy
    • Understand the rationale for the sale or divestiture
    • Develop IT's sale/divestiture strategy
      • Determine goal opportunities
      • Create the mission and vision statements
      • Create the guiding principles
      • Create program metrics
    • Consolidate reports from due diligence/data room
    • Conduct culture assessment
    • Create a transaction team
    • Establish a service/technical transaction agreement
    • Plan and communicate culture changes
    • Create an employee transition plan
    • Assess baseline engagement
    Business
    • Design an enterprise architecture
    • Document your business architecture
    • Meet compliance and regulatory standards
    • Identify and assess all of IT's risks
    Applications
    • Prioritize and address critical applications
      • CRM
      • HRIS
      • Financial
      • Sales
      • Risk
      • Security
      • ERP
      • Email
    • Develop method of separating applications
    • Model critical applications that have dependencies on one another
    • Identify the infrastructure capacity required to support critical applications
    • Prioritize and address critical applications
    Leadership/IT Executive
    • Build an IT budget
    • Structure operating budget
    • Structure capital budget
    • Identify the workforce demand vs. capacity
    • Establish and monitor key metrics
    • Communicate value realized/cost savings
    Data
    • Confirm data strategy
    • Confirm data governance
    • Build a data architecture roadmap
    • Analyze data sources and domains
    • Evaluate data storage (on-premises vs. cloud)
    • Develop an enterprise content management strategy and roadmap
    • Ensure cleanliness/usability of data sets
    • Identify data sets that can remain operational if reduced/separated
    • Develop reporting and analytics capabilities
    • Confirm data strategy
    Operations
    • Manage sales access to customer data
    • Determine locations and hours of operation
    • Separate/terminate phone lists and extensions
    • Split email address books
    • Communicate helpdesk/service desk information

    Separation checklists (continued)

    Infrastructure
    • Manage organization domains
    • Consolidate data centers
    • Compile inventory of vendors, versions, switches, and routers
    • Review hardware lease or purchase agreements
    • Review outsourcing/service provider agreements
    • Review service-level agreements
    • Assess connectivity linkages between locations
    • Plan to migrate to a single email system if necessary
    • Determine network access concerns
    Vendors
    • Establish a sustainable vendor management office
    • Review vendor landscape
    • Identify warranty options
    • Identify the licensing grant
    • Rationalize vendor services and solutions
    People
    • Design an IT operating model
    • Design your future IT organizational structure
    • Conduct a RACI for prioritized activities
    • Conduct a culture assessment and identify goal IT culture
    • Build an IT employee engagement program
    • Determine critical roles and systems/process/products they support
    • Define new job descriptions with meaningful roles and responsibilities
    • Create employee transition plans
    • Create functional workplans
    Projects
    • Identify projects to be on hold
    • Communicate project intake process
    • Reprioritize projects
    Products & Services
    • Redefine service catalog
    • Ensure customer interaction requirements are met
    • Select a solution for product lifecycle management
    • Plan service-level agreements
    Security
    • Conduct a security assessment
    • Develop accessibility prioritization and schedule
    • Establish an information security strategy
    • Develop a security awareness and training program
    • Develop and manage security governance, risk, and compliance
    • Identify security budget
    • Build a data privacy and classification program
    IT Processes
    • Evaluate current process models
    • Determine productivity/capacity levels of processes
    • Identify processes to be changed/terminated
    • Establish a communication plan
    • Develop a change management process
    • Establish/review IT policies
    • Evaluate current process models

    3.2.2 Establish the separation roadmap

    2 hours

    Input: Prioritized separation tasks, Carve-out roadmap, Employee transition plan, Separation RACI, Costs for activities, Activity owners

    Output: Separation roadmap

    Materials: M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel), SharePoint Template: Step-by-Step Deployment Guide

    Participants: IT executive/CIO, IT senior leadership, Transition team, Company M&A team

    The purpose of this activity is to create a roadmap to support IT throughout the separation process. Using the information gathered in previous activities, you can create a roadmap that will ensure a smooth separation.

    1. Use our Separation Project Management Tool to help track critical elements in relation to the separation project. There are a few options available:
      1. Follow the instructions on the next slide if you are looking to upload our SharePoint project template. Additional instructions are available in the SharePoint Template Step-by-Step Deployment Guide.
      2. If you cannot or do not want to use SharePoint as your project management solution, download our Excel version of the tool.
        **Remember that this your tool, so customize to your liking.
    2. Identify who will own or be accountable for each of the separation tasks and establish the time frame for when each project should begin and end. This will confirm which tasks should be prioritized.

    Record the updates in the M&A Separation Project Management Tool (SharePoint).

    Record the updates in the M&A Separation Project Management Tool (Excel).

    Separation Project Management Tool (SharePoint Template)

    Follow these instructions to upload our template to your SharePoint environment

    1. Create or use an existing SP site.
    2. Download the M&A Separation Project Management Tool (SharePoint) .wsp file from the Mergers & Acquisitions: The Sell Blueprint landing page.
    3. To import a template into your SharePoint environment, do the following:
      1. Open PowerShell.
      2. Connect-SPO Service (need to install PowerShell module).
      3. Enter in your tenant admin URL.
      4. Enter in your admin credentials.
      5. Set-SPO Site https://YourDomain.sharepoint.com/sites/YourSiteHe... -DenyAddAndCustomizePages 0
      OR
      1. Turn on both custom script features to allow users to run custom
    4. Screenshot of the 'Custom Script' option for importing a template into your SharePoint environment. Feature description reads 'Control whether users can run custom script on personal sites and self-service created sites. Note: changes to this setting might take up to 24 hours to take effect. For more information, see http://go.microsoft.com/fwlink/?LinkIn=397546'. There are options to prevent or allow users from running custom script on personal/self-service created sites.
    5. Enable the SharePoint Server feature.
    6. Upload the .wsp file in Solutions Gallery.
    7. Deploy by creating a subsite and select from custom options.
      • Allow or prevent custom script
      • Security considerations of allowing custom script
      • Save, download, and upload a SharePoint site as a template
    8. Refer to Microsoft documentation to understand security considerations and what is and isn’t supported:

    For more information, check out the SharePoint Template: Step-by-Step Deployment Guide.

    Supporting the transition and establishing service-level agreements

    The purpose of this part of the transition is to ensure both buyer and seller have a full understanding of expectations for after the transaction.

    • Once the organizations have decided to move forward with a deal, all parties need a clear level of agreement.
    • IT, since it is often seen as an operational division of an organization, is often expected to deliver certain services or products once the transaction has officially closed.
    • The purchasing organization or the new company might depend on IT to deliver these services until they are able to provide those services on their own.
    • Having a clear understanding of what the buyer’s expectations are and what your company, as the selling organization, can provide is important.
    • Have a conversation with the buyer and document those expectations in a signed service agreement.

    3.2.4 Identify the buyer's IT expectations

    3-4 hours

    Input: Carve-out roadmap, Separation roadmap, Up-to-date version of the agreement

    Output: Buyer’s IT expectations

    Materials: Questions for meeting

    Participants: IT executive/CIO, IT senior leadership, Company M&A team, Purchasing company M&A team, Purchasing company IT leadership

    The purpose of this activity is to determine if the buyer has specific service expectations for your IT organization. By identifying, documenting, and agreeing on what services your IT organization will be responsible for, you can obtain a final agreement to protect you as the selling organization.

    1. Buyers should not assume certain services will be provided. Organize a meeting with IT leaders and the company M&A teams to determine what services will be provided.
    2. The next slide has a series of questions that you can start from. Ensure you get detailed information about each of the services.
    3. Once you fully understand the buyer’s IT expectations, create an SLA in the next activity and obtain sign-off from both organizations.

    Questions to ask the buyer

    1. What services would you like my IT organization to provide?
    2. How long do you anticipate those services will be provided to you?
    3. How do you expect your staff/employees to communicate requests or questions to my staff/employees?
    4. Are there certain days or times that you expect these services to be delivered?
    5. How many staff do you expect should be available to support you?
    6. What should be the acceptable response time on given service requests?
    7. When it comes to the services you require, what level of support should we provide?
    8. If a service requires escalation to Level 2 or Level 3 support, are we still expected to support this service? Or are we only Level 1 support?
    9. What preventative security methods does your organization have to protect our environment during this agreement period?

    3.2.5 Create a service/ transaction agreement

    6 hours

    Input: Buyer's expectations, Separation roadmap

    Output: SLA for the purchasing organization

    Materials: Service Catalog Internal Service Level Agreement Template, M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel)

    Participants: IT executive/CIO, IT senior leadership, Company M&A team, Purchasing company M&A team, Purchasing company IT leadership

    The purpose of this activity is to determine if the buyer has specific service expectations for your IT organization post-transaction that your IT organization is agreeing to provide.

    1. Document the expected services and the related details in a service-level agreement.
    2. Provide the SLA to the purchasing organization.
    3. Obtain sign-off from both organizations on the level of service that is expected of IT.
    4. Update the M&A Separation Project Management Tool Excel or SharePoint document to reflect any additional items that the purchasing organization identified.

    *For organizations being purchased in their entirety, this activity may not be relevant.

    Modify the Service Catalog Internal Service Level Agreement with the agreed-upon terms of the SLA.

    Importance of estimating separation costs

    Change is the key driver of separation costs

    Separation costs are dependent on the following:
    • Meeting synergy targets – whether that be cost saving or growth related.
      • Employee-related costs, licensing, and reconfiguration fees play a huge part in meeting synergy targets.
    • Adjustments related to compliance or regulations – especially if there are changes to legal entities, reporting requirements, or risk mitigation standards.
    • Governance or third party–related support required to ensure timelines are met and the separation is a success.
    Separation costs vary by industry type.
    • Certain industries may have separation costs made up of mostly one type, differing from other industries, due to the complexity and demands of the transaction. For example:
      • Healthcare separation costs are mostly driven by regulatory, safety, and quality standards, as well as consolidation of the research and development function.
      • Energy and Utilities tend to have the lowest separation costs due to most transactions occurring within the same sector rather than as cross-sector investments. For example, oil and gas transactions tend to be for oil fields and rigs (strategic fixed assets), which can easily be added to the buyer’s portfolio.

    Separation costs are more related to the degree of change required than the size of the transaction.

    3.2.6 Estimate separation costs

    3-4 hours

    Input: Separation tasks, Transition team, Valuation of current IT environment, Valuation of target IT environment, Outputs from data room, Technical debt, Employees

    Output: List of anticipated costs required to support IT separation

    Materials: Separation task checklist, Separation roadmap, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

    The purpose of this activity is to estimate the costs that will be associated with the separation. Identify and communicate a realistic figure to the larger M&A team within your company as early in the process as possible. This ensures that the funding required for the transaction is secured and budgeted for in the overarching transaction.

    1. On the associated slide in the M&A Sell Playbook, input:
      • Task
      • Domain
      • Cost type
      • Total cost amount
      • Level of certainty around the cost
    2. Provide a copy of the estimated costs to the company’s M&A team. Also provide any additional information identified earlier to help them understand the importance of those costs.

    Record the results in the M&A Sell Playbook.

    Employee transition planning

    Considering employee impact will be a huge component to ensure successful separation

    • Meet With Leadership
    • Plan Individual and Department Redeployment
    • Plan Individual and Department Layoffs
    • Monitor and Manage Departmental Effectiveness
    • For employees, the transition could mean:
      • Changing from their current role to a new role to meet requirements and expectations throughout the transition.
      • Being laid off because the role they are currently occupying has been made redundant.
    • It is important to plan for what the M&A separation needs will be and what the IT operational needs will be.
    • A lack of foresight into this long-term plan could lead to undue costs and headaches trying to retain critical staff, rehiring positions that were already let go, and keeping redundant employees longer then necessary.

    Info-Tech Insight

    Being transparent throughout the process is critical. Do not hesitate to tell employees the likelihood that their job may be made redundant. This will ensure a high level of trust and credibility for those who remain with the organization after the transaction.

    3.2.7 Create an employee transition plan

    3-4 hours

    Input: IT strategy, IT organizational design

    Output: Employee transition plans

    Materials: M&A Sell Playbook, Whiteboard, Sticky notes, Markers

    Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

    The purpose of this activity is to create a transition plan for employees.

    1. Transition planning can be done at specific individual levels or more broadly to reflect a single role. Consider these four items in the transition plan:
      • Understand the direction of the employee transitions.
      • Identify employees that will be involved in the transition (moved or laid off).
      • Prepare to meet with employees.
      • Meet with employees.
    2. For each employee that will be facing some sort of change in their regular role, permanent or temporary, create a transition plan.
    3. For additional information on transitioning employees, review the blueprint Streamline Your Workforce During a Pandemic.

    **Note that if someone’s future role is a layoff, then there is no need to record anything for skills needed or method for skill development.

    Record the results in the M&A Sell Playbook.

    3.2.8 Create functional workplans for employees

    3-4 hours

    Input: Prioritized separation tasks, Employee transition plan, Separation RACI, Costs for activities, Activity owners

    Output: Employee functional workplans

    Materials: M&A Sell Playbook, Learning and development tools

    Participants: IT executive/CIO, IT senior leadership, IT management team, Company M&A team, Transition team

    The purpose of this activity is to create a functional workplan for the different employees so that they know what their key role and responsibilities are once the transaction occurs.

    1. First complete the transition plan from the previous activity (3.2.7) and the separation roadmap. Have these documents ready to review throughout this process.
    2. Identify the employees who will be transitioning to a new role permanently or temporarily. Creating a functional workplan is especially important for these employees.
    3. Identify the skills these employees need to have to support the separation. Record this in the corresponding slide in the M&A Sell Playbook.
    4. For each employee, identify someone who will be a point of contact for them throughout the transition.

    It is recommended that each employee have a functional workplan. Leverage the IT managers to support this task.

    Record the results in the M&A Sell Playbook.

    Metrics for separation

    Valuation & Due Diligence

    • % Defects discovered in production
    • $ Cost per user for enterprise applications
    • % In-house-built applications vs. enterprise applications
    • % Owners identified for all data domains
    • # IT staff asked to participate in due diligence
    • Change to due diligence
    • IT budget variance
    • Synergy target

    Execution & Value Realization

    • % Satisfaction with the effectiveness of IT capabilities
    • % Overall end-customer satisfaction
    • $ Impact of vendor SLA breaches
    • $ Savings through cost-optimization efforts
    • $ Savings through application rationalization and technology standardization
    • # Key positions empty
    • % Frequency of staff turnover
    • % Emergency changes
    • # Hours of unplanned downtime
    • % Releases that cause downtime
    • % Incidents with identified problem record
    • % Problems with identified root cause
    • # Days from problem identification to root cause fix
    • % Projects that consider IT risk
    • % Incidents due to issues not addressed in the security plan
    • # Average vulnerability remediation time
    • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
    • # Time (days) to value realization
    • % Projects that realized planned benefits
    • $ IT operational savings and cost reductions that are related to synergies/divestitures
    • % IT staff–related expenses/redundancies
    • # Days spent on IT separation
    • $ Accurate IT budget estimates
    • % Revenue growth directly tied to IT delivery
    • % Profit margin growth

    3.2.9 Align project metrics with identified tasks

    3-4 hours

    Input: Prioritized separation tasks, Employee transition plan, Separation RACI, Costs for activities, Activity owners, M&A goals

    Output: Separation-specific metrics to measure success

    Materials: Separation roadmap, M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Transition team

    The purpose of this activity is to understand how to measure the success of the separation project by aligning metrics to each identified task.

    1. Review the M&A goals identified by the business. Your metrics will need to tie back to those business goals.
    2. Identify metrics that align to identified tasks and measure achievement of those goals. For each metric you consider, ask the following questions:
      • What is the main goal or objective that this metric is trying to solve?
      • What does success look like?
      • Does the metric promote the right behavior?
      • Is the metric actionable? What is the story you are trying to tell with this metric?
      • How often will this get measured?
      • Are there any metrics it supports or is supported by?

    Record the results in the M&A Sell Playbook.

    By the end of this mid-transaction phase you should:

    Have successfully evaluated your IT people, processes, and technology to determine a roadmap forward for separating or selling.

    Key outcomes from the Due Diligence & Preparation phase
    • Participate in due diligence activities to comply with regulatory and auditing standards and prepare employees for the transition.
    • Create a separation roadmap that considers the tasks that will need to be completed and the resources required to support separation.
    Key deliverables from the Due Diligence & Preparation phase
    • Drive value with a due diligence charter
    • Gather data room artifacts
    • Measure staff engagement
    • Assess culture
    • Create a carve-out roadmap
    • Prioritize separation tasks
    • Establish the separation roadmap
    • Identify the buyer’s IT expectations
    • Create a service/transaction agreement
    • Estimate separation costs
    • Create an employee transition plan
    • Create functional workplans for employees
    • Align project metrics with identified tasks

    M&A Sell Blueprint

    Phase 4

    Execution & Value Realization

    Phase 1Phase 2Phase 3

    Phase 4

    • 1.1 Identify Stakeholders and Their Perspective of IT
    • 1.2 Assess IT’s Current Value and Future State
    • 1.3 Drive Innovation and Suggest Reduction Opportunities
    • 2.1 Establish the M&A Program Plan
    • 2.2 Prepare IT to Engage in the Separation or Sale
    • 3.1 Engage in Due Diligence and Prepare Staff
    • 3.2 Prepare to Separate
    • 4.1 Execute the Transaction
    • 4.2 Reflection and Value Realization

    This phase will walk you through the following activities:

    • Monitor service agreements
    • Continually update the project plan
    • Confirm separation costs
    • Review IT’s transaction value
    • Conduct a transaction and separation SWOT
    • Review the playbook and prepare for future transactions

    This phase involves the following participants:

    • IT executive/CIO
    • IT senior leadership
    • Vendor management team
    • IT transaction team
    • Company M&A team

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Pre-Work

    Day 1

    Day 2

    Day 3

    Engage in Separation

    Day 4

    Establish the Transaction FoundationDiscover the Motivation for IntegrationPlan the Separation RoadmapPrepare Employees for the TransitionEngage in SeparationAssess the Transaction Outcomes (Must be within 30 days of transaction date)

    Activities

    • 0.1 Identify the rationale for the company's decision to pursue a divestiture/sale.
    • 0.2 Identify key stakeholders and determine the IT transaction team.
    • 0.3 Gather and evaluate the M&A strategy, future-state operating model, and governance.
    • 1.1 Review the business rationale for the divestiture/sale.
    • 1.2 Identify pain points and opportunities tied to the divestiture/sale.
    • 1.3 Establish the separation strategy.
    • 1.4 Create the due diligence charter.
    • 2.1 Prioritize separation tasks.
    • 2.2 Establish the separation roadmap.
    • 2.3 Establish and align project metrics with identified tasks.
    • 2.4 Estimate separation costs.
    • 3.1 Measure staff engagement
    • 3.2 Assess the current culture and identify the goal culture.
    • 3.3 Create an employee transition plan.
    • 3.4 Create functional workplans for employees.
    • S.1 Complete the separation by regularly updating the project plan.
    • S.2 Assess the service/technical transaction agreement.
    • 4.1 Confirm separation costs.
    • 4.2 Review IT’s transaction value.
    • 4.3 Conduct a transaction and separation SWOT.
    • 4.4 Review the playbook and prepare for future transactions.

    Deliverables

    1. IT strategy
    2. IT operating model
    3. IT governance structure
    4. M&A transaction team
    1. Business context implications for IT
    2. Separation strategy
    3. Due diligence charter
    1. Separation roadmap and associated resourcing
    1. Engagement assessment
    2. Culture assessment
    3. Employee transition plans and workplans
    1. Evaluate service/technical transaction agreement
    2. Updated separation project plan
    1. SWOT of transaction
    2. M&A Sell Playbook refined for future transactions

    What is the Execution & Value Realization phase?

    Post-transaction state

    Once the transaction comes to a close, it’s time for IT to deliver on the critical separation tasks. As the selling organization in this transaction, you need to ensure you have a roadmap that properly enables the ongoing delivery of your IT environment while simultaneously delivering the necessary services to the purchasing organization.

    Throughout the separation transaction, some of the most common obstacles IT should prepare for include difficulty separating the IT environment, loss of key personnel, disengaged employees, and security/compliance issues.

    Post-transaction, the business needs to understands the value they received by engaging in the transaction and the ongoing revenue they might obtain as a result of the sale. You also need to ensure that the IT environment is functioning and mitigating any high-risk outcomes.

    Goal: To carry out the planned separation activities and deliver the intended value to the business.

    Execution Prerequisite Checklist

    Before coming into the Execution & Value Realization phase, you must have addressed the following:

    • Understand the rationale for the company's decisions to pursue a sale or divestiture and what opportunities or pain points the sale should alleviate.
    • Identify the key roles for the transaction team.
    • Identify the M&A governance.
    • Determine target metrics.
    • Select a separation strategy framework.
    • Conduct a RACI for key transaction tasks for the transaction team.
    • Create a carve-out roadmap.
    • Prioritize separation tasks.
    • Establish the separation roadmap.
    • Create employee transition plans.

    Before coming into the Execution & Value Realization phase, we recommend addressing the following:

    • Create vision and mission statements.
    • Establish guiding principles.
    • Create a future-state operating model.
    • Identify the M&A operating model.
    • Document the communication plan.
    • Examine the business perspective of IT.
    • Identify key stakeholders and outline their relationship to the M&A process.
    • Establish a due diligence charter.
    • Be able to valuate the IT environment and communicate IT’s value to the business.
    • Gather and present due diligence data room artifacts.
    • Measure staff engagement.
    • Assess and plan for culture.
    • Estimate separation costs.
    • Create functional workplans for employees.
    • Identify the buyer’s IT expectations.
    • Create a service/ transaction agreement.

    Separation checklists

    Prerequisite Checklist
    • Build the project plan for separation and prioritize activities
      • Plan first day
      • Plan first 30/100 days
      • Plan first year
    • Create an organization-aligned IT strategy
    • Identify critical stakeholders
    • Create a communication strategy
    • Understand the rationale for the sale or divestiture
    • Develop IT's sale/divestiture strategy
      • Determine goal opportunities
      • Create the mission and vision statements
      • Create the guiding principles
      • Create program metrics
    • Consolidate reports from due diligence/data room
    • Conduct culture assessment
    • Create a transaction team
    • Establish a service/technical transaction agreement
    • Plan and communicate culture changes
    • Create an employee transition plan
    • Assess baseline engagement
    Business
    • Design an enterprise architecture
    • Document your business architecture
    • Meet compliance and regulatory standards
    • Identify and assess all of IT's risks
    Applications
    • Prioritize and address critical applications
      • CRM
      • HRIS
      • Financial
      • Sales
      • Risk
      • Security
      • ERP
      • Email
    • Develop method of separating applications
    • Model critical applications that have dependencies on one another
    • Identify the infrastructure capacity required to support critical applications
    • Prioritize and address critical applications
    Leadership/IT Executive
    • Build an IT budget
    • Structure operating budget
    • Structure capital budget
    • Identify the workforce demand vs. capacity
    • Establish and monitor key metrics
    • Communicate value realized/cost savings
    Data
    • Confirm data strategy
    • Confirm data governance
    • Build a data architecture roadmap
    • Analyze data sources and domains
    • Evaluate data storage (on-premises vs. cloud)
    • Develop an enterprise content management strategy and roadmap
    • Ensure cleanliness/usability of data sets
    • Identify data sets that can remain operational if reduced/separated
    • Develop reporting and analytics capabilities
    • Confirm data strategy
    Operations
    • Manage sales access to customer data
    • Determine locations and hours of operation
    • Separate/terminate phone lists and extensions
    • Split email address books
    • Communicate helpdesk/service desk information

    Separation checklists (continued)

    Infrastructure
    • Manage organization domains
    • Consolidate data centers
    • Compile inventory of vendors, versions, switches, and routers
    • Review hardware lease or purchase agreements
    • Review outsourcing/service provider agreements
    • Review service-level agreements
    • Assess connectivity linkages between locations
    • Plan to migrate to a single email system if necessary
    • Determine network access concerns
    Vendors
    • Establish a sustainable vendor management office
    • Review vendor landscape
    • Identify warranty options
    • Identify the licensing grant
    • Rationalize vendor services and solutions
    People
    • Design an IT operating model
    • Design your future IT organizational structure
    • Conduct a RACI for prioritized activities
    • Conduct a culture assessment and identify goal IT culture
    • Build an IT employee engagement program
    • Determine critical roles and systems/process/products they support
    • Define new job descriptions with meaningful roles and responsibilities
    • Create employee transition plans
    • Create functional workplans
    Projects
    • Identify projects to be on hold
    • Communicate project intake process
    • Reprioritize projects
    Products & Services
    • Redefine service catalog
    • Ensure customer interaction requirements are met
    • Select a solution for product lifecycle management
    • Plan service-level agreements
    Security
    • Conduct a security assessment
    • Develop accessibility prioritization and schedule
    • Establish an information security strategy
    • Develop a security awareness and training program
    • Develop and manage security governance, risk, and compliance
    • Identify security budget
    • Build a data privacy and classification program
    IT Processes
    • Evaluate current process models
    • Determine productivity/capacity levels of processes
    • Identify processes to be changed/terminated
    • Establish a communication plan
    • Develop a change management process
    • Establish/review IT policies
    • Evaluate current process models

    Execution & Value Realization

    Step 4.1

    Execute the Transaction

    Activities

    • 4.1.1 Monitor service agreements
    • 4.1.2 Continually update the project plan

    This step will walk you through the following activities:

    • Monitor service agreements
    • Continually update the project plan

    This step involves the following participants:

    • IT executive/CIO
    • IT senior leadership
    • Vendor management team
    • IT transaction team
    • Company M&A team

    Outcomes of Step

    Successfully execute the separation of the IT environments and update the project plan, strategizing against any roadblocks as they come.

    Key concerns to monitor during separation

    If you are entering the transaction at this point, consider and monitor the following three items above all else.

    Your IT environment, reputation as an IT leader, and impact on key staff will depend on monitoring these aspects.

    • Risk & Security. Make sure that the channels of communication between the purchasing organization and your IT environment are properly determined and protected. This might include updating or removing employees’ access to certain programs.
    • Retaining Employees. Employees who do not see a path forward in the organization or who feel that their skills are being underused will be quick to move on. Make sure they are engaged before, during, and after the transaction to avoid losing employees.
    • IT Environment Dependencies. Testing the IT environment several times and obtaining sign-off from auditors that this has been completed correctly should be completed well before the transaction occurs. Have a strong architecture outlining technical dependencies.

    For more information, review:

    • Reduce and Manage Your Organization’s Insider Threat Risk
    • Map Technical Skills for a Changing Infrastructure Operations Organization
    • Build a Data Architecture Roadmap

    4.1.1 Monitor service agreements

    3-6 months

    Input: Original service agreement, Risk register

    Output: Service agreement confirmed

    Materials: Original service agreement

    Participants: IT executive/CIO, IT senior leadership, External organization IT senior leadership

    The purpose of this activity is to monitor the established service agreements on an ongoing basis. Your organization is most at risk during the initial months following the transaction.

    1. Ensure the right controls exist to prevent the organization from unnecessarily opening itself up to risks.
    2. Meet with the purchasing organization/subsidiary three months after the transaction to ensure that everyone is satisfied with the level of services provided.
    3. This is not a quick and completed activity, but one that requires ongoing monitoring. Repeatedly identify potential risks worth mitigating.

    For additional information and support for this activity, see the blueprint Build an IT Risk Management Program.

    4.1.2 Continually update the project plan

    Reoccurring basis following transition

    Input: Prioritized separation tasks, Separation RACI, Activity owners

    Output: Updated separation project plan

    Materials: M&A Separation Project Plan Tool (SharePoint), M&A Separation Project Plan Tool (Excel)

    Participants: IT executive/CIO, IT senior leadership, IT transaction team, Company M&A team

    The purpose of this activity is to ensure that the project plan is continuously updated as your transaction team continues to execute on the various components outlined in the project plan.

    1. Set a regular cadence for the transaction team to meet, update the project plan, review the status of the various separation task items, and strategize how to overcome any roadblocks.
    2. Employ governance best practices in these meetings to ensure decisions can be made effectively and resources allocated strategically.

    Record the updates in the M&A Separation Project Management Tool (SharePoint).

    Record the updates in the M&A Separation Project Management Tool (Excel).

    Execution & Value Realization

    Step 4.2

    Reflection and Value Realization

    Activities

    • 4.2.1 Confirm separation costs
    • 4.2.2 Review IT’s transaction value
    • 4.2.3 Conduct a transaction and separation SWOT
    • 4.2.4 Review the playbook and prepare for future transactions

    This step involves the following participants:

    • IT executive/CIO
    • IT senior leadership
    • Transition team
    • Company M&A team

    Outcomes of Step

    Review the value that IT was able to generate around the transaction and strategize about how to improve future selling or separating transactions.

    4.2.1 Confirm separation costs

    3-4 hours

    Input: Separation tasks, Carve-out roadmap, Transition team, Previous RACI, Estimated separation costs

    Output: Actual separation costs

    Materials: M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Transaction team, Company M&A team

    The purpose of this activity is to confirm the associated costs around separation. While the separation costs would have been estimated previously, it’s important to confirm the costs that were associated with the separation in order to provide an accurate and up-to-date report to the company’s M&A team.

    1. Taking all the original items identified previously in activity 3.2.6, identify if there were changes in the estimated costs. This can be an increase or a decrease.
    2. Ensure that each cost has a justification for why the cost changed from the original estimation.

    Record the results in the M&A Sell Playbook.

    Track cost savings and revenue generation

    Throughout the transaction, the business would have communicated its goals, rationales, and expectations for the transaction. Sometimes this is done explicitly, and other times the information is implicit. Either way, IT needs to ensure that metrics have been defined and are measuring the intended value that the business expects. Ensure that the benefits realized to the organization are being communicated regularly and frequently.

    1. Define Metrics: Select metrics to track synergies through the separation.
      1. You can track value by looking at percentages of improvement in process-level metrics depending on the savings or revenue being pursued.
      2. For example, if the value being pursued is decreasing costs, metrics could range from capacity to output, highlighting that the output remains high despite smaller IT environments.
    2. Prioritize Value-Driving Initiatives: Estimate the cost and benefit of each initiative's implementation to compare the amount of business value to the cost. The benefits and costs should be illustrated at a high level. Estimating the exact dollar value of fulfilling a synergy can be difficult and misleading.
        Steps
      • Determine the benefits that each initiative is expected to deliver.
      • Determine the high-level costs of implementation (capacity, time, resources, effort).
    3. Track Cost Savings and Revenue Generation: Develop a detailed workplan to resource the roadmap and track where costs are saved and revenue is generated as the initiatives are undertaken.

    4.2.2 Review IT’s transaction value

    3-4 hours

    Input: Prioritized separation tasks, Separation RACI, Activity owners, M&A company goals

    Output: Transaction value

    Materials: M&A Sell Playbook

    Participants: IT executive/CIO, IT senior leadership, Company's M&A team

    The purpose of this activity is to track how your IT organization performed against the originally identified metrics.

    1. If your organization did not have the opportunity to identify metrics, determine from the company M&A what those metrics might be. Review activity 3.2.9 for more information on metrics.
    2. Identify whether the metric (which should support a goal) was at, below, or above the original target metric. This is a very critical task for IT to complete because it allows IT to confirm that they were successful in the transaction and that the business can count on them in future transactions.
    3. Be sure to record accurate and relevant information on why the outcomes (good or bad) are supporting the M&A goals set out by the business.

    Record the results in the M&A Sell Playbook.

    4.2.3 Conduct a transaction and separation SWOT

    2 hours

    Input: Separation costs, Retention rates, Value that IT contributed to the transaction

    Output: Strengths, weaknesses, opportunities, and threats

    Materials: Flip charts, Markers, Sticky notes

    Participants: IT executive/CIO, IT senior leadership, Business transaction team

    The purpose of this activity is to assess the positive and negative elements of the transaction.

    1. Consider the internal and external elements that could have impacted the outcome of the transaction.
      • Strengths. Internal characteristics that are favorable as they relate to your development environment.
      • Weaknesses Internal characteristics that are unfavorable or need improvement.
      • Opportunities External characteristics that you may use to your advantage.
      • Threats External characteristics that may be potential sources of failure or risk.

    Record the results in the M&A Sell Playbook.

    M&A Sell Playbook review

    With an acquisition complete, your IT organization is now more prepared then ever to support the business through future M&As

    • Now that the transaction is more than 80% complete, take the opportunity to review the key elements that worked well and the opportunities for improvement.
    • Critically examine the M&A Sell Playbook your IT organization created and identify what worked well to help the transaction and where your organization could adjust to do better in future transactions.
    • If your organization were to engage in another sale or divestiture under your IT leadership, how would you go about the transaction to make sure the company meets its goals?

    4.2.4 Review the playbook and prepare for future transactions

    4 hours

    Input: Transaction and separation SWOT

    Output: Refined M&A playbook

    Materials: M&A Sell Playbook

    Participants: IT executive/CIO

    The purpose of this activity is to revise the playbook and ensure it is ready to go for future transactions.

    1. Using the outputs from the previous activity, 4.2.3, determine what strengths and opportunities there were that should be leveraged in the next transaction.
    2. Likewise, determine which threats and weaknesses could be avoided in the future transactions.
      Remember, this is your M&A Sell Playbook, and it should reflect the most successful outcome for you in your organization.

    Record the results in the M&A Sell Playbook.

    By the end of this post-transaction phase you should:

    Have completed the separation post-transaction and be fluidly delivering the critical value that the business expected of IT.

    Key outcomes from the Execution & Value Realization phase
    • Ensure the separation tasks are being completed and that any blockers related to the transaction are being removed.
    • Determine where IT was able to realize value for the business and demonstrate IT’s involvement in meeting target goals.
    Key deliverables from the Execution & Value Realization phase
    • Monitor service agreements
    • Continually update the project plan
    • Confirm separation costs
    • Review IT’s transaction value
    • Conduct a transaction and separation SWOT
    • Review the playbook and prepare for future transactions

    Summary of Accomplishment

    Problem Solved

    Congratulations, you have completed the M&A Sell Blueprint!

    Rather than reacting to a transaction, you have been proactive in tackling this initiative. You now have a process to fall back on in which you can be an innovative IT leader by suggesting how and why the business should engage in a separation or sale transaction. You have:

    • Created a standardized approach for how your IT organization should address divestitures or sales.
    • Retained critical staff and complied with any regulations throughout the transaction.
    • Delivered on the separation project plan successfully and communicated IT’s transaction value to the business.

    Now that you have done all of this, reflect on what went well and what can be improved if you were to engage in a similar divestiture or sale again.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

    Contact your account representative for more information
    workshops@infotech.com 1-888-670-8899

    Research Contributors and Experts

    Ibrahim Abdel-Kader
    Research Analyst | CIO
    Info-Tech Research Group
    Brittany Lutes
    Senior Research Analyst | CIO
    Info-Tech Research Group
    John Annand
    Principal Research Director | Infrastructure
    Info-Tech Research Group
    Scott Bickley
    Principal Research Director | Vendor Management
    Info-Tech Research Group
    Cole Cioran
    Practice Lead | Applications
    Info-Tech Research Group
    Dana Daher
    Research Analyst | Strategy & Innovation
    Info-Tech Research Group
    Eric Dolinar
    Manager | M&A Consulting
    Deloitte Canada
    Christoph Egel
    Director, Solution Design & Deliver
    Cooper Tire & Rubber Company
    Nora Fisher
    Vice President | Executive Services Advisory
    Info-Tech Research Group
    Larry Fretz
    Vice President | Industry
    Info-Tech Research Group

    Research Contributors and Experts

    David Glazer
    Vice President of Analytics
    Kroll
    Jack Hakimian
    Senior Vice President | Workshops and Delivery
    Info-Tech Research Group
    Gord Harrison
    Senior Vice President | Research & Advisory
    Info-Tech Research Group
    Valence Howden
    Principal Research Director | CIO
    Info-Tech Research Group
    Jennifer Jones
    Research Director | Industry
    Info-Tech Research Group
    Nancy McCuaig
    Senior Vice President | Chief Technology and Data Office
    IGM Financial Inc.
    Carlene McCubbin
    Practice Lead | CIO
    Info-Tech Research Group
    Kenneth McGee
    Research Fellow | Strategy & Innovation
    Info-Tech Research Group
    Nayma Naser
    Associate
    Deloitte
    Andy Neill
    Practice Lead | Data & Analytics, Enterprise Architecture
    Info-Tech Research Group

    Research Contributors and Experts

    Rick Pittman
    Vice President | Research
    Info-Tech Research Group
    Rocco Rao
    Research Director | Industry
    Info-Tech Research Group
    Mark Rosa
    Senior Vice President & Chief Information Officer
    Mohegan Gaming and Entertainment
    Tracy-Lynn Reid
    Research Lead | People & Leadership
    Info-Tech Research Group
    Jim Robson
    Senior Vice President | Shared Enterprise Services (retired)
    Great-West Life
    Steven Schmidt
    Senior Managing Partner Advisory | Executive Services
    Info-Tech Research Group
    Nikki Seventikidis
    Senior Manager | Finance Initiative & Continuous Improvement
    CST Consultants Inc.
    Allison Straker
    Research Director | CIO
    Info-Tech Research Group
    Justin Waelz
    Senior Network & Systems Administrator
    Info-Tech Research Group
    Sallie Wright
    Executive Counselor
    Info-Tech Research Group

    Bibliography

    “5 Ways for CIOs to Accelerate Value During Mergers and Acquisitions.” Okta, n.d. Web.

    Altintepe, Hakan. “Mergers and acquisitions speed up digital transformation.” CIO.com, 27 July 2018. Web.

    “America’s elite law firms are booming.” The Economist, 15 July 2021. Web.

    Barbaglia, Pamela, and Joshua Franklin. “Global M&A sets Q1 record as dealmakers shape post-COVID world.” Nasdaq, 1 April 2021. Web.

    Boyce, Paul. “Mergers and Acquisitions Definition: Types, Advantages, and Disadvantages.” BoyceWire, 8 Oct. 2020. Web.

    Bradt, George. “83% Of Mergers Fail -- Leverage A 100-Day Action Plan For Success Instead.” Forbes, 27 Jan. 2015. Web.

    Capgemini. “Mergers and Acquisitions: Get CIOs, IT Leaders Involved Early.” Channel e2e, 19 June 2020. Web.

    Chandra, Sumit, et al. “Make Or Break: The Critical Role Of IT In Post-Merger Integration.” IMAA Institute, 2016. Web.

    Deloitte. “How to Calculate Technical Debt.” The Wall Street Journal, 21 Jan. 2015. Web.

    Ernst & Young. “IT As A Driver Of M&A Success.” IMAA Institute, 2017. Web.

    Fernandes, Nuno. “M&As In 2021: How To Improve The Odds Of A Successful Deal.” Forbes, 23 March 2021. Web.

    “Five steps to a better 'technology fit' in mergers and acquisitions.” BCS, 7 Nov. 2019. Web.

    Fricke, Pierre. “The Biggest Opportunity You’re Missing During an M&Aamp; IT Integration.” Rackspace, 4 Nov. 2020. Web.

    Garrison, David W. “Most Mergers Fail Because People Aren't Boxes.” Forbes, 24 June 2019. Web.

    Harroch, Richard. “What You Need To Know About Mergers & Acquisitions: 12 Key Considerations When Selling Your Company.” Forbes, 27 Aug. 2018. Web.

    Hope, Michele. “M&A Integration: New Ways To Contain The IT Cost Of Mergers, Acquisitions And Migrations.” Iron Mountain, n.d. Web.

    “How Agile Project Management Principles Can Modernize M&A.” Business.com, 13 April 2020. Web.

    Hull, Patrick. “Answer 4 Questions to Get a Great Mission Statement.” Forbes, 10 Jan. 2013. Web.

    Kanter, Rosabeth Moss. “What We Can Learn About Unity from Hostile Takeovers.” Harvard Business Review, 12 Nov. 2020. Web.

    Koller, Tim, et al. “Valuation: Measuring and Managing the Value of Companies, 7th edition.” McKinsey & Company, 2020. Web.

    Labate, John. “M&A Alternatives Take Center Stage: Survey.” The Wall Street Journal, 30 Oct. 2020. Web.

    Lerner, Maya Ber. “How to Calculate ROI on Infrastructure Automation.” DevOps.com, 1 July 2020. Web.

    Loten, Angus. “Companies Without a Tech Plan in M&A Deals Face Higher IT Costs.” The Wall Street Journal, 18 June 2019. Web.

    Low, Jia Jen. “Tackling the tech integration challenge of mergers today” Tech HQ, 6 Jan. 2020. Web.

    Lucas, Suzanne. “5 Reasons Turnover Should Scare You.” Inc. 22 March 2013. Web.

    “M&A Trends Survey: The future of M&A. Deal trends in a changing world.” Deloitte, Oct. 2020. Web.

    Maheshwari, Adi, and Manish Dabas. “Six strategies tech companies are using for successful divesting.” EY, 1 Aug. 2020. Web.

    Majaski, Christina. “Mergers and Acquisitions: What's the Difference?” Investopedia, 30 Apr. 2021.

    “Mergers & Acquisitions: Top 5 Technology Considerations.” Teksetra, 21 Jul. 2020. Web.

    “Mergers Acquisitions M&A Process.” Corporate Finance Institute, n.d. Web.

    “Mergers and acquisitions: A means to gain technology and expertise.” DLA Piper, 2020. Web.

    Nash, Kim S. “CIOs Take Larger Role in Pre-IPO Prep Work.” The Wall Street Journal, 5 March 2015. Web.

    O'Connell, Sean, et al. “Divestitures: How to Invest for Success.” McKinsey, 1 Aug. 2015. Web

    Paszti, Laila. “Canada: Emerging Trends In Information Technology (IT) Mergers And Acquisitions.” Mondaq, 24 Oct. 2019. Web.

    Patel, Kiison. “The 8 Biggest M&A Failures of All Time” Deal Room, 9 Sept. 2021. Web.

    Peek, Sean, and Paula Fernandes. “What Is a Vision Statement?” Business News Daily, 7 May 2020. Web.

    Ravid, Barak. “How divestments can re-energize the technology growth story.” EY, 14 July 2021. Web.

    Ravid, Barak. “Tech execs focus on growth amid increasingly competitive M&A market.” EY, 28 April 2021. Web.

    Resch, Scott. “5 Questions with a Mergers & Acquisitions Expert.” CIO, 25 June 2019. Web.

    Salsberg, Brian. “Four tips for estimating one-time M&A integration costs.” EY, 17 Oct. 2019. Web.

    Samuels, Mark. “Mergers and acquisitions: Five ways tech can smooth the way.” ZDNet, 15 Aug. 2018. Web.

    “SAP Divestiture Projects: Options, Approach and Challenges.” Cognizant, May, 2014. Web.

    Steeves, Dave. “7 Rules for Surviving a Merger & Acquisition Technology Integration.” Steeves and Associates, 5 Feb. 2020. Web.

    Tanaszi, Margaret. “Calculating IT Value in Business Terms.” CSO, 27 May 2004. Web.

    “The CIO Playbook. Nine Steps CIOs Must Take For Successful Divestitures.” SNP, 2016. Web.

    “The Role of IT in Supporting Mergers and Acquisitions.” Cognizant, Feb. 2015. Web.

    Torres, Roberto. “M&A playbook: How to prepare for the cost, staff and tech hurdles.” CIO Dive, 14 Nov. 2019. Web.

    “Valuation Methods.” Corporate Finance Institute, n.d. Web.

    Weller, Joe. “The Ultimate Guide to the M&A Process for Buyers and Sellers.” Smartsheet, 16 May 2019. Web.

    Improve Email Security

    • Buy Link or Shortcode: {j2store}272|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Secure Cloud & Network Architecture
    • Parent Category Link: /secure-cloud-network-architecture

    As the sophistication of malicious attacks increases, it has become more difficult to ensure applications such as email software are properly protected and secured. The increase in usage and traffic of email exacerbates the security risks to the organization.

    Our Advice

    Critical Insight

    Email has changed. Your email security needs to evolve as well to ensure you are protecting your organization’s communication.

    Impact and Result

    • Gain an understanding of the importance of email security and steps to secure your corporate email.
    • Develop holistic guidelines on implementing best practices to modernize your organization’s email security.

    Improve Email Security Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Improve Email Security Storyboard – A guide to best practices for improving an organization’s email security.

    This research provides guidelines to assist organizations in identifying controls to secure their emails along with recommendations on the most common and effective controls to secure and protect corporate emails.

    • Improve Email Security Storyboard

    2. Email Security Checklist – A checklist tool that enables organizations to monitor their progress in implementing controls to improve their email security.

    This checklist of common email security categories and their associated controls helps ensure organizations are following best practices.

    • Email Security Checklist
    [infographic]

    Further reading

    Improve Email Security

    Follow the latest best practices for email security to mitigate evolving threats.

    Analyst Perspective

    Protecting your organization’s digital assets begins with securing your email communication.

    As organizations increasingly rely on email communication for day-to-day business operations, threat actors are exploiting the increased traction to develop and implement more sophisticated email-based attacks. Furthermore, the lack of investment in measures, tools, and technologies for an organization’s email security exacerbates the vulnerabilities at hand.

    Effective use of security procedures and techniques can mitigate and minimize email-based threats have been shown to reduce the ability of these attacks to infiltrate the email inbox. These guidelines and best practices will help your organization conduct due diligence to protect the contents of the email, its transit, and its arrival to the authorized recipient.

    Ahmad Jowhar, Research Specialist, Security & Privacy

    Ahmad Jowhar
    Research Specialist, Security & Privacy
    Info-Tech Research Group

    Executive Summary

    Your Challenge Common Obstacles Info-Tech’s Approach
    • As malicious attacks get increasingly sophisticated, it has become more difficult to ensure applications such as email software are properly protected and secured.
    • The increased usage and traffic of emails, as well as their contents, exacerbates security risks to the organization.
    • Given the variety of email security controls, it can be complicated to identify the most important techniques for improving your organization’s email security.
    • Understand the importance of implementing email security for your organization.
    • Develop a holistic guideline for implementing best practices to secure your organization’s emails.

    Info-Tech Insight
    Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

    Your Challenge

    As a security leader, you need to modernize your email security services so you can protect business communications and prevent security incidents.

    • Various factors must be considered when deciding how best to safeguard your organization’s communication chain. This includes the frequency of email traffic and the contents of emails.
    • The increased number of email-based cyberattacks reveals the sophistication of threat actors in leveraging an organization’s lack of email security to infiltrate their business.
    • As organizations continue to rely heavily on email communication, email-based threats will become increasingly prevalent.

    75% of organizations have experienced an increase in email-based threats.

    97% of security breaches are due to phishing attacks.

    82% of companies reported a higher volume of email in 2022.

    Source: Mimecast, 2023.

    Modern email security controls framework for security leaders

    Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

    Modern email security controls framework for security leaders

    Understand the best practices in securing your organization’s emails

    Enhance your security posture by modernizing your email security
    Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

    Deploy an added layer of defense by preventing the contents of your email from being intercepted.

    Encrypting your email communication will provide an additional layer of protection which only allows authorized users to read the email.

    Leverage triple-threat authentication controls to strengthen your email security.

    Leveraging SPF, DKIM, and DMARC enables you to have the proper authentication controls in place, ensuring that only legitimate users are part of the email communication.

    Protect the contents of your email through data classification and data loss prevention.

    Having tools and technologies in place to ensure that data is classified and backed up will enable better storage, analysis, and processing of the email.

    Implement email policies for a holistic email security protection.

    Policies ensure acceptable standards are in place to protect the organization’s assets, including the creation, attachment, sending, and receiving of emails.

    User awareness and training
    Training employees on protecting their corporate emails adds an extra layer of defense by ensuring end users are aware of various email-based threats and can confidently safeguard their organizations from attacks.

    Email encryption

    Deploy an added layer of defense by preventing the contents of your email from being intercepted.

    • Protecting your organization’s emails begins by ensuring only the appropriate recipients can receive and read the email’s contents.
    • This process includes encrypting the email’s contents to protect sensitive information from being read by unauthorized recipients.
    • This protects the contents even if the email is intercepted by anyone besides the intended recipient.
    • Other benefits of email encryption include:
      • Reducing any risks associated with regulatory violations.
      • Enabling business to confidently communicate sensitive information via email.
      • Ensuring protective measures taken to prevent data loss and corporate policy violations.

    Along with the increased use of emails, organizations are seeing an increase in the number of attacks orchestrating from emails. This has resulted in 74% of organizations seeing an increase in email-based threats.

    Source: Mimecast, 2023.

    Info-Tech Insight
    Encrypting your email communication will provide an additional layer of protection which only allows authorized users to read the email.

    Implementing email encryption

    Leverage these protocols and tools to help encrypt your email.

    • The most common email encryption protocols and tools include:
      • Transport Layer Security (TLS): A cryptographic protocol designed to securely deliver data via the internet, which prevents third parties from intercepting and accessing the data.
      • Secure/Multipurpose Internet Mail Extension (S/MIME): A protocol for sending digitally signed and encrypted messages by leveraging public key encryption to provide at-rest and in-transit data protection.
      • Secure Email Gateway: An email security solution that inspects emails for malicious content prior to it reaching the corporate system. The solution is positioned between the public internet and corporate email servers. An email gateway solution would be provided by a third-party vendor and can be implemented on-premises, through the cloud, or hybrid.
    • Email encryption policies can also be implemented to ensure processes are in place when sending sensitive information through emails.
    • Email encryption ensures end-to-end privacy for your email and is especially important when the email requires strict content privacy.

    Email authentication

    Three authentication controls your organization should leverage to stay secure.

    • Along with content encryption, it’s important to authenticate both the sender and recipient of an email to ensure that only legitimate users are able to send and receive it.
    • Implementing email authentication techniques prevents unsolicited email (e.g. spam) from entering your mailbox.
    • This also prevents unauthorized users from sending email on your organization’s behalf.
    • Having these standards in place would safeguard your organization from spam, spoofing, and phishing attacks.
    • The three authentication controls include:
      • Sender Policy Framework (SPF): Email validation control that verifies that the incoming email is from an authorized list of IP addresses provided by the sender’s domain administrator.
      • DomainKeys Identified Mail (DKIM): Enables recipients to verify that an email from a specific domain was authorized by the domain’s owner. This is conducted through cryptographic authentication by adding a digital signature to the message headers of outbound emails.
      • Domain Message Authentication Reporting & Conformance (DMARC): Provides domain-level protection of email channel by publishing DMARC records in the organization’s domain name system (DNS) and creates policies which prompts actions to take if an email fails authentication.

    Although these authentication controls are available for organizations to leverage, the adoption rate remains low. 73% of survey respondents indicated they didn’t deploy email authentication controls within their organization.

    Source: Mimecast, 2023.

    Email authentication controls

    All three authentication controls should be implemented to effectively secure your organization’s email. They ensure the emails you send and receive are securely authorized and legitimate.

    SPF DKIM DMARC

    Creating an SPF record identifies which IP addresses are allowed to send emails from your domain. Steps to implement SPF include the following:

    1. Create an SPF record by identifying the IP addresses that are authorized to send emails.
    2. Publish your SPF record into your DNS by creating a TXT record on your domain.

    Implementing DKIM helps prevent attackers from sending emails that pretend to come from your domain. Steps to implement DKIM include the following:

    1. Identify and enable domains you wish to configure DKIM to create DKIM keys.
    2. Copy the canonical names (CNAMEs) that are provided.
    3. Publish the CNAME records to your DNS service provider.

    Setting up DMARC ensures emails are validated and defines actions to take if an email fails authentication. These include:

    • None: Message is delivered to recipient and a DMARC report is sent to domain owner.
    • Quarantine: Message moved to quarantine folder and recipient is notified.
    • Reject: Message is not delivered to the recipient.
    • Steps to implement DMARC include:
    1. Create a DMARC record by including your organization’s email domain and IP addresses.
    2. Form a DMARC TXT record for your domain to include policies and publish it to your DNS.

    For more information:

    Data classification

    Ensure sensitive data is securely processed, analyzed, and stored.

    • Besides authenticating the legitimacy of an email and its traffic to the recipient, it’s important to have procedures in place to protect the contents of an email.
    • Data classification is found not only in databases and spreadsheets, but also in the email messages being communicated. Examples of data most commonly included in emails:
      • Personal identifiable information (PII): social security number, financial account number, passcodes/passwords
    • Applying data classification to your email can help identify the sensitivity of the information it contains. This ensures any critical data within an email message is securely processed and protected against unauthorized use, theft, and loss.
    • Emails can be classified based on various sensitivity levels. such as:
      • Top secret, public, confidential, internal

    Discover and Classify Your Data

    Leverage this Info-Tech blueprint for guidelines on implementing a data classification program for your organization.

    Info-Tech Insight
    Having tools and technologies in place to ensure that data is classified and backed up will enable better storage, analysis, and processing of the email.

    Data loss prevention (DLP)

    Protect your data from being lost/stolen.

    • Protecting an email’s contents through data classification is only one approach for improving email security. Having a data loss prevention solution would further increase security by minimizing the threat of sensitive information leaving your organization’s email network.
    • Examples of tools embedded in DLP solutions that help monitor an organization's email communication:
      • Monitoring data sent and received from emails: This ensures the data within an email communication is protected with the necessary encryption based on its sensitivity.
      • Detecting suspicious email activity: This includes analyzing users’ email behavior regarding email attachments and identifying irregular behaviors.
      • Flagging or blocking email activities which may lead to data loss: This prevents highly sensitive data from being communicated via email and reduces the risk of information being intercepted.
    • The types of DLP technologies that can be leveraged include:
      • Rule-based: Data that has been tagged by admins as sensitive can be blocklisted, which would flag and/or block data from being sent via email.
      • Machine learning: Data on users’ email behavior is collected, processed, and trained to understand the employee’s normal email behavior and detect/flag suspicious activities.
    • Implementing DLP solutions would complement your data classification techniques by ensuring proper measures are in place to secure your organization’s assets through policies, technology, and tools.

    48% of employees have accidently attached the wrong file to an email.

    39% of respondents have accidently sent emails that contained security information such as passwords and passcodes.

    Source: Tessian, 2021.

    User awareness & training

    A strong security awareness & training program is an important element of strengthening your email security.

    • Having all these tools and techniques in place to improve your email security will not be effective unless you also improve your employees’ awareness.
    • Employees should participate in email security training, especially since the majority utilize this channel of communication for day-to-day operations.
    • User awareness and training should go beyond phishing campaigns and should highlight the various types of email-based threats, the characteristics of these threats, and what procedures they can follow to minimize these threats.
    • 95% of data breaches are caused by human error. It can take nine months to discover and contain them, and they are expected to cost $8 trillion this year (Mimecast, 2023).
    • Investments in employee awareness and training would mitigate these risks by ensuring employees recognize and report suspicious emails, remain mindful of what type of data to share via email, and improve their overall understanding of the importance of email security.

    Develop a Security Awareness and Training Program That Empowers End Users

    Leverage this Info-Tech blueprint for assistance on creating various user training materials and empower your employees to become a main line of defense for your organization.

    64% of organizations conduct formal training sessions (in-person or computer-based).

    74% of organizations only focus on providing phishing-based training.

    Source: Proofpoint, 2021.

    Examples of email-based threats

    Phishing
    Email sent by threat actors designed to manipulate end user into providing sensitive information by posing as a trustworthy source

    Business Email Compromise
    Attackers trick a user into sending money or providing confidential information

    Spam
    Users receive unsolicited email, usually in bulk, some of which contains malware

    Spear Phishing
    A type of phishing attack where the email is sent to specific and targeted emails within the organization

    Whaling
    A type of phishing attack similar to spear phishing, but targeting senior executives within the organization

    Password/Email Exposure
    Employees use organizational email accounts and passwords to sign up for social media, leaving them susceptible to email and/or password exposure in a social media breach

    Email policies

    Having policies in place will enable these controls to be implemented.

    Developing security policies that are reasonable, auditable, enforceable, and measurable ensures proper procedures are followed and necessary measures are implemented to protect the organization. Policies relating to email security can be categorized into two groups:

    • User policy: Policies employees must adhere to when using their corporate email. Examples:
      • User acceptance of technology: Acknowledgment of legitimate and restrictive actions when using corporate email
      • Security awareness and training: Acknowledging completion of email security training
    • Administrator-set policy: Policies that are implemented by IT and/or security admins. Examples:
      • Email backup: Policy on how long emails should be archived and processes for disposing of them
      • Log retention: Policy on how to retain, process, and analyze logs created from email servers
      • Throttling: Policies that limit the number of emails sent by a sender and the number of recipients per email and per day depending on the employee’s grouping

    Develop and Deploy Security Policies

    Leverage this Info-Tech blueprint for assistance on developing and deploying actionable policies and creating an overall policy management lifecycle to keep your policies current, effective, and compliant.

    Info-Tech Insight
    Policies ensure acceptable standards are in place to protect the organization’s assets, including the creation, attachment, sending, and receiving of emails.

    Email security technologies & tools (SoftwareReviews)

    SoftwareReviews, a division of Info-Tech Research Group, provides enterprise software reviews to help organizations make more efficient decisions during the software selection process. Reviews are provided by authenticated IT professionals who have leveraged the software and provide unbiased insights on different vendors and their products.

    Learn from the collective knowledge of real IT professionals.

    • Know the products and features available.
    • Explore modules and detailed feature-level data.
    • Quickly understand the market.

    Evaluate market leaders through vendor rankings and awards.

    • Convince stakeholders with professional reports.
    • Avoid pitfalls with unfiltered data from real users.
    • Choose software with confidence.

    Cut through misleading marketing material.

    • Negotiate contracts based on data.
    • Know what to expect before you sign.
    • Effectively manage the vendor.

    Email security technologies & tools

    Leverage these tools for an enhanced email security solution.

    Email Security Checklist

    Follow these guidelines to ensure you are implementing best practices for securing your organization’s emails.

    • The Email Security Checklist is a tool to assess the current and future state of your organization’s email security and provides a holistic understanding on monitoring your progress within each category and associated controls.
    • The status column allows you to select the feature’s current implementation status, which includes the following options:
      • Enabled: The feature is deployed within the organization’s network.
      • Implemented: The feature is implemented within the organization’s network, but not yet deployed.
      • Not implemented: The feature has not been enabled or implemented.
    • Comments can be added for each feature to provide details such as indicating the progress on enabling/implementing a feature and why certain features are not yet implemented.

    Email Security Checklist

    Download the Email Security Checklist tool

    Related Info-Tech Research

    Discover and Classify Your Data
    Leverage this Info-Tech blueprint for guidelines on implementing a data classification program for your organization.

    Develop a Security Awareness and Training Program That Empowers End Users
    Leverage this Info-Tech blueprint for assistance on creating various user training materials and empower your employees to become a main line of defense for your organization.

    Develop and Deploy Security Policies
    Leverage this Info-Tech blueprint for assistance on developing and deploying actionable policies and creating an overall policy management lifecycle to keep your policies current, effective, and compliant.

    Bibliography

    “10 Best Practices for Email Security in 2022.” TitanFile, 22 Sept. 2022. Web.

    “2021 State of the Phish.” Proofpoint, 2021. Web.

    Ahmad, Summra. “11 Email Security Best Practices You Shouldn't Miss (2023).” Mailmunch, 9 Mar. 2023. Web.

    “Blumira's State of Detection and Response.” Blumira, 18 Jan. 2023. Web.

    Clay, Jon. “Email Security Best Practices for Phishing Prevention.” Trend Micro, 17 Nov. 2022. Web.

    Crane, Casey. “6 Email Security Best Practices to Keep Your Business Safe in 2019.” Hashed Out by The SSL Store™, 7 Aug. 2019. Web.

    Hateb, Seif. “Basic Email Security Guide.” Twilio Blog, Twilio, 5 Dec. 2022. Web.

    “How DMARC Advances Email Security.” CIS, 9 July 2021. Web.

    Pal, Suryanarayan. “10 Email Security Best Practices You Should Know in 2023.” Mailmodo, 9 Feb. 2023. Web.

    Pitchkites, Max. “Email Security: A Guide to Keeping Your Inbox Safe in 2023.” Cloudwards, 9 Dec. 2022. Web.

    Rudra, Ahona. “Corporate Email Security Checklist.” PowerDMARC, 4 July 2022. Web.

    “Sender Policy Framework.” Mimecast, n.d. Web.

    Shea, Sharon, and Peter Loshin. “Top 15 Email Security Best Practices for 2023: TechTarget.” TechTarget, 14 Dec. 2022. Web.

    “The Email Security Checklist: Upguard.” UpGuard, 16 Feb. 2022. Web.

    “The State of Email Security 2023.” Mimecast, 2023. Web.

    Wetherald, Harry. “New Product - Stop Employees Emailing the Wrong Attachments.” Tessian, 16 Sept. 2021. Web.

    “What Is DMARC? - Record, Verification & More: Proofpoint Us.” Proofpoint, 9 Mar. 2023. Web.

    “What Is Email Security? - Defining Security of Email: Proofpoint Us.” Proofpoint, 3 Mar.2023. Web.

    Wilton, Laird. “How to Secure Email in Your Business with an Email Security Policy.” Carbide, 31 Jan. 2022. Web.

    Break Open Your DAM With Intuitive Metadata

    • Buy Link or Shortcode: {j2store}389|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Organizations are facing challenges from explosive information growth in both volume and complexity, as well as the need to use more new sources of information for social media just to remain in business.
    • A lot of content can be created quickly, but managing those digital assets properly through metadata tagging that will be used consistently and effectively requires processes to be in place to create standardized and informational metadata at the source of content creation.
    • Putting these processes in place changes the way the organization handles its information, which may generate pushback, and requires socialization and proper management of the metadata strategy.

    Our Advice

    Critical Insight

    • Metadata is an imperative part of the organizations broader information management strategy. Some may believe that metadata is not needed anymore; Google search is not a magic act – it relies on information tagging that reflects cultural sentiment.
    • Metadata should be pliable. It needs to grow with the changing cultural and corporate vernacular and knowledge, and adapt to changing needs.
    • Build a map for your metadata before you dig for buried treasure. Implement metadata standards and processes for current digital assets before chasing after your treasure troves of existing artifacts.

    Impact and Result

    • Create a sustainable and effective digital asset management (DAM) program by understanding Info-Tech’s DAM framework and how the framework fits within your organization for better management of key digital assets.
    • Create an enterprise-wide metadata design principles handbook to keep track of metadata schemas and standards, as well as communicate the standards to the entire organization.
    • Gather requirements for your DAM program, as well as the DAM system and roles, by interviewing key stakeholders and identifying prevalent pains and opportunities. Understand where digital assets are created, used, and stored throughout the enterprise to gain a high-level perspective of DAM requirements.
    • Identify the organization’s current state of metadata management along with the target state, identify the gaps, and then define solutions to fill those gaps. Ensure business initiatives are woven into the mix.
    • Create a comprehensive roadmap to prioritize initiatives and delineate responsibilities.

    Break Open Your DAM With Intuitive Metadata Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should develop a digital asset management program focused on metadata, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build a foundation for your DAM project

    Gain an in-depth understanding of what digital asset management is as well as how it is supported by Info-Tech’s DAM framework.

    • Break Open Your DAM With Intuitive Metadata – Phase 1: Build a Foundation for Your DAM Project
    • DAM Design Principles Handbook
    • Where in the World Is My Digital Asset? Tool
    • Digital Asset Inventory Tool
    • DAM Requirements Gathering Tool

    2. Dive into the DAM strategy

    Create a metadata program execution strategy and assess current and target states for the organization’s DAM.

    • Break Open Your DAM With Intuitive Metadata – Phase 2: Dive Into the DAM Strategy
    • DAM Roadmap Tool
    • DAM Metadata Execution Strategy Document

    3. Create intuitive metadata for your DAM

    Design a governance plan for ongoing DAM and metadata management.

    • Break Open Your DAM With Intuitive Metadata – Phase 3: Create Intuitive Metadata for Your Digital Assets
    • Metadata Manager Tool
    [infographic]

    Workshop: Break Open Your DAM With Intuitive Metadata

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Structure the Metadata Project

    The Purpose

    Develop a foundation of knowledge regarding DAM and metadata, as well as the best practices for organizing the organization’s information and digital assets for ideal findability.

    Key Benefits Achieved

    Design standardized processes for metadata creation and digital asset management to help to improve findability of key assets.

    Gain knowledge of how DAM can benefit both IT and the business.

    Activities

    1.1 Build a DAM and metadata knowledge foundation.

    1.2 Kick-start creation of the organization’s DAM design principles handbook.

    1.3 Interview key business units to understand drivers for the program.

    1.4 Develop a DAM framework.

    Outputs

    DAM Design Principles Handbook

    DAM Execution Strategy Document

    2 Assess Requirements for the DAM Program

    The Purpose

    Inventory the organization’s key digital assets and their repositories.

    Gather the organization’s requirements for a full-time digital asset librarian, as well as the DAM system.  

    Key Benefits Achieved

    Determine clear and specific requirements for the organization from the DAM system and the people involved.

    Activities

    2.1 Conduct a digital asset inventory to identify key assets to include in DAM.

    2.2 Prioritize digital assets to determine their risk and value to ensure appropriate support through the information lifecycle.

    2.3 Determine the requirements of the business and IT for the DAM system and its metadata.

    Outputs

    Digital Asset Inventory Tool

    DAM Requirements Gathering Tool

    3 Design Roadmap and Plan Implementation

    The Purpose

    Determine strategic initiatives and create a roadmap outlining key steps required to get the organization to start enabling data-driven insights.

    Determine timing of the initiatives. 

    Key Benefits Achieved

    Establish a clear direction for the DAM program.

    Build a step-by-step outline of how to create effective metadata with true business-IT collaboration.

    Have prioritized initiatives with dependencies mapped out.

    Activities

    3.1 Assess current and target states of DAM in the organization.

    3.2 Brainstorm and document practical initiatives to close the gap.

    3.3 Discuss strategies rooted in business requirements to execute the metadata management program to improve findability of digital assets.

    Outputs

    DAM Roadmap Tool

    4 Establish Metadata Governance

    The Purpose

    Identify the roles required for effective DAM and metadata management.

    Create sample metadata according to established guiding principles and implement a feedback method to create intuitive metadata in the organization. 

    Key Benefits Achieved

    Metadata management is an ongoing project. Implementing it requires user input and feedback, which governance will help to support.

    By integrating metadata governance with larger information or data governance bodies, DAM and metadata management will gain sustainability. 

    Activities

    4.1 Discuss and assign roles and responsibilities for initiatives identified in the roadmap.

    4.2 Review policy requirements for the information assets in the organization and strategies to address enforcement.

    4.3 Integrate the governance of metadata into larger governance committees.

    Outputs

    DAM Execution Strategy

    Data security consultancy

    Data security consultancy

    Based on experience
    Implementable advice
    human-based and people-oriented

    Data security consultancy makes up one of Tymans Group’s areas of expertise as a corporate consultancy firm. We are happy to offer our insights and solutions regarding data security and risk to businesses, both through online and offline channels. Read on and discover how our consultancy company can help you set up practical data security management solutions within your firm.

    How our data security consultancy services can help your company

    Data security management should be an important aspect of your business. As a data security consultancy firm, Tymans Group is happy to assist your small or medium-sized enterprise with setting up clear protocols to keep your data safe. As such, we can advise on various aspects comprising data security management. This ranges from choosing a fit-for-purpose data architecture to introducing IT incident management guidelines. Moreover, we can perform an external IT audit to discover which aspects of your company’s data security are vulnerable and which could be improved upon.

    Security and risk management

    Our security and risk services

    Security strategy

    Security Strategy

    Embed security thinking through aligning your security strategy to business goals and values

    Read more

    Disaster Recovery Planning

    Disaster Recovery Planning

    Create a disaster recovey plan that is right for your company

    Read more

    Risk Management

    Risk Management

    Build your right-sized IT Risk Management Program

    Read more

    Check out all our services

    Discover our practical data security management solutions

    Data security is just one aspect with which our consultancy firm can assist your company. Tymans Group offers its extensive expertise in various corporate management domains, such as quality management and risk management. Our solutions all stem from our vast expertise and have proven their effectiveness. Moreover, when you choose to employ our consultancy firm for your data security management, you benefit from a holistic, people-oriented approach.

    Set up an appointment with our experts

    Do you wish to learn more about our data security management solutions and services for your company? We are happy to analyze any issues you may be facing and offer you a practical solution if you contact us for an appointment. You can book a one-hour online talk or elect for an on-site appointment with our experts. Contact us to set up your appointment now.

    Register to read more …

    The Accessibility Business Case for IT

    • Buy Link or Shortcode: {j2store}519|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Lead
    • Parent Category Link: /lead
    • Laws requiring digital accessibility are changing and differ by location.
    • You need to make sure your digital assets, products, and services (internal and external) are accessible to everyone, but getting buy-in is difficult.
    • You may not know where your gaps in understanding are because conventional thinking is driven by compliance and risk mitigation.

    Our Advice

    Critical Insight

    • The longer you put off accessibility, the more tech debt you accumulate and the more you risk losing access to new and existing markets. The longer you wait to adopt standards and best practices, the more interest you’ll accumulate on accessibility barriers and costs for remediation.
    • Implementing accessibility feels counterintuitive to IT departments. IT always wants to optimize and move forward, but with accessibility you may stay at one level for what feels like an uncomfortably long period. Don’t worry; building consistency and shifting culture takes time.
    • Accessibility goes beyond compliance, which should be an outcome, not the objective. With 1 billion people worldwide with some form of disability, nearly everyone likely has a connection to disability, whether it be in themselves, family, or colleagues. The market of people with disabilities has a spending power of more than $6 trillion (WAI, 2018).

    Impact and Result

    • Take away the overwhelm that many feel when they hear “accessibility” and make the steps for your organization approachable.
    • Clearly communicate why accessibility is critical and how it supports the organization’s key objectives and initiatives.
    • Understand your current state related to accessibility and identify areas for key initiatives to become part of the IT strategic roadmap.

    The Accessibility Business Case for IT Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. The Accessibility Business Case for IT – Clearly communicate why accessibility is critical and how it supports the organization’s key objectives and initiatives.

    A step-by-step approach to walk you through understanding your current state related to accessibility maturity, identifying your desired future state, and building your business case to seek buy-in. This storyboard will help you figure out what’s right for your organization and build the accessibility business case for IT.

    • The Accessibility Business Case for IT – Phases 1-3

    2. Accessibility Business Case Template – A clear, concise, and compelling business case template to communicate the criticality of accessibility.

    The business case for accessibility is strong. Use this template to communicate to senior leaders the benefits, challenges, and risks of inaction.

    • Accessibility Business Case Template

    3. Accessibility Maturity Assessment – A structured tool to help you identify your current accessibility maturity level and identify opportunities to ensure progress.

    This tool uses a capability maturity model framework to evaluate your current state of accessibility. Maturity level is assessed on three interconnected aspects (people, process, and technology) across six dimensions proven to impact accessibility. Complete the assessment to get recommendations based on where you’re at.

    • Accessibility Maturity Assessment

    Infographic

    Further reading

    The Accessibility Business Case for IT

    Accessibility goes beyond compliance

    Analyst Perspective

    Avoid tech debt related to accessibility barriers

    Accessibility is important for individuals, businesses, and society. Diverse populations need diverse access, and it’s essential to provide access and opportunity to everyone, including people with diverse abilities. In fact, access to information and communications technologies (ICT) is a basic human right according to the United Nations.

    The benefits of ICT accessibility go beyond compliance. Many innovations that we use in everyday life, such as voice activation, began as accessibility initiatives and ended up creating a better lived experience for everyone. Accessibility can improve user experience and satisfaction, and it can enhance your brand, drive innovation, and extend your market reach (WAI, 2022).

    Although your organization might be required by law to ensure accessibility, understanding your users’ needs and incorporating them into your processes early will determine success beyond just compliance.

    Heather Leier-Murray, Senior Research Analyst, People and Leadership

    Heather Leier-Murray
    Senior Research Analyst, People and Leadership
    Info-Tech Research Group

    Executive Summary

    Your Challenge Common Obstacles Info-Tech’s Approach

    Global IT and business leaders are challenged to make digital products and services accessible because inaccessibility comes with increasing risk to brand reputation, legal ramifications, and constrained market reach.

    • Laws requiring digital accessibility are changing and differ by location.
    • You need to make sure your digital assets, products, and services (internal and external) are accessible to everyone.
    • The cost of inaction is rising.

    Understanding where to start, where accessibility lives, and if or when you’re done can be overwhelmingly difficult.

    • Executive leadership buy-in is difficult to get.
    • Conventional thinking is driven by compliance and risk mitigation.
    • You don’t know where your gaps in understanding are.

    Conventional approaches to accessibility often fail because users are expected to do the hard work. You have to be doing 80% of the hard work.1

    Use Info-Tech’s research and resources to do what’s right for your organization. This framework takes away the overwhelm that many feel when they hear “accessibility” and makes the steps for your organization approachable.

    • Clearly communicate why accessibility is critical and how it supports the organization’s key objectives and initiatives.
    • Understand your current state related to accessibility and identify areas for key initiatives to become part of the IT strategic roadmap.

    1. Harvard Business Review, 2021

    Info-Tech Insight
    The longer you put off accessibility, the more tech debt you accumulate and the more you risk losing access to new and existing markets. The longer you wait to adopt standards and best practices, the more interest you’ll accumulate on accessibility barriers and costs for remediation.

    Your challenge

    This research is designed to help organizations who are looking to:

    • Build a business case for accessibility.
    • Ensure that digital assets, products, and services are accessible to everyone, internally and externally.
    • Support staff and build skills to support the organization with accessibility and accommodation.
    • Get assistance figuring out where to start on the road to accessibility compliance and beyond.

    The cost of inaction related to accessibility is rising. Preparing for accessibility earlier helps prevent tech debt; the longer you wait to address your accessibility obligations, the more costly it gets.

    More than 3,500 digital accessibility lawsuits were filed in the US in 2020, up more than 50% from 2018.

    Source: UsableNet. Inc.

    Common obstacles

    These barriers make accessibility difficult to address for many organizations:

    • You don’t know where your gaps in understanding are. Recognizing the importance of accessibility and how it fits into the bigger picture is key to developing buy-in.
    • Too often organizations focus on mitigating risk by being compliance driven. Shifting focus to the user experience, internally and externally, will realize better results.
    • Conventional approaches to accessibility often fail because the expectation is for users to do the hard work. One in five people have a permanent disability, but it’s likely everyone will be faced with some sort of disability at some point in their lives.1 Your organization has to be doing at least 80% of the hard work.2
    • Other types of compliance reside clearly with one area of the organization. Accessibility, however, has many homes: IT, user experience (UX), customer experience (CX), and even HR.

    1. Smashing Magazine

    2. Harvard Business Review, 2021

    90% of companies claim to prioritize diversity.

    Source: Harvard Business Review, 2020

    Only 4% of those that claim to prioritize diversity consider disability in those initiatives.

    Source: Harvard Business Review, 2020

    The four principles of accessibility

    WCAG (Web Content Accessibility Guidelines) identifies four principles of accessibility. WCAG is the most referenced standard in website accessibility lawsuits.

    The four principles of accessibility

    Source: eSSENTIAL Accessibility, 2022

    Why organizations address accessibility

    Top three reasons:

    61% 62% 78%
    To comply with laws To provide the best UX To include people with disabilities

    Source: Level Access

    Still, most businesses aren’t meeting compliance standards. Even though legislation has been in place for over 30 years, a 2022 study by WebAIM of 1,000,000 homepages returned a 96.8% WCAG 2.0 failure rate.

    Source: Institute for Disability Research, Policy, and Practice

    How organizations prioritize digital accessibility

    43% rated it as a top priority.

    36% rated it as important.

    Fewer than 5% rated as either low priority or not even on the radar.

    More than 65% agreed or strongly agreed it’s a higher priority than last year.

    Source: Angel Business Communications

    Organizations expect consumers to do more online

    The pandemic led to many businesses going digital and more people doing things online.

    Chart of activities performed more often compared to before COVID-19

    Chart of activities performed for the first time during COVID-19

    Source: Statistics Canada

    Disability is part of being human

    Merriam-Webster defines disability as a “physical, mental, cognitive, or developmental condition that impairs, interferes with, or limits a person’s ability to engage in certain tasks or actions or participate in typical daily activities and interactions.”1

    The World Health Organization (WHO) points out that a crucial part of the definition of disability is that it’s not just a health problem, but the environment impacts the experience and extent of disability. Inaccessibility creates barriers for full participation in society.2

    The likelihood of you experiencing a disability at some point in your life is very high, whether a physical or mental disability, seen or unseen, temporary or permanent, severe or mild.2

    Many people acquire disabilities as they age yet may not identify as “a person with a disability.”3 Where life expectancies are over 70 years of age, 11.5% of life is spent living with a disability. 4

    “Extreme personalization is becoming the primary difference in business success, and everyone wants to be a stakeholder in a company that provides processes, products, and services to employees and customers with equitable, person-centered experiences and allows for full participation where no one is left out.”
    – Paudie Healy, CEO, Universal Access

    1. Merriam-Webster
    2. World Health Organization
    3. Digital Leaders, as cited in WAI, 2018
    4. Disabled World, as cited in WAI, 2018

    Untapped talent resource

    Common myths about people with disabilities:

    • They can’t work.
    • They need more time off or are absent more often.
    • Only basic, unskilled work is appropriate for them.
    • Their productivity is lower than that of coworkers.
    • They cost more to recruit, train, and employ.
    • They decrease others’ productivity.
    • They’re not eligible for governmental financial incentives (e.g. apprentices).
    • They don’t fit in.

    These assumptions prevent organizations from hiring valuable people into the workforce and retaining them.

    Source: Forbes

    50% to 70% of people with disabilities are unemployed in industrialized countries. In the US alone, 61 million adults have a disability.

    Source: United Nations, as cited in Forbes

    Thought Model

    Info-Tech’s methodology for the accessibility business case for IT

    1. Understand Current State 2. Plan for Buy-in 3. Prepare Your Business Case
    Phase Steps
    1. Understand standards and legislation
    2. Build awareness
    3. Understand current accessibility maturity level Define desired future state
    1. Define desired future state
    2. Define goals and objectives
    3. Document roles and responsibilities
    1. Customize and populate the Accessibility Business Case Template and gain approval
    2. Validate post-approval steps and establish timelines
    Phase Outcomes
    • Accessibility maturity assessment
    • Accessibility drivers determined
    • Goals defined
    • Objectives identified
    • Roles and responsibilities documented
    • Business case drafted
    • Approval to move forward with implementing your accessibility program
    • Next steps and timelines

    Insight Summary

    Insight 1 The longer you put off accessibility, the more tech debt you accumulate and the more you risk losing access to new and existing markets. The longer you wait to adopt standards and best practices, the more interest you’ll accumulate on accessibility barriers and costs for remediation.
    Insight 2 Implementing accessibility feels counterintuitive to IT departments. IT always wants to optimize and move forward, but with accessibility you may stay at one level for what feels like an uncomfortably long period. Don’t worry; building consistency and shifting culture takes time.
    Insight 3 Accessibility goes beyond compliance, which should be an outcome, not the objective. With 1 billion people worldwide with some form of disability, nearly everyone likely has a connection to disability, whether it be in themselves, family, or colleagues. The market of people with disabilities has a spending power of more than $6 trillion.1

    1. WAI, 2018

    Blueprint deliverables

    This blueprint is accompanied by supporting deliverables to help you accomplish your goals.

    Accessibility Business Case Template

    The business case for accessibility is strong. Use this template to communicate to senior leaders the benefits and challenges of accessibility and the risks of inaction.

    Accessibility Maturity Assessment

    Use this assessment to understand your current accessibility maturity.

    Blueprint benefits

    Business Benefits IT Benefits
    • Don’t lose out on a 6-trillion-dollar market.
    • Don’t miss opportunities to work with organizations because you’re not accessible.
    • Enable and empower current employees with disabilities.
    • Minimize potential for negative brand reputation due to a lack of consideration for people with disabilities.
    • Decrease the risk of legal action being brought upon the organization.
    • Understand accessibility and know your role in it for your organization and your team members.
    • Be prepared and able to provide the user experience you want.
    • Decrease tech debt – start early to ensure accessibility for everyone.
    • Access an untapped labor market.
    • Mitigate IT retention challenges.

    Measure the value of this blueprint

    Improve stakeholder satisfaction and engagement

    • Tracking measures to understand the value of this blueprint is a critical part of the process.
    • Monitor employee engagement, overall stakeholder satisfaction with IT, and the overall end-customer satisfaction.
    • Remember, accessibility is not a one-and-done project – just because measures are positive does not mean your work is done.

    In phase 2 of this blueprint, we will help you establish current-state and target-state metrics for your organization.

    Suggested Metrics
    Overall end-customer satisfaction
    Monies saved through cost optimization efforts
    Employee engagement
    Monies save through application rationalization and standardization

    For more metrics ideas, see the Info-Tech IT Metrics Library.

    Executive Brief Case Study

    INDUSTRY
    Technology

    SOURCE
    W3C Web Accessibility Initiative (WAI), 2018

    Google

    Investing in accessibility
    With an innovative edge, Google invests in accessibility with the objective of making life easier for everyone. Google has created a broad array of accessibility innovations in its products and services so that people with disabilities get as much out of them as anyone else.

    Part of Google’s core mission, accessibility means more to Google than implementing fixes. It is viewed positively by the organization and drives it to be more innovative to make information available to everyone. Google approaches accessibility problems not as barriers but as ways to innovate and discover breakthroughs that will become mainstream in the future.

    Results
    Among Google’s innovations are contrast minimums, auto-complete, voice-control, AI advances, and machine learning auto-captioning. All of these were created for accessibility purposes but have positively impacted the user experience in general for Google.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit Guided Implementation Workshop Consulting
    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks are used throughout all four options.

    Guided Implementation

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is 4 to 6 calls over the course of 2 to 4 months.

    What does a typical GI on this topic look like?

    Phase 1 Phase 2 Phase 3

    Call #1: Discuss motivation for the initiative and foundational knowledge requirements.

    Call #2: Discuss next steps to assess current accessibility maturity.

    Call #3: Discuss stakeholder engagement and future-state analysis.

    Call #4: Discuss defining goals and objectives, along with roles and responsibilities.

    Call #5: Review draft business case presentation.

    Call #6: Discuss post-approval steps and timelines.

    Phase 1

    Understand Your Current State

    Phase 1
    1.1 Understand standards and legislation
    1.2 Build awareness
    1.3 Understand maturity level

    Phase 2
    2.1 Define desired future state
    2.2 Define goals and objectives
    2.3 Document roles and responsibilities

    Phase 3
    3.1 Prepare business case template for presentation and approval
    3.2 Validate post-approval steps and establish timelines

    The Accessibility Business Case for IT

    This phase will walk you through the following activities:

    • Identifying and understanding accessibility and compliance requirements and the ramifications of noncompliance.
    • Defining accessibility, disability, and disability inclusion and building awareness of these with senior leaders.
    • Completing the Accessibility Maturity Assessment to help you understand your current state.

    Step 1.1

    Understand standards and legislation

    Activities

    1.1.1 Make a list of the legislation you need to comply with

    1.1.2 Seek legal and/or professional services’ input on compliance

    1.1.3 Detail the risks of inaction for your organization

    Understand Your Current State

    Outcomes of this step
    You will gain foundational understanding of the breadth of the regulation requirements for your organization. You will have reviewed and understand what is applicable to your organization.

    The regulatory landscape is evolving

    Canada

    • Canadian Human Rights Act
    • Policy on Communications and Federal Identity
    • Canadian Charter of Rights and Freedoms
    • Accessibility for Ontarians with Disabilities Act
    • Accessible Canada Act of 2019 (ACA)

    Europe

    • UK Equality Act 2010
    • EU Web and Mobile Accessibility Directive (2016)
    • EN 301 549 European Standard – Accessibility requirements for public procurement of ICT products and services

    United States

    • Section 508 of the US Rehabilitation Act of 1973
    • Americans with Disabilities Act of 1990 (ADA)
    • Section 255 of the Telecommunications Act of 1996
    • Air Carrier Access Act of 1986
    • 21st Century Communications and Video Accessibility Act of 2010 (CVAA)

    New Zealand

    • Human Rights Act 1993
    • Online Practice Guidelines for Government

    Australia

    • Disability Discrimination Act 1992 (DDA)

    Regulatory systems are moving toward an international standard.

    1.1.1 Make a list of the legislation you need to comply with

    1. Download the Accessibility Business Case Template.
    2. Conduct research and investigate what legislation and standards are applicable to your organization.
    3. a) Start by looking at your local legislation.
      b) Then consider any other regions you conduct business in.
      c) Also account for the various industries you are in.
    4. While researching, build a list of legislation requirements. Document these in your Accessibility Business Case Template as part of the Project Context section.
    Input Output
    • Research
    • Websites
    • Articles
    • List of legislation that applies to the organization related to accessibility
    Materials Participants
    • Accessibility Business Case Template
    • Project leader/initiator

    Download the Accessibility Business Case Template

    1.1.2 Seek professional advice on compliance

    1. Have general counsel review your list of regulations and standards related to accessibility or seek legal and/or professional support to review your list.
    2. Review or research further the implications of any suggestions from legal counsel.
    3. Make any updates to the Legal Landscape slide in the Accessibility Business Case Template.
    Input Output
    • Compiled list of applicable legislation and standards
    • Confirmed list of regulations that are applicable to your organization related to accessibility
    Materials Participants
    • Accessibility Business Case Template
    • Project leader/initiator
    • General counsel/professional services

    Download the Accessibility Business Case Template

    Ramifications of noncompliance

    Go beyond financial consequences

    Beyond the costs resulting from a claim, noncompliance can damage your organization in several ways.

    Financial Impact

    ADA Warning Shot: A complaint often indicates pending legal action to come. Addressing issues on a reactive, ad hoc basis can be quite expensive. It can cost almost $10,000 to address a single complaint, and chances are if you have one complaint, you have many.

    Lawsuit Costs: In the US, 265,000 demand letters were sent in 2020 under the ADA for inaccessible websites. On average, a demand letter could cost the company $25,000 (conservatively). These are low-end numbers; another estimate is that a small, quickly settled digital accessibility lawsuit could cost upwards of $350,000 for the defendant.

    Non-Financial Impact

    Reputational Impact: Claims brought upon a company can bring negative publicity with them. In contrast, having a clear commitment to accessibility demonstrates inclusion and can enhance brand image and reputation. Stakeholder expectations are changing, and consumers, investors, and employees alike want to support businesses with a purpose.

    Technology Resource Strains: Costly workarounds and ad hoc accommodation processes take away from efficiency and effectiveness. Updates and redesigns for accessibility and best practices will reduce costs associated with maintenance and service, including overall stakeholder satisfaction improvements.

    Access to Talent: 2022 saw a record high number of job openings, over 11.4 million in the US alone. Ongoing labor shortages require eliminating bias and keeping an open mind about who is qualified.

    Source: May Hopewell

    In the last four years, 83% of the retail 500 have been sued. Since 2018, 417 of the top 500 have received ADA-based digital lawsuits.

    Source: UsableNet

    1.1.3 Detail the risks of inaction for your organization

    1. Using the information that you’ve gathered through your research and legal/professional advice, detail the risks of inaction for your organization.
    2. a) Consider legal risks, consumer risks, brand risks, and employee risks. (Remember, risks aren’t just monetary.)
    3. Document the risks in your Accessibility Business Case Template.
    InputOutput
    • List of applicable legislation and standards
    • Information about risks
    • Identified accessibility maturity level
    MaterialsParticipants
    • Accessibility Business Case Template
    • Project leader/initiator

    Download the Accessibility Business Case Template

    Step 1.2

    Build awareness of accessibility and disability inclusion

    Activities

    1.2.1 Identify gaps in understanding

    1.2.2 Brainstorm how to reframe accessibility positively

    Understand Your Current State

    Outcomes of this step
    You’ll have a better understanding of accessibility so that you can effectively implement and promote it.

    Where to look for understanding

    First-hand experience of how people with disabilities interact with your organization is often eye-opening. It will help you understand the benefits and value of accessibility.

    Where to look for understanding

    • Talk with people you know with disabilities that are willing to share.*
    • Find role-specific training that’s appropriate.
    • Research. Articles and videos are easy to find.
    • Set up assistive technology trials.
    • Seek out first-hand experience from people with disabilities and how they work and use digital assets.

    Source: WAI, 2016

    * Remember, people with disabilities aren't obligated to discuss or explain their disabilities and may not be comfortable sharing. If you're asking for their time, be respectful, only ask if appropriate, and accept a "no" answer if the person doesn't wish to assist.

    1.2.1 Identify gaps in understanding

    Find out what accessibility is and why it is important. Learn the basics.

    1. Using the information that you’ve gathered through your research and legal counsel, conduct further research to understand the importance of accessibility.
    2. Answer these questions:
    3. a) What is accessibility? Why is it important?
      b) From the legislation and standards identified in step 1.1, what gaps exist?
      c) What is the definition of disability?
      d) How does your organization currently address accessibility?
      e) What are your risks?
      f) Do you have any current employees who have disabilities?
    4. Review the previous slide for suggestions on where to find more information to answer the above questions.
    5. Document any changes to the risks in your Accessibility Business Case Template.
    InputOutput
    • Articles
    • Interviews
    • Websites
    • Greater understanding of the lived experience of people with disabilities
    MaterialsParticipants
    • Articles
    • Websites
    • Accessibility Business Case Template
    • Project leader/initiator

    Download the Accessibility Business Case Template

    Reframe accessibility as a benefit, not a burden

    A clear understanding of accessibility and the related standards and regulations can turn accessibility from something big and scary to an achievable part of the business.

    The benefits of accessibility are:

    Market Reach Minimized Legal Risks Innovation Retention
    Over 1 billion people with a spending power of $6 trillion make up the global market of people with disabilities.1 Accessibility improves the experience for all users. In addition, many organizations require you to provide proof you meet accessibility standards during the RFP process. Accessibility regulations are changing, and claims are rising. Costs associated with legal proceedings can be more than just financial. Many countries have laws you need to follow. People with disabilities bring diversity of thought, have different lived experiences, and benefit inclusivity, which helps drive engagement. Plus accessibility features often solve unanticipated problems. Employing and supporting people with disabilities can reduce turnover and improve retention, reliability, company image, employee loyalty, ability awareness, and more.

    Source 1: WAI, 2018

    1.2.2 Brainstorm ways to reframe accessibility positively

    1. Using the information that you’ve gathered through your research, brainstorm additional positives of accessibility for your organization.
    2. Clearly identify the problem you want to solve (e.g., reframing accessibility positively in your organization).
    3. Collect any tools you want to use to during brainstorming (e.g., whiteboard, markers, sticky notes)
    4. Write down all the ideas that come to mind.
    5. Review all the points and group them into themes.
    6. Update the Accessibility Business Case Template with your findings.
    InputOutput
    • Research you have gathered
    • List of ways to positively reframe accessibility for your organization
    MaterialsParticipants
    • Sticky notes, whiteboard, pens, paper, markers.
    • Accessibility Business Case Template
    • Project leader/initiator

    Download the Accessibility Business Case Template

    Make it part of the conversation

    A first step to disability and accessibility awareness is to talk about it. When it is talked about as freely as other things are in the workplace, this can create a more welcoming workplace.

    Accessibility goes beyond physical access and includes technological access and support as well as our attitudes.

    Accessibility is making sure everyone (disabled or abled) can access the workplace equally.

    Adjustments in the workplace are necessary to create an accessible and welcoming environment. Understanding the three dimensions of accessibility in the workplace is a good place to start.

    Source: May Hopewell

    Three dimensions of accessibility in the workplace

    Three dimensions of accessibility in the workplace

    Case Study

    INDUSTRY
    Professional Services

    SOURCE
    Accenture

    Accenture takes an inclusive approach to increase accessibility.

    Accessibility is more than tools

    Employee experience was the focus of embarking on the accessibility journey, ensuring inclusivity was built in and every employee was able to use the tools they needed and could achieve their goals.

    "We are removing barriers in technology to make all of our employees, regardless of their ability, more productive.”
    — Melissa Summers, Managing Director – Global IT, Corporate Technology, Accenture

    Accessibility is inclusive

    The journey began with formalizing a Global IT Accessibility practice and defining an accessibility program charter. This provided direction and underpinned the strategy used to create a virtual Accessibility Center of Excellence and map out a multiyear plan of initiatives.

    The team then identified all the technologies they wanted to enhance by prioritizing ones that were high use and high impact. Involving disability champions gave insight into focus areas.

    Accessibility is innovation

    Working with partners like Microsoft and over 100 employees, Accenture continues toward the goal of 75% accessibility for all its global high-traffic internal platforms.

    Achievements thus far include:

    • 100% of new Accenture video and broadcast content is automatically captioned.
    • Accenture received a perfect Disability Equality Index (US) score of 100 out of 100 for 2017, 2018, and 2019.

    Step 1.3

    Understand your current accessibility maturity level

    Activities

    1.3.1 Complete the Accessibility Maturity Assessment

    Understand Your Current State

    Outcomes of this step
    Completed Accessibility Maturity Assessment to inform planning for and building your business case in Phases 2 and 3.

    Know where you are to know where to go

    Consider accessibility improvements from three interconnected aspects to determine current maturity level

    Accessibility Maturity

    People

    • Consider employee, customer, and user experience.

    Process

    • Review processes to ensure accessibility is considered early.

    Technology

    • Whether it’s new or existing, technology is an important tool to increase accessibility.

    Accessibility maturity levels

    INITIAL DEVELOPING DEFINED MANAGED OPTIMIZE
    At this level, accessibility processes are mostly undocumented, if they exist. Accessibility is most likely happening on a reactive, ad hoc basis. No one understands who is responsible for accessibility or what their role is. At this stage the organization is driven by the need for compliance. At the developing level, the organization is taking steps to increase accessibility but still has a lot of opportunity for improvements. The organization is defining and refining processes and is working toward building a library of assistive tools. At this level, processes related to accessibility are repeatable. However, there’s a tendency to resort to old habits under stress. The organization has tools in place to facilitate accommodation requests and technology is compatible with assistive technologies. Accessibility initiatives are driven by the desire to make the user experience better. The managed level is defined by its effective accessibility controls, processes, and metrics. The organization can mostly anticipate preferences of customers, employees, and users. The roles and responsibilities are defined, and disability is included as part of the organization’s diversity, equity, and inclusion (DEI) initiatives. This level is not the goal for all organizations. At this level there is a shift in the organization’s culture to a feeling of belonging. The organization also demonstrates ongoing process improvements. Everyone can experience a seamless interaction with the organization. The focus is on continuous improvement and using feedback to inform future initiatives.

    Determine your level of maturity

    Use Info-Tech’s Accessibility Maturity Assessment

    • On the accessibility questionnaire, tab 2, choose how much the statements apply to your organization. Answer the questions based on your knowledge of your current state organizationally.
    • Once you’ve answered all the questions, see the results on the tab 3, Accessibility Results. You can see your overall maturity level and the maturity level for each of six dimensions that are necessary to increase the success of an accessibility program.
    • Click through to tab 4, Recommendations, to see specific recommendations based on your results and proven research to progress through the maturity levels. Keep in mind that not all organizations will or should aspire to the “Optimize” maturity level.

    1.3.1 Complete the Accessibility Maturity Assessment

    1. Download the Accessibility Maturity Assessment and save it with the date so that as you work on your accessibility program, you can reassess later and track your progress.
    2. Once you have saved the assessment, select the appropriate answer for each statement on tab 2, Accessibility Questions, based on your knowledge of the organization’s approach.
    3. After reviewing all the accessibility statements, see your maturity level results on tab 3, Accessibility Results. Then see tab 4, Recommendations, for suggestions based on your answers.
    4. Document your accessibility maturity results in your Accessibility Business Case Template.
    Input Output
    • Assess your current state of accessibility by choosing all the statements that apply to your organization
    • Identified accessibility maturity level
    Materials Participants
    • Accessibility Maturity Assessment
    • Accessibility Business Case Template
    • Project leader/sponsor
    • IT leadership team

    Download the Accessibility Business Case Template

    Phase 2

    Plan for Senior Leader Buy-In

    Phase 1
    1.1 Understand standards and legislation
    1.2 Build awareness
    1.3 Understand maturity level

    Phase 2
    2.1 Define desired future state
    2.2 Define goals and objectives
    2.3 Document roles and responsibilities

    Phase 3
    3.1 Prepare business case template for presentation and approval
    3.2 Validate post-approval steps and establish timelines

    The Accessibility Business Case for IT

    This phase will walk you through the following activities:

    • Defining your desired future state.
    • Determining your accessibility program goals and objectives.
    • Clarifying and documenting roles and responsibilities related to accessibility in IT.

    This phase involves the following participants:

    • Project lead/sponsor
    • IT leadership team
    • Senior leaders/decision makers

    Step 2.1

    Define the desired future state of accessibility

    Activities

    2.1.1 Identify key stakeholders

    2.1.2 Hold a key stakeholder focus group

    2.1.3 Conduct a future-state analysis

    Outcomes of this step
    Following this step, you will have identified your aspirational maturity level and what your accessibility future state looks like for your organization.

    Plan for Senior Leader Buy-In

    Cheat sheet: Identify stakeholders

    Ask stakeholders, “Who else should I be talking to?” to discover additional stakeholders and ensure you don’t miss anyone.

    Identify stakeholders through the following questions:
    • Who in areas of influence will be adversely affected by potential environmental and social impacts of what you are doing?
    • At which stage will stakeholders be most affected (e.g. procurement, implementation, operations, decommissioning)?
    • Will other stakeholders emerge as the phases are started and completed?
    • Who is sponsoring the initiative?
    • Who benefits from the initiative?
    • Who is negatively impacted by the initiative?
    • Who can make approvals?
    • Who controls resources?
    • Who has specialist skills?
    • Who implements the changes?
    • Who are the owners, governors, customers, and suppliers of impacted capabilities or functions?
    Take a 360-degree view of potential internal and external stakeholders who might be impacted by the initiative.
    • Executives
    • Peers
    • Direct reports
    • Partners
    • Customers
    • Subcontractors
    • Subcontractors
    • Contractors
    • Lobby groups
    • Regulatory agencies

    Categorize your stakeholders with a stakeholder prioritization map

    A stakeholder prioritization map helps teams categorize their stakeholders by their level of influence and ownership.

    There are four areas in the map, and the stakeholders within each area should be treated differently.

    Players – Players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.

    Mediators – Mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.

    Noisemakers – Noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.

    Spectators – Generally, spectators are apathetic and have little influence over or interest in the initiative.

    Stakeholder prioritization map

    Define strategies for engaging stakeholders by type

    Each group of stakeholders draws attention and resources away from critical tasks.

    By properly identifying your stakeholder groups, you can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers while ensuring the needs of the Mediators and Players are met.

    Type Quadrant Actions
    Players High influence, high interest Actively Engage
    Keep them engaged through continuous involvement. Maintain their interest by demonstrating their value to its success.
    Mediators High influence, low interest Keep Satisfied
    They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust, and include them in important decision-making steps. In turn, they can help you influence other stakeholders.
    Noisemakers Low influence, high interest Keep Informed
    Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.
    Spectators Low influence, low interest Monitor
    They are followers. Keep them in the loop by providing clarity on objectives and status updates.

    2.1.1 Identify key stakeholders

    Collect this information by:

    1. List direct stakeholders for your area. Include stakeholders across the organization (both IT and business units) and externally.
    2. Create a stakeholder map to capture your stakeholders’ interest in and influence on digital accessibility.
    3. Shortlist stakeholders to invite as focus group participants in activity 2.1.2.
      • Aim for a combination of Players, Mediators, and Noisemakers.
    Input Output
    • List of stakeholders
    • Stakeholder requirements
    • A stakeholder map
    • List of stakeholders to include in the focus group in step 2.1.2
    Materials Participants
    • Sticky notes, pens, whiteboard, markers (optional)
    • Project leader/sponsor

    Hold a focus group to initiate planning

    Involve key stakeholders to determine the organizational drivers of accessibility, identify target maturity and key performance indicators (KPIs), and ultimately build the project charter.

    Building the project charter as a group will help you to clarify your key messages and secure buy-in from critical stakeholders up-front, which is key.

    Executing the business case for accessibility requires significant involvement from your IT leadership team. The challenge is that accessibility can be overwhelming because of inherent bias. Members of your IT leadership team will also need to participate in knowledge transfer, so get them involved up-front. The focus group will help stakeholders feel more engaged in the project, which is pivotal for success.

    You may feel like a full project charter isn’t necessary, and depending on your organizational size, it might not be. However, the exercise of building the charter is important regardless. No matter your current climate, some level of socializing the value of and plans for accessibility will be necessary.

    Meeting Agenda

    1. Short introduction
      Led by: Project Sponsor
      • Why the initiative is being considered.
    2. Make the case for the project
      Led by: Project Manager
      • Current state: What does the initiative address?
      • Future state: What is our target state of maturity?
    3. Success criteria
      Led by: Project Manager
      • How will success be measured?
    4. Define the project team
      Led by: Project Manager
      • Description of planned approach.
      • Stakeholder assessment.
      • What is required of the sponsor and stakeholders?
    5. Determine next steps
      Led by: Project Manager

    2.1.2 Hold a stakeholder focus group

    Identify the pain points you want to resolve and some of the benefits that you’d like to see from a program. By doing so, you’ll get a holistic view of what you need to achieve and what your drivers are.

    1. Ask the working group participants (as a whole or in smaller groups) to discuss pain points created by inaccessibility.
      • Challenges related to stakeholders.
      • Challenges created by process issues.
      • Difficulties improving accessibility practices.
    2. Discuss opportunities to be gained from improving these practices.
    3. Have participants write these down on sticky notes and place them on a whiteboard or flip chart.
    4. Review all the points as a group. Group challenges and benefits into themes.
    5. Have the group prioritize the risks and benefits in terms of what the solution must have, should have, could have, and won’t have.
    Input Output
    • Reasons for the project
    • Stakeholder requirements
    • Pain points and risks
    • A prioritized list of risks and benefits of the solution
    Materials Participants
    • Agenda (see previous slide)
    • Sticky notes, pens, whiteboard, markers (optional)
    • IT leadership
    • Other key stakeholders

    While defining future state, consider your drivers

    The Info-Tech Accessibility Maturity Framework identifies three key strategic drivers: compliance, experience, and incorporation.

    • Over 30% of organizations are focused on compliance, according to a 2022 survey by Harvard Business Review and Slack’s Future Forum. The survey asked more than 10,000 workers in six countries about their organizations’ approach to DEI.2

    Even though 90% of companies claim to prioritize diversity,1 over 30% are focused on compliance.2

    1. Harvard Business Review, 2020
    2. Harvard Business Review, 2022

    31.6% of companies remain in the Compliant stage, where they are focused on DEI compliance and not on integrating DEI throughout the organization or on creating continual improvement.

    Source: Harvard Business Review, 2022

    Align the benefits of program drivers to organizational goals or outcomes

    Although there will be various motivating factors, aligning the drivers of your accessibility program provides direction to the program. Connecting the advantages of program drivers to organizational goals builds the confidence of senior leaders and decision makers, increasing the continued commitment to invest in accessibility programming.

    Drivers Compliance Experience Incorporation
    Maturity level Initial Developing Defined Managed Optimized
    Description Any accessibility initiative is to comply with the minimum legislated requirement. Desire to avoid/decrease legal risk. Accessibility initiatives are focused on improving the experience of everyone from the start. Most organizations will be experience driven. Desire to increase accessibility and engagement. Accessibility is a seamless part of the whole organization and initiatives are focused on impacting social issues.
    Advantages Compliance is a good starting place for accessibility. It will reduce legal risk. Being people focused from the start of processes enables the organization to reduce tech debt, provide the best user experience, and realize other benefits of accessibility. There is a sense of belonging in the organization. The entire organization experiences the benefits of accessibility.
    Disadvantages Accessibility is about more than just compliance. Being compliance driven won’t give you the full benefits of accessibility. This can mean a culture change for the organization, which can take a long time. IT is used to moving quickly – it might feel counterintuitive to slow down and take time. It takes much longer to reach the associated level of maturity. Not possible for all organizations.

    Info-Tech Accessibility Maturity Framework

    Info-Tech Accessibility Maturity Framework

    After initially ensuring your organization is compliant with regulations and standards, you will progress to building disciplined process and consistent standardized processes. Eventually you will build the ability for predictable process, and lastly, you’ll optimize by continuously improving.

    Depending on the level of maturity you are trying to achieve, it could take months or even years to implement. The important thing to understand, however, is that accessibility work is never done.

    At all levels of the maturity framework, you must consider the interconnected aspects of people, process, and technology. However, as the organization progresses, the impact will shift from largely being focused on process and technology improvement to being focused on people.

    Info-Tech Insight
    IT typically works through maturity frameworks from the bottom to the top, progressing at each level until they reach the end. When it comes to digital accessibility initiatives, being especially thorough, thoughtful, and collaborative is critical to success. This will mean spending more time in the Developing, Defined, and Managed levels of maturity rather than trying to reach Optimized as quickly as you can. This may feel contrary to what IT historically considers as a successful implementation.

    Accessibility maturity levels

    Driver Description Benefits
    Initial Compliance
    • Accessibility processes are mostly undocumented.
    • Accessibility happens mostly on a reactive or ad hoc basis.
    • No one is aware of who is responsible for accessibility or what role they play.
    • Heavily focused on complying with regulations and standards to decrease legal risk.
    • The organization is aware of the need for accessibility.
    • Legal risk is decreased.
    Developing Experience
    • The organization is starting to take steps to increase accessibility beyond compliance.
    • Lots of opportunity for improvement.
    • Defining and refining processes.
    • Working toward building a library of assistive tools.
    • Awareness of the need for accessibility is growing.
    • Process review for accessibility increases process efficiency through avoiding rework.
    Defined Experience
    • Accessibility processes are repeatable.
    • There is a tendency to resort to old habits under stress.
    • Tools are in place to facilitate accommodation.
    • Employees know accommodations are available to them.
    • Accessibility is becoming part of daily work.
    Managed Experience
    • Defined by effective accessibility controls, processes, and metrics.
    • Mostly anticipating preferences.
    • Roles and responsibilities are defined.
    • Disability is included as part of DEI.
    • Employees understand their role in accessibility.
    • Engagement is positively impacted.
    • Attraction and retention are positively impacted.
    Optimized Incorporation
    • Not the goal for every organization.
    • Characterized by a dramatic shift in organizational culture and a feeling of belonging.
    • Ongoing continuous improvement.
    • Seamless interactions with the organization for everyone.
    • Using feedback to inform future initiatives.
    • More likely to be innovative and inclusive, reach more people positively, and meet emerging global legal requirements.
    • Better equipped for success.

    2.1.3 Conduct future-state analysis

    Identify your target state of maturity

    1. Provide the group with your maturity assessment results to review as well as the slides on the maturity levels, framework, and drivers.
    2. Compare the benefits listed on the Accessibility maturity levels slide to those that you named in the previous exercise and determine which maturity level best describes your target state.
    3. Discuss as a group and agree on one desired maturity level to reach.
    4. Review the other levels of maturity and determine what is in and out of scope for the project (higher-level benefits would be considered out of scope).
    5. Document your target state of maturity in your Accessibility Business Case Template.
    Input Output
    • Accessibility maturity levels chart on previous slide
    • Maturity level assessment results
    • Target maturity level documented
    Materials Participants
    • Paper and pens
    • Handouts of maturity levels
    • Accessibility Business Case Template
    • IT leadership team

    Download the Accessibility Business Case Template

    Case Study

    Accessibility as a differentiator

    INDUSTRY
    Financial

    SOURCE
    WAI-Engage

    Accessibility inside and out

    As a financial provider, Barclays embarked on the accessibility journey to engage customers and employees with the goal of equal access for all. One key statement that provided focus was “Essential for some, easier for all. ”

    “It's about helping everyone to work, bank and live their lives regardless of their age, situation, abilities or circumstances.”

    Embedding into experiences

    “The Barclays Accessibility team [supports] digital teams to embed accessibility into our services and culture through effective governance, partnering, training and tools. Establishing an enterprise-wide accessibility strategy, standards and programmes coupled with senior sponsorship helps support our publicly stated ambition of becoming the most accessible and inclusive FTSE company.”

    – Paul Smyth, Head of Digital Accessibility, Barclays

    It’s a circle, not a roadmap

    • Barclays continues the journey through partnerships with disability charities and accessibility experts and through regularly engaging with customers and colleagues with disabilities directly.
    • More accessible, inclusive products and services engage and attract more people with disabilities. This translates to a more diverse workforce that identifies opportunities for innovation. This leads to being attractive to diverse talent, and the circle continues.
    • Barclays’ mobile banking app was first to be accredited by accessibility consultants AbilityNet.

    Step 2.2

    Define your accessibility program goals and objectives

    Activities

    2.2.1 Create a list of goals and objectives

    2.2.2 Finalize key metrics

    Plan for Senior Leader Buy-In

    Outcomes of this step
    You will have clear measurable goals and objectives to respond to identified accessibility issues and organizational goals.

    What does a good goal look like?

    Use the SMART framework to build effective goals.

    S Specific: Is the goal clear, concrete, and well defined?
    M Measurable: How will you know when the goal is met?
    A Achievable: Is the goal possible to achieve in a reasonable time?
    R Relevant: Does this goal align with your responsibilities and with departmental and organizational goals?
    T Time-based: Have you specified a time frame in which you aim to achieve the goal?

    SMART is a common framework for setting effective goals. Make sure your goals satisfy these criteria to ensure you can achieve real results.

    2.2.1 Create a list of goals and objectives

    Use the outcomes from activity 2.1.2.

    1. Using the prioritized list of what your solution must have, should have, could have, and won’t have from activity 2.1.2, develop goals.
    2. Remember to use the SMART goal framework to build out each goal (see the previous slide for more information on SMART goals).
    3. Ensure each goal supports departmental and organizational goals to ensure it is meaningful.
    4. Document your goals and objectives in your Accessibility Business Case Template.
    InputOutput
    • Outcomes of activity 2.1.2
    • Organizational and departmental goals
    • Goals and objectives added to your Accessibility Business Case Template
    MaterialsParticipants
    • Accessibility Business Case Template
    • IT leadership team

    Download the Accessibility Business Case Template

    2.2.1 Create a list of goals and objectives

    Use the outcomes from activity 2.1.2.

    1. Using the prioritized list of what your solution must have, should have, could have, and won’t have from activity 2.1.2, develop goals.
    2. Remember to use the SMART goal framework to build out each goal (see the previous slide for more information on SMART goals).
    3. Ensure each goal supports departmental and organizational goals to ensure it is meaningful.
    4. Document your goals and objectives in your Accessibility Business Case Template.

    Establish Baseline Metrics

    Baseline metrics will be improved through:

    1. Progressing through the accessibility maturity model.
    2. Addressing accessibility earlier in processes to avoid tech debt and rework late in projects or releases.
    3. Making accessibility part of the procurement process as a scoring consideration and vendor choice.
    4. Ensuring compliance with regulations and standards.
    Metric Current Goal
    Overall end-customer satisfaction 90 120
    Monies saved through cost optimization efforts
    Employee engagement
    Monies save through application rationalization and standardization

    For more metrics ideas, see the Info-Tech IT Metrics Library.

    2.2.2 Finalize key metrics

    Finalize key metrics the organization will use to measure accessibility success

    1. Brainstorm how you would measure the success of each goal based on the benefits, challenges, and risks you previously identified.
    2. Write each of the metric ideas down and finalize three to five key metrics which you will track. The metrics you choose should relate to the key challenges or risks you have identified and match your desired maturity level and driver.
    3. Document your key metrics in the Accessibility Business Case Template.
    InputOutput
    • Accessibility challenges and benefits
    • Goals from activity 2.2.1
    • Three to five key metrics to track
    MaterialsParticipants
    • Accessibility Business Case Template
    • IT leadership team
    • Project lead/sponsor

    Download the Accessibility Business Case Template

    Step 2.3

    Document accessibility program roles and responsibilities

    Activities

    2.3.1 Populate a RACI chart

    Plan for Senior Leader Buy-In

    Outcomes of this step
    At the end of this step, you will have a completed RACI chart documenting the roles and responsibilities related to accessibility for your accessibility business case.

    2.3.1 Populate a RACI

    Populate a RACI chart to identify who should be responsible, accountable, consulted, and informed for each key activity.

    Define who is responsible, accountable, consulted, and informed for the project team:

    1. Write out the list of all stakeholders along the top of a whiteboard. Write out the key project steps along the left-hand side.
    2. For each initiative, identify each team member’s role. Are they:
      Responsible: The one responsible for getting the job done.
      Accountable: Only one person can be accountable for each task.
      Consulted: Are involved by providing knowledge.
      Informed: Receive information about execution and quality.
    3. As you proceed, continue to add tasks and assign responsibility to the RACI chart in the appendix of the Accessibility Business Case Template.
    InputOutput
    • Stakeholder list
    • Key project steps
    • Project RACI chart
    MaterialsParticipants
    • Whiteboard
    • Accessibility Business Case Template
    • IT leadership team

    Download the Accessibility Business Case Template

    Phase 3

    Prepare your business case and get approval

    Phase 1
    1.1 Understand standards and legislation
    1.2 Build awareness
    1.3 Understand maturity level

    Phase 2
    2.1 Define desired future state
    2.2 Define goals and objectives
    2.3 Document roles and responsibilities

    Phase 3
    3.1 Prepare business case template for presentation and approval
    3.2 Validate post-approval steps and establish timelines

    The Accessibility Business Case for IT

    This phase will walk you through the following activities:

    • Compiling the work and learning you’ve done so far into a business case presentation.

    This phase involves the following participants:

    • Project lead/sponsor
    • Senior leaders/approval authority

    There is a business case for accessibility

    • When planning for initiatives, a business case is a necessary tool. Although it can feel like an administrative exercise, it helps create a compelling argument to senior leaders about the benefits and necessity of building an accessibility program.
    • No matter the industry, you need to justify how the budget and effort you require for the initiative support organizational goals. However, senior leaders of different industries might be motivated by different reasons. For example, government is strongly motivated by legal and equity aspects, commercial companies may be attracted to the increase in innovation or market reach, and educational and nonprofit companies are likely motivated by brand enhancement.
    • The organizational focus and goals will guide your business case for accessibility. Highlight the most relevant benefits to your operational landscape and the risk of inaction.

    Source: WAI, 2018

    “Many organizations are waking up to the fact that embracing accessibility leads to multiple benefits – reducing legal risks, strengthening brand presence, improving customer experience and colleague productivity.”
    – Paul Smyth, Head of Digital Accessibility, Barclays
    Source: WAI, 2018

    Step 3.1

    Customize and populate the Accessibility Business Case Template

    Activities

    3.1.1 Prepare your business case template for presentation and approval

    Build Your Business Case

    Outcomes of this step
    Following this step, you will have a customized business case presentation that you can present to senior leaders.

    Use Info-Tech’s template to communicate with stakeholders

    Obtain approval for your accessibility program by customizing Info-Tech’s Accessibility Business Case Template, which is designed to effectively convey your key messages. Tailor the template to suit your needs.

    It includes:

    • Project context
    • Project scope and objectives
    • Knowledge transfer roadmap
    • Next steps

    Info-Tech Insight
    The support of senior leaders is critical to the success of your accessibility program development. Remind them of the benefits and impact and the risks associated with inaction.

    Download the Accessibility Business Case Template

    3.1.1 Prepare a presentation for senior leaders to gain approval

    Now that you understand your current and desired accessibility maturity, the next step is to get sign-off to begin planning your initiatives.

    Know your audience:

    1. Consider who will be included in your presentation audience.
    2. You want your presentation to be succinct and hard-hitting. Management’s time is tight, and they will lose interest if you drag out the delivery. Impact them hard and fast with the challenges, benefits, and risks of inaction.
    3. Contain the presentation to no more than an hour. Depending on your audience, the actual presentation delivery could be quite short. You want to ensure adequate time for questions and answers.
    4. Schedule a meeting with the key decision makers who will need to approve the initiatives (IT leadership team, executive team, the board, etc.) and present your business case.
    InputOutput
    • Activity results
    • Accessibility Maturity Assessment results
    • A completed presentation to communicate your accessibility business case
    MaterialsParticipants
    • Accessibility Business Case Template
    • IT leadership team
    • Project sponsor
    • Project stakeholders
    • Senior leaders

    Download the Accessibility Business Case Template

    Step 3.2

    Validate post-approval steps and establish timelines

    Activities

    3.2.1 Prepare for implementation: Complete the implementation prep to-do list and assign proposed timelines

    Build Your Business Case

    Outcomes of this step
    This step will help you gain leadership’s approval to move forward with building and implementing the accessibility program.

    Prepare to implement your program

    Complete the to-do list to ensure you are ready to move your accessibility program forward.

    To Do Proposed Timeline
    Reach out to your change management team for assistance.
    Discuss your plan with HR.
    Build a project team.
    Incorporate any necessary changes from senior leaders into your business case.
    [insert your own addition here]
    [insert your own addition here]
    [insert your own addition here]
    [insert your own addition here]

    3.2.1 Prep for implementation (action planning)

    Use the implementation prep to-do list to make sure you have gathered relevant information and completed critical steps to be ready for success.

    Use the list on the previous slide to make sure you are set up for implementation success and that you’re ready to move your accessibility program forward.

    1. Assign proposed timelines to each of the items.
    2. Work through the list, collecting or completing each item.
    3. As you proceed, keep your identified drivers, current state, desired future state, goals, and objectives in mind.
    Input Output
    • Accessibility Maturity Assessment
    • Business case presentation and any feedback from senior leaders
    • Goals, objectives, identified drivers, and desired future state
    • High-level action plan
    Materials Participants
    • Previous slide containing the checklist
    • Project lead

    Related Info-Tech Research

    Implement and Mature Your User Experience Design Practice

    • Create a practice that is focused on human outcomes; it starts and ends with the people you are designing for. This includes:
      • Establishing a practice with a common vision.
      • Enhancing the practice through four design factors.
      • Communicating a roadmap to improve your business through design.

    Modernize Your Corporate Website to Drive Business Value

    • Users are demanding more valuable web functionalities and improved access to your website services.
    • The criteria of user acceptance and satisfaction involves more than an aesthetically pleasing user interface (UI). It also includes how emotionally attached the user is to the website and how it accommodates user behaviors.

    IT Diversity & Inclusion Tactics

    • Although inclusion is key to the success of a diversity and inclusion (D&I) strategy, the complexity of the concept makes it a daunting pursuit.
    • This is further complicated by the fact that creating inclusion is not a one-and-done exercise. Rather, it requires the ongoing commitment of employees and managers to reassess their own behaviors and to drive a cultural shift.

    Fix Your IT Culture

    • Go beyond value statements to create a culture that enables the departmental strategy.
    • There is confusion about how to translate culture from an abstract concept to something that is measurable, actionable, and process driven.
    • Organizations lack clarity about who is accountable and responsible for culture, with groups often pointing fingers at each other.

    Works cited

    “2021 State of Digital Accessibility.” Level Access, n.d. Accessed 10 Aug. 2022

    ”2022 Midyear Report: ADA Digital Accessibility Lawsuits.” UsableNet, 2022. Accessed 9 Nov. 2022

    “Barclay’s Bank Case Study.” WAI-Engage, 12 Sept. 2018. Accessed 7 Nov. 2022.

    Bilodeau, Howard, et al. “StatCan COVID-19 Data to Insights for a Better Canada.” Statistics Canada, 24 June 2021. Accessed 10 Aug. 2022.

    Casey, Caroline. “Do Your D&I Efforts Include People With Disabilities?” Harvard Business Review, 19 March 2020. Accessed 28 July 2022.

    Digitalisation World. “Organisations failing to meet digital accessibility standards.” Angel Business Communications, 19 May 2022. Accessed Oct. 2022.

    “disability.” Merriam-Webster.com Dictionary, Merriam-Webster, https://www.merriam-webster.com/dictionary/disability. Accessed 10 Aug. 2022.

    “Disability.” World Health Organization, 2022. Accessed 10 Aug 2022.

    “Driving the Accessibility Advantage at Accenture.” Accenture, 2022. Accessed 7 Oct. 2022.

    eSSENTIAL Accessibility. The Must-Have WCAG 2.1 Checklist. 2022

    Hopewell, May. Accessibility in the Workplace. 2022.

    “Initiate.” W3C Web Accessibility Initiative (WAI), 31 March 2016. Accessed 18 Aug. 2022.

    Kalcevich, Kate, and Mike Gifford. “How to Bake Layers of Accessibility Testing Into Your Process.” Smashing Magazine, 26 April 2021. Accessed 31 Aug. 2022.

    Noone, Cat. “4 Common Ways Companies Alienate People with Disabilities.” Harvard Business Review, 29 Nov. 2021. Accessed Jul. 2022.

    Taylor, Jason. “A Record-Breaking Year for ADA Digital Accessibility Lawsuits.” UsableNet, 21 December 2020. Accessed Jul. 2022.

    “The Business Case for Digital Accessibility.” W3C Web Accessibility Initiative (WAI), 9 Nov. 2018. Accessed 4 Aug. 2022.

    “The WebAIM Million.” Web AIM, 31 March 2022. Accessed 28 Jul. 2022.

    Washington, Ella F. “The Five Stages of DEI Maturity.” Harvard Business Review, November - December 2022. Accessed 7 Nov. 2022.

    Wyman, Nicholas. “An Untapped Talent Resource: People With Disabilities.” Forbes, 25 Feb. 2021. Accessed 14 Sep. 2022.

    Business Intelligence and Reporting

    • Buy Link or Shortcode: {j2store}6|cart{/j2store}
    • Related Products: {j2store}6|crosssells{/j2store}
    • member rating overall impact: 8.9/10
    • member rating average dollars saved: $45,792
    • member rating average days saved: 29
    • Parent Category Name: Data and Business Intelligence
    • Parent Category Link: /improve-your-core-processes/data-and-business-intelligence

    The challenge

    • Your business partners need an environment that facilitates flexible data delivery.
    • Your data and BI strategy must continuously adapt to new business realities and data sources to stay relevant.
    • The pressure to go directly to the solution design is high.  

    Our advice

    Insight

    • A BI initiative is not static. It must be treated as a living platform to adhere to changing business goals and objectives. Only then will it support effective decision-making.
    • Hear the voice of the business; that is the "B" in BI.
    • Boys and their toys... The solution to better intelligence often lies not in the tool but the BI practices.
    • Build a roadmap that starts with quick-wins to establish base support for your initiative.

    Impact and results 

    • Use the business goals and objectives to drive your BI initiatives.
    • Focus first on what you already have in your company's business intelligence landscape before investing in a new tool that will only complicate things.
    • Understand the core of what your users need by leveraging different approaches to pinpointing BI capabilities.
    • Create a roadmap that details the iterative deliveries of your business intelligence initiative. Show both the short and long term.

    The roadmap

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    Get started

    Our concise executive brief shows why you should create or refresh your business intelligence (BI) strategy. We'll show you our methodology and the ways we can help you in handling this.

    Upon ordering you receive the complete guide with all files zipped.

    Understand your business context and BI landscape

    Understand critical business information and analyze your current business intelligence landscape.

    • Build a Next-Generation BI with a Game-Changing BI Strategy – Phase 1: Understand the Business Context and BI Landscape (ppt)
    • BI Strategy and Roadmap Template (doc)
    • BI End-User Satisfaction Survey Framework (ppt)

    Evaluate your current business intelligence practices

    Assess your current maturity level and define the future state.

    • Build a Next-Generation BI with a Game-Changing BI Strategy – Phase 2: Evaluate the Current BI Practice (ppt)
    • BI Practice Assessment Tool – Example 1 (xls)
    • BI Practice Assessment Tool – Example 2 (xls)

    Create your BI roadmap

    Create business intelligence focused initiatives for continuous improvement.

    • Build a Next-Generation BI with a Game-Changing BI Strategy – Phase 3: Create a BI Roadmap for Continuous Improvement (ppt)
    • BI Initiatives and Roadmap Tool (xls)
    • BI Strategy and Roadmap Executive Presentation Template (ppt)

     

    Become a Strategic CIO

    • Buy Link or Shortcode: {j2store}80|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $10,000 Average $ Saved
    • member rating average days saved: 15 Average Days Saved
    • Parent Category Name: IT Strategy
    • Parent Category Link: /it-strategy
    • As a CIO, you are currently operating in a stable and trusted IT environment, but you would like to advance your role to strategic business partner.
    • CIOs are often overlooked as a strategic partner by their peers, and therefore face the challenge of proving they deserve a seat at the table.

    Our Advice

    Critical Insight

    • To become a strategic business partner, you must think and act as a business person that works in IT, rather than an IT person that works for the business.
    • Career advancement is not a solo effort. Building relationships with your executive business stakeholders will be critical to becoming a respected business partner.

    Impact and Result

    • Create a personal development plan and stakeholder management strategy to accelerate your career and become a strategic business partner. For a CIO to be considered a strategic business partner, he or she must be able to:
      • Act as a business person that works in IT, rather than an IT person that works for the business. This involves meeting executive stakeholder expectations, facilitating innovation, and managing stakeholder relationships.
      • Align IT with the customer. This involves providing business stakeholders with information to support stronger decision making, keeping up with disruptive technologies, and constantly adapting to the ever-changing end-customer needs.
      • Manage talent and change. This involves performing strategic workforce planning, and being actively engaged in identifying opportunities to introduce change in your organization, suggesting ways to improve, and then acting on them.

    Become a Strategic CIO Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should become a strategic CIO, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Launch

    Analyze strategic CIO competencies and assess business stakeholder satisfaction with IT using Info-Tech's CIO Business Vision Diagnostic and CXO-CIO Alignment Program.

    • Become a Strategic CIO – Phase 1: Launch

    2. Assess

    Evaluate strategic CIO competencies and business stakeholder relationships.

    • Become a Strategic CIO – Phase 2: Assess
    • CIO Strategic Competency Evaluation Tool
    • CIO Stakeholder Power Map Template

    3. Plan

    Create a personal development plan and stakeholder management strategy.

    • Become a Strategic CIO – Phase 3: Plan
    • CIO Personal Development Plan
    • CIO Stakeholder Management Strategy Template

    4. Execute

    Develop a scorecard to track personal development initiatives.

    • Become a Strategic CIO – Phase 4: Execute
    • CIO Strategic Competency Scorecard
    [infographic]

    Workshop: Become a Strategic CIO

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess Competencies & Stakeholder Relationships

    The Purpose

    Gather and review information from business stakeholders.

    Assess strategic CIO competencies and business stakeholder relationships.

    Key Benefits Achieved

    Gathered information to create a personal development plan and stakeholder management strategy.

    Analyzed the information from diagnostics and determined the appropriate next steps.

    Identified and prioritized strategic CIO competency gaps.

    Evaluated the power, impact, and support of key business stakeholders.

    Activities

    1.1 Conduct CIO Business Vision diagnostic

    1.2 Conduct CXO-CIO Alignment program

    1.3 Assess CIO competencies

    1.4 Assess business stakeholder relationships

    Outputs

    CIO Business Vision results

    CXO-CIO Alignment Program results

    CIO competency gaps

    Executive Stakeholder Power Map

    2 Take Control of Your Personal Development

    The Purpose

    Create a personal development plan and stakeholder management strategy.

    Track your personal development and establish checkpoints to revise initiatives.

    Key Benefits Achieved

    Identified personal development and stakeholder engagement initiatives to bridge high priority competency gaps.

    Identified key performance indicators and benchmarks/targets to track competency development.

    Activities

    2.1 Create a personal development plan

    2.2 Create a stakeholder management strategy

    2.3 Establish key performance indicators and benchmarks/targets

    Outputs

    Personal Development Plan

    Stakeholder Management Strategy

    Strategic CIO Competency Scorecard

    Establish an Effective IT Steering Committee

    • Buy Link or Shortcode: {j2store}191|cart{/j2store}
    • member rating overall impact: 9.6/10 Overall Impact
    • member rating average dollars saved: $44,821 Average $ Saved
    • member rating average days saved: 11 Average Days Saved
    • Parent Category Name: IT Governance, Risk & Compliance
    • Parent Category Link: /it-governance-risk-and-compliance
    • Unfortunately, when CIOs implement IT steering committees, they often lack the appropriate structure and processes to be effective.
    • Due to the high profile of the IT steering committee membership, CIOs need to get this right – or their reputation is at risk.

    Our Advice

    Critical Insight

    • 88% of IT steering committees fail. The organizations that succeed have clearly defined responsibilities that are based on business needs.
    • Without a documented process your committee can’t execute on its responsibilities. Clearly define the flow of information to make your committee actionable.
    • Limit your headaches by holding your IT steering committee accountable for defining project prioritization criteria.

    Impact and Result

    Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee:

    • IT Steering Committee Charter: Use this template in combination with this blueprint to form a highly tailored committee.
    • IT Steering Committee Stakeholder Presentation: Build understanding around the goals and purpose of the IT steering committee, and generate support from your leadership team.
    • IT Steering Committee Project Prioritization Tool: Engage your IT steering committee participants in defining project prioritization criteria. Track project prioritization and assess your portfolio.

    Establish an Effective IT Steering Committee Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should establish an IT steering committee, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build the steering committee charter

    Build your IT steering committee charter using results from the stakeholder survey.

    • Establish an Effective IT Steering Committee – Phase 1: Build the Steering Committee Charter
    • IT Steering Committee Stakeholder Survey
    • IT Steering Committee Charter

    2. Define IT steering commitee processes

    Define your high level steering committee processes using SIPOC, and select your steering committee metrics.

    • Establish an Effective IT Steering Committee – Phase 2: Define ITSC Processes

    3. Build the stakeholder presentation

    Customize Info-Tech’s stakeholder presentation template to gain buy-in from your key IT steering committee stakeholders.

    • Establish an Effective IT Steering Committee – Phase 3: Build the Stakeholder Presentation
    • IT Steering Committee Stakeholder Presentation

    4. Define the prioritization criteria

    Build the new project intake and prioritization process for your new IT steering committee.

    • Establish an Effective IT Steering Committee – Phase 4: Define the Prioritization Criteria
    • IT Steering Committee Project Prioritization Tool
    • IT Project Intake Form
    [infographic]

    Workshop: Establish an Effective IT Steering Committee

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Build the IT Steering Committee

    The Purpose

    Lay the foundation for your IT steering committee (ITSC) by surveying your stakeholders and identifying the opportunities and threats to implementing your ITSC.

    Key Benefits Achieved

     An understanding of the business environment affecting your future ITSC and identification of strategies for engaging with stakeholders

    Activities

    1.1 Launch stakeholder survey for business leaders.

    1.2 Analyze results with an Info-Tech advisor.

    1.3 Identify opportunities and threats to successful IT steering committee implementation.

    1.4 Develop the fit-for-purpose approach.

    Outputs

    Report on business leader governance priorities and awareness

    Refined workshop agenda

    2 Define the ITSC Goals

    The Purpose

    Define the goals and roles of your IT steering committee.

    Plan the responsibilities of your future committee members.

    Key Benefits Achieved

     Groundwork for completing the steering committee charter

    Activities

    2.1 Review the role of the IT steering committee.

    2.2 Identify IT steering committee goals and objectives.

    2.3 Conduct a SWOT analysis on the five governance areas

    2.4 Define the key responsibilities of the ITSC.

    2.5 Define ITSC participation.

    Outputs

    IT steering committee key responsibilities and participants identified

    IT steering committee priorities identified

    3 Define the ITSC Charter

    The Purpose

    Document the information required to create an effective ITSC Charter.

    Create the procedures required for your IT steering committee.

    Key Benefits Achieved

    Clearly defined roles and responsibilities for your steering committee

    Completed IT Steering Committee Charter document

    Activities

    3.1 Build IT steering committee participant RACI.

    3.2 Define your responsibility cadence and agendas.

    3.3 Develop IT steering committee procedures.

    3.4 Define your IT steering committee purpose statement and goals.

    Outputs

    IT steering committee charter: procedures, agenda, and RACI

    Defined purpose statement and goals

    4 Define the ITSC Process

    The Purpose

    Define and test your IT steering committee processes.

    Get buy-in from your key stakeholders through your stakeholder presentation.

    Key Benefits Achieved

    Stakeholder understanding of the purpose and procedures of IT steering committee membership

    Activities

    4.1 Define your high-level IT steering committee processes.

    4.2 Conduct scenario testing on key processes, establish ITSC metrics.

    4.3 Build your ITSC stakeholder presentation.

    4.4 Manage potential objections.

    Outputs

    IT steering committee SIPOC maps

    Refined stakeholder presentation

    5 Define Project Prioritization Criteria

    The Purpose

    Key Benefits Achieved

    Activities

    5.1 Create prioritization criteria

    5.2 Customize the project prioritization tool

    5.3 Pilot test the tool

    5.4 Define action plan and next steps

    Outputs

    IT Steering Committee Project Prioritization Tool

    Action plan

    Further reading

    Establish an Effective IT Steering Committee

    Have the right people making the right decisions to drive IT success.

    Our understanding of the problem

    This Research Is Designed For:

    • CIOs
    • IT Leaders

    This Research Will Also Assist:

    • Business Partners

    This Research Will Help You:

    • Structure an IT steering committee with the appropriate membership and responsibilities
    • Define appropriate cadence around business involvement in IT decision making
    • Define your IT steering committee processes, metrics, and timelines
    • Obtain buy-in for IT steering committee participations
    • Define the project prioritization criteria

    This Research Will Help Them:

    • Understand the importance of IT governance and their role
    • Identify and build the investment prioritization criteria

    Executive Summary

    Situation

    • An effective IT steering committee (ITSC) is one of the top predictors of value generated by IT, yet only 11% of CIOs believe their committees are effective.
    • An effective steering committee ensures that the right people are involved in critical decision making to drive organizational value.

    Complication

    • Unfortunately, when CIOs do implement IT steering committees, they often lack the appropriate structure and processes to be effective.
    • Due to the high profile of the IT steering committee membership, CIOs need to get this right – or their reputation is at risk.

    Resolution

    Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee. These include:

    1. IT Steering Committee Charter: Customizable charter complete with example purpose, goals, responsibilities, procedures, RACI, and processes. Use this template in combination with this blueprint to get a highly tailored committee.
    2. IT Stakeholder Presentation: Use our customizable presentation guide to build understanding around the goals and purpose of the IT steering committee and generate support from your leadership team.
    3. IT Steering Committee Project Prioritization Tool: Engage your IT steering committee participants in defining the project prioritization criteria. Use our template to track project prioritization and assess your portfolio.

    Info-Tech Insight

    1. 88% of IT steering committees fail. The organizations that succeed have clearly defined responsibilities that are based on business needs.
    2. Without a documented process your committee can’t execute on its responsibilities. Clearly define the flow of information to make your committee actionable.
    3. Limit your headaches by holding your IT steering committee accountable for defining project prioritization criteria.

    IT Steering Committee

    Effective IT governance critical in driving business satisfaction with IT. Yet 88% of CIOs believe that their governance structure and processes are not effective. The IT steering committee (ITSC) is the heart of the governance body and brings together critical organizational stakeholders to enable effective decision making (Info-Tech Research Group Webinar Survey).

    IT STEERING COMMITTEES HAVE 3 PRIMARY OBJECTIVES – TO IMPROVE:

    1. Alignment: IT steering committees drive IT and business strategy alignment by having business partners jointly accountable for the prioritization and selection of projects and investments within the context of IT capacity.
    2. Accountability: The ITSC facilitates the involvement and commitment of executive management through clearly defined roles and accountabilities for IT decisions in five critical areas: investments, projects, risk, services, and data.
    3. Value Generation: The ITSC is responsible for the ongoing evaluation of IT value and performance of IT services. The committee should define these standards and approve remediation plans when there is non-achievement.

    "Everyone needs good IT, but no one wants to talk about it. Most CFOs would rather spend time with their in-laws than in an IT steering-committee meeting. But companies with good governance consistently outperform companies with bad. Which group do you want to be in?"

    – Martha Heller, President, Heller Search Associates

    An effective IT steering committee improves IT and business alignment and increases support for IT across the organization

    CEOs’ PERCEPTION OF IT AND BUSINESS ALIGNMENT

    67% of CIOs/CEOs are misaligned on the target role for IT.

    47% of CEOs believe that business goals are going unsupported by IT.

    64% of CEOs believe that improvement is required around IT’s understanding of business goals.

    28% of business leaders are supporters of their IT departments.

    A well devised IT steering committee ensures that core business partners are involved in critical decision making and that decisions are based on business goals – not who shouts the loudest. Leading to faster decision-making time, and better-quality decisions and outcomes.

    Source: Info-Tech CIO/CEO Alignment data

    Despite the benefits, 9 out of 10 steering committees are unsuccessful

    WHY DO IT STEERING COMMITTEES FAIL?

    1. A lack of appetite for an IT steering committee from business partners
    2. An effective ITSC requires participation from core members of the organization’s leadership team. The challenge is that most business partners don’t understand the benefits of an ITSC and the responsibilities aren’t tailored to participants’ needs or interests. It’s the CIOs responsibility to make this case to stakeholders and right-size the committee responsibilities and membership.
    3. IT steering committees are given inappropriate responsibilities
    4. The IT steering committee is fundamentally about decision making; it’s not a working committee. CIOs struggle with clarifying these responsibilities on two fronts: either the responsibilities are too vague and there is no clear way to execute on them within a meeting, or responsibilities are too tactical and require knowledge that participants do not have. Responsibilities should determine who is on the ITSC, not the other way around.
    5. Lack of process around execution
    6. An ITSC is only valuable if members are able to successfully execute on the responsibilities. Without well defined processes it becomes nearly impossible for the ITSC to be actionable. As a result, participants lack the information they need to make critical decisions, agendas are unmet, and meetings are seen as a waste of time.

    GOVERNANCE and ITSC and IT Management

    Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.

    The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.

    Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.

    These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.

    IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.

    RELATIONSHIP BETWEEN STRATEGIC, TACTICAL, AND OPERATIONAL GROUPS

    Strategic IT Steering Committee
    Tactical

    Project Governance Service Governance

    Risk Governance Information Governance

    IT Management
    Operational Risk Task Force

    This blueprint focuses exclusively on building the IT steering committee. For more information on IT governance see Info-Tech’s blueprint Tailor an IT Governance Plan to Fit Organizational Needs.

    1. Governance of the IT Portfolio & Investments: ensures that funding and resources are systematically allocated to the priority projects that deliver value
    2. Governance of Projects: ensures that IT projects deliver the expected value, and that the PM methodology is measured and effective.
    3. Governance of Risks: ensures the organization’s ability to assess and deliver IT projects and services with acceptable risk.
    4. Governance of Services: ensures that IT delivers the required services at the acceptable performance levels.
    5. Governance of Information and Data: ensures the appropriate classification and retention of data based on business need.

    If these symptoms resonate with you, it might be time to invest in building an IT steering committee

    SIGNS YOU MAY NEED TO BUILD AN IT STEERING COMMITTEE

    As CIO I find that there is a lack of alignment between business and IT strategies.
    I’ve noticed that projects are thrown over the fence by stakeholders and IT is expected to comply.
    I’ve noticed that IT projects are not meeting target project metrics.
    I’ve struggled with a lack of accountability for decision making, especially by the business.
    I’ve noticed that the business does not understand the full cost of initiatives and projects.
    I don’t have the authority to say “no” when business requests come our way.
    We lack a standardized approach for prioritizing projects.
    IT has a bad reputation within the organization, and I need a way to improve relationships.
    Business partners are unaware of how decisions are made around IT risks.
    Business partners don’t understand the full scope of IT responsibilities.
    There are no SLAs in place and no way to measure stakeholder satisfaction with IT.

    Info-Tech’s approach to implementing an IT steering committee

    Info-Tech’s IT steering committee development blueprint will provide you with the required tools, templates, and deliverables to implement a right-sized committee that’s effective the first time.

    • Measure your business partner level of awareness and interest in the five IT governance areas, and target specific responsibilities for your steering committee based on need.
    • Customize Info-Tech’s IT Steering Committee Charter Template to define and document the steering committee purpose, responsibilities, participation, and cadence.
    • Build critical steering committee processes to enable information to flow into and out of the committee to ensure that the committee is able to execute on responsibilities.
    • Customize Info-Tech’s IT Steering Committee Stakeholder Presentation template to make your first meeting a breeze, providing stakeholders with the information they need, with less than two hours of preparation time.
    • Leverage our workshop guide and prioritization tools to facilitate a meeting with IT steering committee members to define the prioritization criteria for projects and investments and roll out a streamlined process.

    Info-Tech’s Four-Phase Process

    Key Deliverables:
    1 2 3 4
    Build the Steering Committee Charter Define ITSC Processes Build the Stakeholder Presentation Define the Prioritization Criteria
    • IT Steering Committee Stakeholder Survey
    • IT Steering Committee Charter
      • Purpose
      • Responsibilities
      • RACI
      • Procedures
    • IT Steering Committee SIPOC (Suppliers, Inputs, Process, Outputs, Customers)
    • Defined process frequency
    • Defined governance metrics
    • IT Steering Committee Stakeholder Presentation template
      • Introduction
      • Survey outcomes
      • Responsibilities
      • Next steps
      • ITSC goals
    • IT project prioritization facilitation guide
    • IT Steering Committee Project Prioritization Tool
    • Project Intake Form

    Leverage both COBIT and Info-Tech-defined metrics to evaluate the success of your program or project

    COBIT METRICS Alignment
    • Percent of enterprise strategic goals and requirements supported by strategic goals.
    • Level of stakeholder satisfaction with scope of the planned portfolio of programs and services.
    Accountability
    • Percent of executive management roles with clearly defined accountabilities for IT decisions.
    • Rate of execution of executive IT-related decisions.
    Value Generation
    • Level of stakeholder satisfaction and perceived value.
    • Number of business disruptions due to IT service incidents.
    INFO-TECH METRICS Survey Metrics:
    • Percent of business leaders who believe they understand how decisions are made in the five governance areas.
    • Percentage of business leaders who believe decision making involved the right people.
    Value of Customizable Deliverables:
    • Estimated time to build IT steering committee charter independently X cost of employee
    • Estimated time to build and generate customer stakeholder survey and generate reports X cost of employee
    • # of project interruptions due to new or unplanned projects

    CASE STUDY

    Industry: Consumer Goods

    Source: Interview

    Situation

    A newly hired CIO at a large consumer goods company inherited an IT department with low maturity from her predecessor. Satisfaction with IT was very low across all business units, and IT faced a lot of capacity constraints. The business saw IT as a bottleneck or red tape in terms of getting their projects approved and completed.

    The previous CIO had established a steering committee for a short time, but it had a poorly established charter that did not involve all of the business units. Also the role and responsibilities of the steering committee were not clearly defined. This led the committee to be bogged down in politics.

    Due to the previous issues, the business was wary of being involved in a new steering committee. In order to establish a new steering committee, the new CIO needed to navigate the bad reputation of the previous CIO.

    Solution

    The CIO established a new steering committee engaging senior members of each business unit. The roles of the committee members were clearly established in the new steering committee charter and business stakeholders were informed of the changes through presentations.

    The importance of the committee was demonstrated through the new intake and prioritization process for projects. Business stakeholders were impressed with the new process and its transparency and IT was no longer seen as a bottleneck.

    Results

    • Satisfaction with IT increased by 12% after establishing the committee and IT was no longer seen as red tape for completing projects
    • IT received approval to hire two more staff members to increase capacity
    • IT was able to augment service levels, allowing them to reinvest in innovative projects
    • Project prioritization process was streamlined

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Establish an Effective IT Steering Committee

    Build the Steering Committee Charter Define ITSC Processes Build the Stakeholder Presentation Define the Prioritization Criteria
    Best-Practice Toolkit

    1.1 Survey Your Steering Committee Stakeholders

    1.2 Build Your ITSC Charter

    2.1 Build a SIPOC

    2.2 Define Your ITSC Process

    3.1 Customize the Stakeholder Presentation

    4.1 Establish your Prioritization Criteria

    4.2 Customize the Project Prioritization Tool

    4.3 Pilot Test Your New Prioritization Criteria

    Guided Implementations
    • Launch your stakeholder survey
    • Analyze the results of the survey
    • Build your new ITSC charter
    • Review your completed charter
    • Build and review your SIPOC
    • Review your high-level steering committee processes
    • Customize the presentation
    • Build a script for the presentation
    • Practice the presentation
    • Review and select prioritization criteria
    • Review the Project Prioritization Tool
    • Review the results of the tool pilot test
    Onsite Workshop

    Module 1:

    Build a New ITSC Charter

    Module 2:

    Design Steering Committee Processes

    Module 3:

    Present the New Steering Committee to Stakeholders

    Module 4:

    Establish Project Prioritization Criteria

    Phase 1 Results:
    • Customized ITSC charter

    Phase 2 Results:

    • Completed SIPOC and steering committee processes
    Phase 3 Results:
    • Customized presentation deck and script
    Phase 4 Results:
    • Customized project prioritization tool

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
    Activities

    Build the IT Steering Committee

    1.1 Launch stakeholder survey for business leaders

    1.2 Analyze results with an Info-Tech Advisor

    1.3 Identify opportunities and threats to successful IT steering committee implementation.

    1.4 Develop the fit-for-purpose approach

    Define the ITSC Goals

    2.1 Review the role of the IT steering committee

    2.2 Identify IT steering committee goals and objectives

    2.3 Conduct a SWOT analysis on the five governance areas

    2.4 Define the key responsibilities of the ITSC 2.5 Define ITSC participation

    Define the ITSC Charter

    3.1 Build IT steering committee participant RACI

    3.2 Define your responsibility cadence and agendas

    3.3 Develop IT steering committee procedures

    3.4 Define your IT steering committee purpose statement and goals

    Define the ITSC Process

    4.1 Define your high-level IT steering committee processes

    4.2 Conduct scenario testing on key processes, establish ITSC metrics

    4.3 Build your ITSC stakeholder presentation

    4.4 Manage potential objections

    Define Project Prioritization Criteria

    5.1 Create prioritization criteria

    5.2 Customize the Project Prioritization Tool

    5.3 Pilot test the tool

    5.4 Define action plan and next steps

    Deliverables
    1. Report on business leader governance priorities and awareness
    2. Refined workshop agenda
    1. IT steering committee priorities identified
    2. IT steering committee key responsibilities and participants identified
    1. IT steering committee charter: procedures, agenda, and RACI
    2. Defined purpose statement and goals
    1. IT steering committee SIPOC maps
    2. Refined stakeholder presentation
    1. Project Prioritization Tool
    2. Action plan

    Phase 1

    Build the IT Steering Committee Charter

    Phase 1 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Formalize the Security Policy Program

    Proposed Time to Completion: 1-2 weeks

    Select Your ITSC Members

    Start with an analyst kick-off call:

    • Launch your stakeholder survey

    Then complete these activities…

    • Tailor the survey questions
    • Identify participants and tailor email templates

    With these tools & templates:

    • ITSC Stakeholder Survey
    • ITSC Charter Template

    Review Stakeholder Survey Results

    Review findings with analyst:

    • Review the results of the Stakeholder Survey

    Then complete these activities…

    • Customize the ITSC Charter Template

    With these tools & templates:

    • ITSC Charter Template

    Finalize the ITSC Charter

    Finalize phase deliverable:

    • Review the finalized ITSC charter with an Info-Tech analyst

    Then complete these activities…

    • Finalize any changes to the ITSC Charter
    • Present it to ITSC Members

    With these tools & templates:

    • ITSC Charter Template

    Build the IT Steering Committee Charter

    This step will walk you through the following activities:

    • Launch and analyze the stakeholder survey
    • Define your ITSC goals and purpose statement
    • Determine ITSC responsibilities and participants
    • Determine ITSC procedures

    This step involves the following participants:

    • CIO
    • IT Steering Committee
    • IT Leadership Team
    • PMO

    Key Insight:

    Be exclusive with your IT steering committee membership. Determine committee participation based on committee responsibilities. Select only those who are key decision makers for the activities the committee is responsible for and, wherever possible, keep membership to 5-8 people.

    Tailor Info-Tech’s IT Steering Committee Charter Template to define terms of reference for the ITSC

    1.1

    A charter is the organizational mandate that outlines the purpose, scope, and authority of the ITSC. Without a charter, the steering committee’s value, scope, and success criteria are unclear to participants, resulting in unrealistic stakeholder expectations and poor organizational acceptance.

    Start by reviewing Info-Tech’s template. Throughout this section we will help you to tailor its contents.

    Committee Purpose: The rationale, benefits of, and overall function of the committee.

    Responsibilities: What tasks/decisions the accountable committee is making.

    Participation: Who is on the committee

    RACI: Who is accountable, responsible, consulted, and informed regarding each responsibility.

    Committee Procedures and Agendas: Includes how the committee will be organized and how the committee will interact and communicate with business units.

    A screenshot of Info-Tech's <em data-verified=IT Steering Committee Charter Template.">

    IT Steering Committee Charter

    Take a data-driven approach to build your IT steering committee based on business priorities

    1.2

    Leverage Info-Tech’s IT Steering Committee Stakeholder Surveyand reports to quickly identify business priorities and level of understanding of how decisions are made around the five governance areas.

    Use these insights to drive the IT steering committee responsibilities, participation, and communication strategy.

    The Stakeholder Survey consists of 17 questions on:

    • Priority governance areas
    • Desired level of involvement in decision making in the five governance areas
    • Knowledge of how decisions are made
    • Five open-ended questions on improvement opportunities

    To simplify your data collection and reporting, Info-Tech can launch a web-based survey, compile the report data and assist in the data interpretation through one of our guided implementations.

    Also included is a Word document with recommended questions, if you prefer to manage the survey logistics internally.

    A screenshot of Info-Tech's first page of the <em data-verified=IT Steering Committee Stakeholder Survey "> A screenshot of Info-Tech's survey.

    Leverage governance reports to define responsibilities and participants, and in your presentation to stakeholders

    1.3

    A screenshot is displayed. It advises that 72% of stakeholders do <strong data-verified= understand how decisions around IT services are made (quality, availability, etc.). Two graphs are included in the screenshot. One of the bar graphs shows the satisfaction with the quality of decisions and transparency around IT services. The other bar graph displays IT decisions around service delivery and quality that involve the right people.">

    OVERALL PRIORITIES

    You get:

    • A clear breakdown of stakeholders’ level of understanding on how IT decisions are made in the five governance areas
    • Stakeholder perceptions on the level of IT and business involvement in decision making
    • Identification of priority areas

    So you can:

    • Get an overall pulse check for understanding
    • Make the case for changes in decision-making accountability
    • Identify which areas the IT steering committee should focus on
    A screenshot is displayed. It advises that 80% of stakeholders do <strong data-verified=not understand how decisions around IT investments or project and service resourcing are made. Two bar graphs are displayed. One of the bar graphs shows the satisfaction with the quality of decisions made around IT investments. The other graph display IT decisions around spending priorities involving the right people.">

    GOVERNANCE AREA REPORTS

    You get:

    • Satisfaction score for decision quality in each governance area
    • Breakdown of decision-making accountability effectiveness
    • Identified level of understanding around decision making
    • Open-ended comments

    So you can:

    • Identify the highest priority areas to change.
    • To validate changes in decision-making accountability
    • To understand business perspectives on decision making.

    Conduct a SWOT analysis of the five governance areas

    1.4

    1. Hold a meeting with your IT leadership team to conduct a SWOT analysis on each of the five governance areas. Start by printing off the following five slides to provide participants with examples of the role of governance and the symptoms of poor governance in each area.
    2. In groups of 1-2 people, have each group complete a SWOT analysis for one of the governance areas. For each consider:
    • Strengths: What is currently working well in this area?
    • Weaknesses: What could you improve? What are some of the challenges you’re experiencing?
    • Opportunities: What are some organizational trends that you can leverage? Consider whether your strengths or weaknesses that could create opportunities?
    • Threats: What are some key obstacles across people, process, and technology?
  • Have each team or individual rotate until each person has contributed to each SWOT. Add comments from the stakeholder survey to the SWOT.
  • As a group rank each of the five areas in terms of importance for a phase one IT steering committee implementation, and highlight the top 10 challenges, and the top 10 opportunities you see for improvement.
  • Document the top 10 lists for use in the stakeholder presentation.
  • INPUT

    • Survey outcomes
    • Governance overview handouts

    OUTPUT

    • SWOT analysis
    • Ranked 5 areas
    • Top 10 challenges and opportunities identified.

    Materials

    • Governance handouts
    • Flip chart paper, pens

    Participants

    • IT leadership team

    Governance of RISK

    Governance of risk establishes the risk framework, establishes policies and standards, and monitors risks.

    Governance of risk ensures that IT is mitigating all relevant risks associated with IT investments, projects, and services.

    GOVERNANCE ROLES:

    1. Defines responsibility and accountability for IT risk identification and mitigation.
    2. Ensures the consideration of all elements of IT risk, including value, change, availability, security, project, and recovery
    3. Enables senior management to make better IT decisions based on the evaluation of the risks involved
    4. Facilitates the identification and analysis of IT risk and ensures the organization’s informed response to that risk.

    Symptoms of poor governance of risk

    • Opportunities for value creation are missed by not considering or assessing IT risk, or by completely avoiding all risk.
    • No formal risk management process or accountabilities exist.
    • There is no business continuity strategy.
    • Frequent security breaches occur.
    • System downtime occurs due to failed IT changes.

    Governance of PPM

    Governance of the IT portfolio achieves optimum ROI through prioritization, funding, and resourcing.

    PPM practices create value if they maximize the throughput of high-value IT projects at the lowest possible cost. They destroy value when they foster needlessly sophisticated and costly processes.

    GOVERNANCE ROLES:

    1. Ensures that the projects that deliver greater business value get a higher priority.
    2. Provides adequate funding for the priority projects and ensures adequate resourcing and funding balanced across the entire portfolio of projects.
    3. Makes the business and IT jointly accountable for setting project priorities.
    4. Evaluate, direct, and monitor IT value metrics and endorse the IT strategy and monitor progress.

    Symptoms of poor governance of PPM/investments

    • The IT investment mix is determined solely by Finance and IT.
    • It is difficult to get important projects approved.
    • Projects are started then halted, and resources are moved to other projects.
    • Senior management has no idea what projects are in the backlog.
    • Projects are approved without a valid business case.

    Governance of PROJECTS

    Governance of projects improves the quality and speed of decision making for project issues.

    Don’t confuse project governance and management. Governance makes the decisions regarding allocation of funding and resources and reviews the overall project portfolio metrics and process methodology.

    Management ensures the project deliverables are completed within the constraints of time, budget, scope, and quality.

    GOVERNANCE ROLES:

    1. Monitors and evaluates the project management process and critical project methodology metrics.
    2. Ensures review and mitigation of project issue and that management is aware of projects in crisis.
    3. Ensures that projects beginning to show characteristics of failure cannot proceed until issues are resolved.
    4. Endorses the project risk criteria, and monitors major risks to project completion.
    5. Approves the launch and execution of projects.

    Symptoms of poor governance of projects

    • Projects frequently fail or get cancelled.
    • Project risks and issues are not identified or addressed.
    • There is no formal project management process.
    • There is no senior stakeholder responsible for making project decisions.
    • There is no formal project reporting.

    Governance of SERVICES

    Governance of services ensures delivery of a highly reliable set of IT services.

    Effective governance of services enables the business to achieve the organization’s goals and strategies through the provision of reliable and cost-effective services.

    GOVERNANCE ROLES:

    1. Ensures the satisfactory performance of those services critical to achieving business objectives.
    2. Monitors and directs changes in service levels.
    3. Ensures operational and performance objectives for IT services are met.
    4. Approves policy and standards on the service portfolio.

    Symptoms of poor governance of service

    • There is a misalignment of business needs and expectations with IT capability.
    • No metrics are reported for IT services.
    • The business is unaware of the IT services available to them.
    • There is no accountability for service level performance.
    • There is no continuous improvement plan for IT services.
    • IT services or systems are frequently unavailable.
    • Business satisfaction with IT scores are low.

    Governance of INFORMATION

    Governance of information ensures the proper handling of data and information.

    Effective governance of information ensures the appropriate classification, retention, confidentiality, integrity, and availability of data in line with the needs of the business.

    GOVERNANCE ROLES:

    1. Ensures the information lifecycle owner and process are defined and endorse by business leadership.
    2. Ensures the controlled access to a comprehensive information management system.
    3. Ensures knowledge, information, and data are gathered, analyzed, stored, shared, used, and maintained.
    4. Ensures that external regulations are identified and met.

    Symptoms of poor governance of information

    • There is a lack of clarity around data ownership, and data quality standards.
    • There is insufficient understanding of what knowledge, information, and data are needed by the organization.
    • There is too much effort spent on knowledge capture as opposed to knowledge transfer and re-use.
    • There is too much focus on storing and sharing knowledge and information that is not up to date or relevant.
    • Personnel see information management as interfering with their work.

    Identify the responsibilities of the IT steering committee

    1.5

    1. With your IT leadership team, review the typical responsibilities of the IT steering committee on the following slide.
    2. Print off the following slide, and in your teams of 1-2 have each group identify which responsibilities they believe the IT steering committee should have, brainstorm any additional responsibilities, and document their reasoning.
    3. Note: The bolded responsibilities are the ones that are most common to IT steering committees, and greyed out responsibilities are typical of a larger governance structure. Depending on their level of importance to your organization, you may choose to include the responsibility.

    4. Have each team present to the larger group, track the similarities and differences between each of the groups, and come to consensus on the list of responsibilities.
    5. Complete a sanity check – review your swot analysis and survey results. Do the responsibilities you’ve identified resolve the critical challenges or weaknesses?
    6. As a group, consider the responsibilities and consider whether you can reasonably implement those in one year, or if there are any that will need to wait until year two of the IT steering committee.
    7. Modify the list of responsibilities in Info-Tech’s IT Steering Committee Charter by deleting the responsibilities you do not need and adding any that you identified in the process.

    INPUT

    • SWOT analysis
    • Survey reports

    OUTPUT

    • Defined ITSC responsibilities documented in the ITSC Charter

    Materials

    • Responsibilities handout
    • Voting dots

    Participants

    • IT leadership team

    Typical IT steering committee and governance responsibilities

    The bolded responsibilities are those that are most common to IT steering committees, and responsibilities listed in grey are typical of a larger governance structure.

    INVESTMENTS / PPM

    • Establish the target investment mix
    • Evaluate and select programs/projects to fund
    • Monitor IT value metrics
    • Endorse the IT budget
    • Monitor and report on program/project outcomes
    • Direct the governance optimization
    • Endorse the IT strategy

    PROJECTS

    • Monitor project management metrics
    • Approve launch of projects
    • Review major obstacles to project completion
    • Monitor a standard approach to project management
    • Monitor and direct project risk
    • Monitor requirements gathering process effectiveness
    • Review feasibility studies and formulate alternative solutions for high risk/high investment projects

    SERVICE

    • Monitor stakeholder satisfaction with services
    • Monitor service metrics
    • Approve plans for new or changed service requirements
    • Monitor and direct changes in service levels
    • Endorse the enterprise architecture
    • Approve policy and standards on the service portfolio
    • Monitor performance and capacity

    RISK

    • Monitor risk management metrics
    • Review the prioritized list of risks
    • Monitor changes in external regulations
    • Maintain risk profiles
    • Approve the risk management emergency action process
    • Maintain a mitigation plan to minimize risk impact and likelihood
    • Evaluate risk management
    • Direct risk management

    INFORMATION / DATA

    • Define information lifecycle process ownership
    • Monitor information lifecycle metrics
    • Define and monitor information risk
    • Approve classification categories of information
    • Approve information lifecycle process
    • Set policies on retirement of information

    Determine committee membership based on the committee’s responsibilities

    • One of the biggest benefits to an IT steering committee is it involves key leadership from the various lines of business across the organization.
    • However, in most cases, more people get involved than is required, and all the committee ends up accomplishing is a lot of theorizing. Participants should be selected based on the identified responsibilities of the IT steering committee.
    • If the responsibilities don’t match the participants, this will negatively impact committee effectiveness as leaders become disengaged in the process and don’t feel like it applies to them or accomplishes the desired goals. Once participants begin dissenting, it’s significantly more difficult to get results.
    • Be careful! When you have more than one individual in a specific role, select only the people whose attendance is absolutely critical. Don’t let your governance collapse under committee overload!

    LIKELY PARTICIPANT EXAMPLES:

    MUNICIPALITY

    • City Manager
    • CIO/IT Leader
    • CCO
    • CFO
    • Division Heads

    EDUCATION

    • Provost
    • Vice Provost
    • VP Academic
    • VP Research
    • VP Public Affairs
    • VP Operations
    • VP Development
    • Etc.

    HEALTHCARE

    • President/CEO
    • CAO
    • EVP/ EDOs
    • VPs
    • CIO
    • CMO

    PRIVATE ORGANIZATIONS

    • CEO
    • CFO
    • COO
    • VP Marketing
    • VP Sales
    • VP HR
    • VP Product Development
    • VP Engineering
    • Etc.

    Identify committee participants and responsibility cadence

    1.6

    1. In a meeting with your IT leadership team, review the list of committee responsibilities and document them on a whiteboard.
    2. For each responsibility, identify the individuals whom you would want to be either responsible or accountable for that decision.
    3. Repeat this until you’ve completed the exercise for each responsibility.
    4. Group the responsibilities with the same participants and highlight groupings with less than four participants. Consider the responsibility and determine whether you need to change the wording to make it more applicable or if you should remove the responsibility.
    5. Review the grouping, the responsibilities within them, and their participants, and assess how frequently you would like to meet about them – annually, quarterly, or monthly. (Note: suggested frequency can be found in the IT Steering Committee Charter.)
    6. Subdivide the responsibilities for the groupings to determine your annual, quarterly, and monthly meeting schedule.
    7. Validate that one steering committee is all that is needed, or divide the responsibilities into multiple committees.
    8. Document the committee participants in the IT Steering Committee Charter and remove any unneeded responsibilities identified in the previous exercise.

    INPUT

    • List of responsibilities

    OUTPUT

    • ITSC participants list
    • Meeting schedule

    Materials

    • Whiteboard
    • Markers

    Participants

    • IT leadership team

    Committees can only be effective if they have clear and documented authority

    It is not enough to participate in committee meetings; there needs to be a clear understanding of who is accountable, responsible, consulted, and informed about matters brought to the attention of the committee.

    Each committee responsibility should have one person who is accountable, and at least one person who is responsible. This is the best way to ensure that committee work gets done.

    An authority matrix is often used within organizations to indicate roles and responsibilities in relation to processes and activities. Using the RACI model as an example, there is only one person accountable for an activity, although several people may be responsible for executing parts of the activity. In this model, accountable means end-to-end accountability for the process.

    RESPONSIBLE: The one responsible for getting the job done.

    ACCOUNTABLE: Only one person can be accountable for each task.

    CONSULTED: Involvement through input of knowledge and information.

    INFORMED: Receiving information about process execution and quality.

    A chart is depicted to show an example of the authority matrix using the RACI model.

    Define IT steering committee participant RACI for each of the responsibilities

    1.7

    1. Use the table provided in the IT Steering Committee Charter and edit he list of responsibilities to reflect the chosen responsibilities of your ITSC.
    2. Along the top of the chart list the participant names, and in the right hand column of the table document the agreed upon timing from the previous exercise.
    3. For each of the responsibilities identify whether participants are Responsible, Accountable, Consulted, or Informed by denoting an R, A, C, I, or N/A in the table. Use N/A if this is a responsibility that the participant has no involvement in.
    4. Review your finalized RACI chart. If there are participants who are only consulted or informed about the majority of responsibilities, consider removing them from the IT steering committee. You only want the decision makers on the committee.

    INPUT

    • Responsibilities
    • Participants

    OUTPUT

    • RACI documented in the ITSC Charter

    Materials

    • ITSC RACI template
    • Projector

    Participants

    • IT leadership

    Building the agenda may seem trivial, but it is key for running effective meetings

    49% of people consider unfocused meetings as the biggest workplace time waster.*

    63% of the time meetings do not have prepared agendas.*

    80% Reduction of time spent in meetings by following a detailed agenda and starting on time.*

    *(Source: http://visual.ly/fail-plan-plan-fail).

    EFFECTIVE MEETING AGENDAS:

    1. Have clearly defined meeting objectives.
    2. Effectively time-boxed based on priority items.
    3. Defined at least two weeks prior to the meetings.
    4. Evaluated regularly – are not static.
    5. Leave time at the end for new business, thus minimizing interruptions.

    BUILDING A CONSENT AGENDA

    A consent agenda is a tool to free up time at meetings by combining previously discussed or simple items into a single item. Items that can be added to the consent agenda are those that are routine, noncontroversial, or provided for information’s sake only. It is expected that participants read this information and, if it is not pulled out, that they are in agreement with the details.

    Members have the option to pull items out of the consent agenda for discussion if they have questions. Otherwise these are given no time on the agenda.

    Define the IT steering committee meeting agendas and procedures

    1.8

    Agendas

    1. Review the listed responsibilities, participants, and timing as identified in a previous exercise.
    2. Annual meeting: Identify if all of the responsibilities will be included in the annual meeting agenda (likely all governance responsibilities).
    3. Quarterly Meeting Agenda: Remove the meeting responsibilities from the annual meeting agenda that are not required and create a list of responsibilities for the quarterly meetings.
    4. Monthly Meeting Agenda: Remove all responsibilities from the list that are only annual or quarterly and compile a list of monthly meeting responsibilities.
    5. Review each responsibility, and estimate the amount of time each task will take within the meeting. We recommend giving yourself at least an extra 10-20% more time for each agenda item for your first meeting. It’s better to have more time than to run out.
    6. Complete the Agenda Template in the IT Steering Committee Charter.

    Procedures:

    1. Review the list of IT steering committee procedures, and replace the grey text with the information appropriate for your organization.

    INPUT

    • Responsibility cadence

    OUTPUT

    • ITSC annual, quarterly, monthly meeting agendas & procedures

    Materials

    • ITSC Charter

    Participants

    • IT leadership team

    Draft your IT steering committee purpose statement and goals

    1.9

    1. In a meeting with your IT leadership team – and considering the defined responsibilities, participants, and opportunities and threats identified – review the example goal statement in the IT Steering Committee Charter, and first identify whether any of these statements apply to your organization. Select the statements that apply and collaboratively make any changes needed.
    2. Define unique goal statements by considering the following questions:
      1. What three things would you realistically list for the ITSC to achieve.
      2. If you were to accomplish three things in the next year, what would those be?
    3. Document those goals in the IT Steering Committee Charter.
    4. With those goal statements in mind, consider the overall purpose of the committee. The purpose statement should be a reflection of what the committee does, why it does it, and the goals.
    5. Have each individual review the example purpose statement, and draft what they think a good purpose statement would be.
    6. Present each statement, and work together to determine a best of breed statement.
    7. Document this in the IT Steering Committee Charter.

    INPUT

    • Responsibilities, participants, top 10 lists of challenges and opportunities.

    OUTPUT

    • ITSC goals and purpose statement

    Materials

    • ITSC Charter

    Participants

    • IT leadership team

    CASE STUDY

    "Clearly defined Committee Charter allows CIO to escape the bad reputation of previous committee."

    Industry: Consumer Goods

    Source: Interview

    CHALLENGE

    The new CIO at a large consumer goods company had difficulty generating interest in creating a new IT steering committee. The previous CIO had created a steering committee that was poorly organized and did not involve all of the pertinent members. This led to a committee focused on politics that would often devolve into gossip. Also, many members were dissatisfied with the irregular meetings that would often go over their allotted time.

    In order to create a new committee, the new CIO needed to dispel the misgivings of the business leadership.

    SOLUTION

    The new CIO decided to build the new steering committee from the ground up in a systematic way.

    She collected information from relevant stakeholders about what they know/how they feel about IT and used this information to build a detailed charter.

    Using this info she outlined the new steering committee charter and included in it the:

    1. Purpose
    2. Responsibilities
    3. RACI Chart
    4. Procedures

    OUTCOME

    The new steering committee included all the key members of business units, and each member was clear on their roles in the meetings. Meetings were streamlined and effective. The adjustments in the charter and the improvement in meeting quality played a role in improving the satisfaction scores of business leaders with IT by 21%.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    1.1

    A screenshot of activity 1.1 is displayed. 1.1 is about surveying your ITSC stakeholders.

    Survey your ITSC stakeholders

    Prior to the workshop, Info-Tech’s advisors will work with you to launch the IT Steering Committee Stakeholder Survey to understand business priorities and level of understanding of how decisions are made. Using this data, we will create the IT steering committee responsibilities, participation, and communication strategy.

    1.7

    A screenshot of activity 1.7 is displayed. 1.7 is about defining a participant RACI for each of the responsibilities.

    Define a participant RACI for each of the responsibilities

    The analyst will facilitate several exercises to help you and your stakeholders create an authority matrix. The output will be defined responsibilities and authorities for members.

    Phase 2

    Build the IT Steering Committee Process

    Phase 2 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Define your ITSC Processes
    Proposed Time to Completion: 2 weeks

    Review SIPOCs and Process Creation

    Start with an analyst kick-off call:

    • Review the purpose of the SIPOC and how to build one

    Then complete these activities…

    • Build a draft SIPOC for your organization

    With these tools & templates:

    Phase 2 of the Establish an Effective IT Steering Committee blueprint

    Finalize the SIPOC

    Review Draft SIPOC:

    • Review and make changes to the SIPOC
    • Discuss potential metrics

    Then complete these activities…

    • Test survey link
    • Info-Tech launches survey

    With these tools & templates:

    Phase 2 of the Establish an Effective IT Steering Committee blueprint

    Finalize Metrics

    Finalize phase deliverable:

    • Finalize metrics

    Then complete these activities…

    • Establish ITSC metric triggers

    With these tools & templates:

    Phase 2 of the Establish an Effective IT Steering Committee blueprint

    Build the IT Steering Committee Process

    This step will walk you through the following activities:

    • Define high-level steering committee processes using SIPOC
    • Select steering committee metrics

    This step involves the following participants:

    • CIO
    • IT Steering Committee
    • IT Leadership Team
    • PMO

    Key Insight:

    Building high-level IT steering committee processes brings your committee to life. Having a clear process will ensure that you have the right information from the right sources so that committees can operate and deliver the appropriate output to the customers who need it.

    Build your high-level IT steering committee processes to enable committee functionality

    The IT steering committee is only valuable if members are able to successfully execute on responsibilities.

    One of the most common mistakes organizations make is that they build their committee charters and launch into their first meeting. Without defined inputs and outputs, a committee does not have the needed information to be able to effectively execute on responsibilities and is unable to meet its stated goals.

    The arrows in this picture represent the flow of information between the IT steering committee, other committees, and IT management.

    Building high-level processes will define how that information flows within and between committees and will enable more rapid decision making. Participants will have the information they need to be confident in their decisions.

    Strategic IT Steering Committee
    Tactical

    Project Governance Service Governance

    Risk Governance Information Governance

    IT Management
    Operational Risk Task Force

    Define the high-level process for each of the IT steering committee responsibilities

    Info-Tech recommends using SIPOC as a way of defining how the IT steering committee will operate.

    Derived from the core methodologies of Six Sigma process management, SIPOC – a model of Suppliers, Inputs, Processes, Outputs, Customers – is one of several tools that organizations can use to build high level processes. SIPOC is especially effective when determining process scope and boundaries and to gain consensus on a process.

    By doing so you’ll ensure that:

    1. Information and documentation required to complete each responsibility is identified.
    2. That the results of committee meetings are distributed to those customers who need the information.
    3. Inputs and outputs are identified and that there is defined accountability for providing these.

    Remember: Your IT steering committee is not a working committee. Enable effective decision making by ensuring participants have the necessary information and appropriate recommendations from key stakeholders to make decisions.

    Supplier Input
    Who provides the inputs to the governance responsibility. The documented information, data, or policy required to effectively respond to the responsibility.
    Process
    In this case this represents the IT steering committee responsibility defined in terms of the activity the ITSC is performing.
    Output Customer
    The outcome of the meeting: can be approval, rejection, recommendation, request for additional information, endorsement, etc. Receiver of the outputs from the committee responsibility.

    Define your SIPOC model for each of the IT steering committee responsibilities

    2.1

    1. In a meeting with your IT leadership, draw the SIPOC model on a whiteboard or flip-chart paper. Either review the examples on the following slides or start from scratch.
    2. If you are adjusting the following slides, consider the templates you already have which would be appropriate inputs and make adjustments as needed.

    For atypical responsibilities:

    1. Start with the governance responsibility and identify what specifically it is that the IT steering committee is doing with regards to that responsibility. Write that in the center of the model.
    2. As a group, consider what information or documentation would be required by the participants to effectively execute on the responsibility.
    3. Identify which individual will supply each piece of documentation. This person will be accountable for this moving forward.
    4. Outputs: Once the committee has met about the responsibility, what information or documentation will be produced. List all of those documents.
    5. Identify the individuals who need to receive the outputs of the information.
    6. Repeat this for all of the responsibilities.
    7. Once complete, document the SIPOC models in the IT Steering Committee Charter.

    INPUT

    • List of responsibilities
    • Example SIPOCs

    OUTPUT

    • SIPOC model for all responsibilities.

    Materials

    • Whiteboard
    • Markers
    • ITSC Charter

    Participants

    • IT leadership team

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Establish the target investment mix
    Supplier Input
    CIO
    • Target investment mix and rationale
    Process
    Responsibility: The IT steering committee shall review and approve the target investment mix.
    Output Customer
    • Approval of target investment mix
    • Rejection of target investment mix
    • Request for additional information
    • CFO
    • CIO
    • IT leadership
    SIPOC: Endorse the IT budget
    Supplier Input
    CIO
    • Recommendations

    See Info-Tech’s blueprint IT Budget Presentation

    Process

    Responsibility: Review the proposed IT budget as defined by the CIO and CFO.

    Output Customer
    • Signed endorsement of the IT budget
    • Request for additional information
    • Recommendation for changes to the IT budget.
    • CFO
    • CIO
    • IT leadership

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Monitor IT value metrics
    Supplier Input
    CIO
    • IT value dashboard
    • Key metric takeaways
    • Recommendations
    CIO Business Vision
    Process

    Responsibility: Review recommendations and either accept or reject recommendations. Refine go-forward metrics.

    Output Customer
    • Launch corrective task force
    • Accept recommendations
    • Define target metrics
    • CEO
    • CFO
    • Business executives
    • CIO
    • IT leadership
    SIPOC: Evaluate and select programs/projects to fund
    Supplier Input
    PMO
    • Recommended project list
    • Project intake documents
    • Prioritization criteria
    • Capacity metrics
    • IT budget

    See Info-Tech’s blueprint

    Grow Your Own PPM Solution
    Process

    Responsibility: The ITSC will approve the list of projects to fund based on defined prioritization criteria – in line with capacity and IT budget.

    It is also responsible for identifying the prioritization criteria in line with organizational priorities.

    Output Customer
    • Approved project list
    • Request for additional information
    • Recommendation for increased resources
    • PMO
    • CIO
    • Project sponsors

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Endorse the IT strategy
    Supplier Input
    CIO
    • IT strategy presentation

    See Info-Tech’s blueprint

    IT Strategy and Roadmap
    Process

    Responsibility: Review, understand, and endorse the IT strategy.

    Output Customer
    • Signed endorsement of the IT strategy
    • Recommendations for adjustments
    • CEO
    • CFO
    • Business executives
    • IT leadership
    SIPOC: Monitor project management metrics
    Supplier Input
    PMO
    • Project metrics report with recommendations
    Process

    Responsibility: Review recommendations around PM metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

    Output Customer
    • Accept project metrics performance
    • Accept recommendations
    • Launch corrective task force
    • Define target metrics
    • PMO
    • Business executives
    • IT leadership

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Approve launch of planned and unplanned project
    Supplier Input
    CIO
    • Project list and recommendations
    • Resourcing report
    • Project intake document

    See Info-Tech’s Blueprint:

    Grow Your Own PPM Solution
    Process

    Responsibility: Review the list of projects and approve the launch or reprioritization of projects.

    Output Customer
    • Approved launch of projects
    • Recommendations for changes to project list
    • CFO
    • CIO
    • IT leadership
    SIPOC: Monitor stakeholder satisfaction with services and other service metrics
    Supplier Input
    Service Manager
    • Service metrics report with recommendations
    Info-Tech End User Satisfaction Report
    Process

    Responsibility: Review recommendations around service metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

    Output Customer
    • Accept service level performance
    • Accept recommendations
    • Launch corrective task force
    • Define target metrics
    • Service manager
    • Business executives
    • IT leadership

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Approve plans for new or changed service requirements
    Supplier Input
    Service Manager
    • Service change request
    • Project request and change plan
    Process

    Responsibility: Review IT recommendations, approve changes, and communicate those to staff.

    Output Customer
    • Approved service changes
    • Rejected service changes
    • Service manager
    • Organizational staff
    SIPOC: Monitor risk management metrics
    Supplier Input
    CIO
    • Risk metrics report with recommendations
    Process

    Responsibility: Review recommendations around risk metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

    Output Customer
    • Accept risk register and mitigation strategy
    • Launch corrective task force to address risks
    • Risk manager
    • Business executives
    • IT leadership

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Review the prioritized list of risks
    Supplier Input
    Risk Manager
    • Risk register
    • Mitigation strategies
    See Info-Tech’s risk management research to build a holistic risk strategy.
    Process

    Responsibility: Accept the risk registrar and define any additional action required.

    Output Customer
    • Accept risk register and mitigation strategy
    • Launch corrective task force to address risks
    • Risk manager
    • IT leadership
    • CRO
    SIPOC: Define information lifecycle process ownership
    Supplier Input
    CIO
    • List of risk owner options with recommendations
    See Info-Tech’s related blueprint: Information Lifecycle Management
    Process

    Responsibility: Define responsibility and accountability for information lifecycle ownership.

    Output Customer
    • Defined information lifecycle owner
    • Organization wide.

    SIPOC examples for typical ITSC responsibilities

    SIPOC: Monitor information lifecycle metrics
    Supplier Input
    Information lifecycle owner
    • Information metrics report with recommendations
    Process

    Responsibility: Review recommendations around information management metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

    Output Customer
    • Accept information management performance
    • Accept recommendations
    • Launch corrective task force to address challenges
    • Define target metrics
    • IT leadership

    Define which metrics you will report to the IT steering committee

    2.2

    1. Consider your IT steering committee goals and the five IT governance areas.
    2. For each governance area, identify which metrics you are currently tracking and determine whether these metrics are valuable to IT, to the business, or both. For metrics that are valuable to business stakeholders determine whether you have an identified target metric.

    New Metrics:

    1. For each of the five IT governance areas review your SWOT analysis and document your key opportunities and weaknesses.
    2. For each, brainstorm hypotheses around why the opportunity was weak or was a success. For each hypothesis identify if there are any clear ways to measure and test the hypothesis.
    3. Review the list of metrics and select 5-7 metrics to track for each prioritized governance area.

    INPUT

    • List of responsibilities
    • Example SIPOCs

    OUTPUT

    • SIPOC model for all responsibilities

    Materials

    • Whiteboard
    • Markers

    Participants

    • IT leadership team

    IT steering committee metric triggers to consider

    RISK

    • Risk profile % increase
    • # of actionable risks outstanding
    • # of issues arising not identified prior
    • # of security breaches

    SERVICE

    • Number of business disruptions due to IT service incidents
    • Number of service requests by department
    • Number of service requests that are actually projects
    • Causes of tickets overall and by department
    • Percentage of duration attributed to waiting for client response

    PROJECTS

    • Projects completed within budget
    • Percentage of projects delivered on time
    • Project completion rate
    • IT completed assigned portion to scope
    • Project status and trend dashboard

    INFORMATION / DATA

    • % of data properly classified
    • # of incidents locating data
    • # of report requests by complexity
    • # of open data sets

    PPM /INVESTMENTS

    • CIO Business Vision (an Info-Tech diagnostic survey that helps align IT strategy with business goals)
    • Level of stakeholder satisfaction and perceived value
    • Percentage of ON vs. OFF cycle projects by area/silo
    • Realized benefit to business units based on investment mix
    • Percent of enterprise strategic goals and requirements supported by strategic goals
    • Target vs. actual budget
    • Reasons for off-cycle projects causing delays to planned projects

    CASE STUDY

    Industry: Consumer Goods

    Source: Interview

    "IT steering committee’s reputation greatly improved by clearly defining its process."

    CHALLENGE

    One of the major failings of the previous steering committee was its poorly drafted procedures. Members of the committee were unclear on the overall process and the meeting schedule was not well established.

    This led to low attendance at the meetings and ineffective meetings overall. Since the meeting procedures weren’t well understood, some members of the leadership team took advantage of this to get their projects pushed through.

    SOLUTION

    The first step the new CIO took was to clearly outline the meeting procedures in her new steering committee charter. The meeting agenda, meeting goals, length of time, and outcomes were outlined, and the stakeholders signed off on their participation.

    She also gave the participants a SIPOC, which helped members who were unfamiliar with the process a high-level overview. It also reacquainted previous members with the process and outlined changes to the previous, out-of-date processes.

    OUTCOME

    The participation rate in the committee meetings improved from the previous rate of approximately 40% to 90%. The committee members were much more satisfied with the new process and felt like their contributions were appreciated more than before.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    An image of an Info-Tech analyst is depicted.

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    2.1

    A screenshot of activity 2.1 is depicted. Activity 2.1 is about defining a SIPOC for each of the ITSC responsibilities.

    Define a SIPOC for each of the ITSC responsibilities

    Create SIPOCs for each of the governance responsibilities with the help of an Info-Tech advisor.

    2.2

    A screenshot of activity 2.2 is depicted. Activity 2.2 is about establishing the reporting metrics for the ITSC.

    Establish the reporting metrics for the ITSC

    The analyst will facilitate several exercises to help you and your stakeholders define the reporting metrics for the ITSC.

    Phase 3

    Build the Stakeholder Presentation

    Phase 3 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Build the Stakeholder Presentation
    Proposed Time to Completion: 1 week

    Customize the Presentation

    Start with an analyst kick-off call:

    • Review the IT Steering Committee Stakeholder Presentation with an analyst

    Then complete these activities…

    • Schedule the first meeting and invite the ITSC members
    • Customize the presentation template

    With these tools & templates:

    IT Steering Committee Stakeholder Presentation


    Review and Practice the Presentation

    Review findings with analyst:

    • Review the changes made to the template
    • Practice the presentation and create a script

    Then complete these activities…

    • Hold the ITSC meeting

    With these tools & templates:

    • IT Steering Committee Stakeholder Presentation
    Review the First ITSC Meeting

    Finalize phase deliverable:

    • Review the outcomes of the first ITSC meeting and plan out the next steps

    Then complete these activities…

    • Review the discussion and plan next steps

    With these tools & templates:

    Establish an Effective IT Steering Committee blueprint

    Build the Stakeholder Presentation

    This step will walk you through the following activities:

    • Organizing the first ITSC meeting
    • Customizing an ITSC stakeholder presentation
    • Determine ITSC responsibilities and participants
    • Determine ITSC procedures

    This step involves the following participants:

    • CIO
    • IT Steering Committee
    • IT Leadership Team
    • PMO

    Key Insight:

    Stakeholder engagement will be critical to your ITSC success, don't just focus on what is changing. Ensure stakeholders know why you are engaging them and how it will help them in their role.

    Hold a kick-off meeting with your IT steering committee members to explain the process, responsibilities, and goals

    3.1

    Don’t take on too much in your first IT steering committee meeting. Many participants may not have participated in an IT steering committee before, or some may have had poor experiences in the past.

    Use this meeting to explain the role of the IT steering committee and why you are implementing one, and help participants to understand their role in the process.

    Quickly customize Info-Tech’s IT Steering Committee Stakeholder Presentation template to explain the goals and benefits of the IT steering committee, and use your own data to make the case for governance.

    At the end of the meeting, ask committee members to sign the committee charter to signify their agreement to participate in the IT steering committee.

    A screenshot of IT Steering Committee: Meeting 1 is depicted. A screenshot of the IT Steering Committee Challenges and Opportunities for the organization.

    Tailor the IT Steering Committee Stakeholder Presentation template: slides 1-5

    3.2 Estimated Time: 10 minutes

    Review the IT Steering Committee Stakeholder Presentation template. This document should be presented at the first IT steering committee meeting by the assigned Committee Chair.

    Customization Options

    Overall: Decide if you would like to change the presentation template. You can change the color scheme easily by copying the slides in the presentation deck and pasting them into your company’s standard template. Once you’ve pasted them in, scan through the slides and make any additional changes needed to formatting.

    Slide 2-3: Review the text on each of the slides and see if any wording should be changed to better suite your organization.

    Slide 4: Review your list of the top 10 challenges and opportunities as defined in section 2 of this blueprint. Document those in the appropriate sections. (Note: be careful that the language is business-facing; challenges and opportunities should be professionally worded.)

    Slide 5: Review the language on slide 5 to make any necessary changes to suite your organization. Changes here should be minimal.

    INPUT

    • Top 10 list
    • Survey report
    • ITSC Charter

    OUTPUT

    • Ready-to-present presentation for defined stakeholders

    Materials

    • IT Steering Committee Stakeholder Presentation

    Participants

    • IT Steering Committee Chair/CIO

    Tailor the IT Steering Committee Stakeholder Presentation template: slides 6-10

    3.2 Estimated Time: 10 minutes

    Customization Options

    Slide 6: The goal of this slide is to document and share the names of the participants on the IT steering committee. Document the names in the right-hand side based on your IT Steering Committee Charter.

    Slides 7-9:

    • Review the agenda items as listed in your IT Steering Committee Charter. Document the annual, quarterly, and monthly meeting responsibilities on the left-hand side of slides 7-9.
    • Meeting Participants: For each slide, list the members who are required for that meeting.
    • Document the key required reading materials as identified in the SIPOC charts under “inputs.”
    • Document the key meeting outcomes as identified in the SIPOC chart under “outputs.”

    Slide 10: Review and understand the rollout timeline. Make any changes needed to the timeline.

    INPUT

    • Top 10 list
    • Survey report
    • ITSC Charter

    OUTPUT

    • Ready-to-present presentation for defined stakeholders

    Materials

    • IT Steering Committee Stakeholder Presentation

    Participants

    • IT Steering Committee Chair/CIO

    Present the information to the IT leadership team to increase your comfort with the material

    3.3 Estimated Time: 1-2 hours

    1. Once you have finished customizing the IT Steering Committee Stakeholder Presentation, practice presenting the material by meeting with your IT leadership team. This will help you become more comfortable with the dialog and anticipate any questions that might arise.
    2. The ITSC chair will present the meeting deck, and all parties should discuss what they think went well and opportunities for improvement.
    3. Each business relationship manager should document the needed changes in preparation for their first meeting.

    INPUT

    • IT Steering Committee Stakeholder Presentation - Meeting 1

    Participants

    • IT leadership team

    Schedule your first meeting of the IT steering committee

    3.4

    By this point, you should have customized the meeting presentation deck and be ready to meet with your IT steering committee participants.

    The meeting should be one hour in duration and completed in person.

    Before holding the meeting, identify who you think is going to be most supportive and who will be least. Consider meeting with those individuals independently prior to the group meeting to elicit support or minimize negative impacts on the meeting.

    Customize this calendar invite script to invite business partners to participate in the meeting.

    Hello [Name],

    As you may have heard, we recently went through an exercise to develop an IT steering committee. I’d like to take some time to discuss the results of this work with you, and discuss ways in which we can work together in the future to better enable corporate goals.

    The goals of the meeting are:

    1. Discuss the benefits of an IT steering committee
    2. Review the results of the organizational survey
    3. Introduce you to our new IT steering committee

    I look forward to starting this discussion with you and working with you more closely in the future.

    Warm regards,

    CASE STUDY

    Industry:Consumer Goods

    Source: Interview

    "CIO gains buy-in from the company by presenting the new committee to its stakeholders."

    CHALLENGE

    Communication was one of the biggest steering committee challenges that the new CIO inherited.

    Members were resistant to joining/rejoining the committee because of its previous failures. When the new CIO was building the steering committee, she surveyed the members on their knowledge of IT as well as what they felt their role in the committee entailed.

    She found that member understanding was lacking and that their knowledge surrounding their roles was very inconsistent.

    SOLUTION

    The CIO dedicated their first steering committee meeting to presenting the results of that survey to align member knowledge.

    She outlined the new charter and discussed the roles of each member, the goals of the committee, and the overarching process.

    OUTCOME

    Members of the new committee were now aligned in terms of the steering committee’s goals. Taking time to thoroughly outline the procedures during the first meeting led to much higher member engagement. It also built accountability within the committee since all members were present and all members had the same level of knowledge surrounding the roles of the ITSC.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.1

    A screenshot of Activity 3.1 is depicted. Activity 3.1 is about creating a presentation for ITSC stakeholders to be presented at the first ITSC meeting.

    Create a presentation for ITSC stakeholders to be presented at the first ITSC meeting

    Work with an Info-Tech advisor to customize our IT Steering Committee Stakeholder Presentation template. Use this presentation to gain stakeholder buy-in by making the case for an ITSC.

    Phase 4

    Define the Prioritization Criteria

    Phase 4 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation : Define the Prioritization Criteria
    Proposed Time to Completion: 4 weeks

    Discuss Prioritization Criteria

    Start with an analyst kick-off call:

    • Review sample project prioritization criteria and discuss criteria unique to your organization

    Then complete these activities...

    • Select the criteria that would be most effective for your organization
    • Input these into the tool

    With these tools & templates:

    IT Steering Committee Project Prioritization Tool

    Customize the IT Steering Committee Project Prioritization Tool

    Review findings with analyst:

    • Review changes made to the tool
    • Finalize criteria weighting

    Then complete these activities…

    • Pilot test the tool using projects from the previous year

    With these tools & templates:

    IT Steering Committee Project Prioritization Tool

    Review Results of the Pilot Test

    Finalize phase deliverable:

    • Review the results of the pilot test
    • Make changes to the tool

    Then complete these activities…

    • Input your current project portfolio into the prioritization tool

    With these tools & templates:

    IT Steering Committee Project Prioritization Tool

    Define the Project Prioritization Criteria

    This step will walk you through the following activities:

    • Selecting the appropriate project prioritization criteria for your organization
    • Developing weightings for the prioritization criteria
    • Filling in Info-Tech’s IT Steering Committee Project Prioritization Tool

    This step involves the following participants:

    • CIO
    • IT Steering Committee
    • IT Leadership Team
    • PMO

    Key Insight:

    The steering committee sets and agrees to principles that guide prioritization decisions. The agreed upon principles will affect business unit expectations and justify the deferral of requests that are low priority. In some cases, we have seen the number of requests drop substantially because business units are reluctant to propose initiatives that do not fit high prioritization criteria.

    Understand the role of the IT steering committee in project prioritization

    One of the key roles of the IT steering committee is to review and prioritize the portfolio of IT projects.

    What is the prioritization based on? Info-Tech recommends selecting four broad criteria with two dimensions under each to evaluate the value of the projects. The criteria are aligned with how the project generates value for the organization and the execution of the project.

    What is the role of the steering committee in prioritizing projects? The steering committee is responsible for reviewing project criteria scores and making decisions about where projects rank on the priority list. Planning, resourcing, and project management are the responsibility of the PMO or the project owner.

    Info-Tech’s Sample Criteria

    Value

    Strategic Alignment: How much a project supports the strategic goals of the organization.

    Customer Satisfaction: The impact of the project on customers and how visible a project will be with customers.

    Operational Alignment: Whether the project will address operational issues or compliance.

    Execution

    Financial: Predicted ROI and cost containment strategies.

    Risk: Involved with not completing projects and strategies to mitigate it.

    Feasibility: How easy the project is to complete and whether staffing resources exist.

    Use Info-Tech’s IT Steering Committee Project Prioritization Tool to catalog and prioritize your project portfolio

    4.1

    • Use Info-Tech’s IT Steering Committee Project Prioritization Tool in conjunction with the following activities to catalog and prioritize all of the current IT projects in your portfolio.
    • Assign weightings to your selected criteria to prioritize projects based on objective scores assigned during the intake process and adjust these weightings on an annual basis to align with changing organizational priorities and goals.
    • Use this tool at steering committee meetings to streamline the prioritization process and create alignment with the PMO and project managers.
    • Monitor ongoing project status and build a communication channel between the PMO and project managers and the IT steering committee.
    • Adjusting the titles in the Settings tab will automatically adjust the titles in the Project Data tab.
    • Note: To customize titles in the document you must unprotect the content under the View tab. Be sure to change the content back to protected after making the changes.
    A screenshot of Info-Tech's IT Steering Committee Project Prioritization Tool is depicted. The first page of the tool is shown. A screenshot of Info-Tech's IT Steering Committee Project Prioritization Tool is depicted. The page depicted is on the Intake and Prioritization Tool Settings.

    Establish project prioritization criteria and build the matrix

    4.2 Estimated Time: 1 hour

    1. During the second steering committee meeting, discuss the criteria you will be basing your project prioritization scoring on.
    2. Review Info-Tech’s prioritization criteria matrix, located in the Prioritization Criteria List tab of the IT Steering Committee Project Prioritization Tool, to gain ideas for what criteria would best suit your organization.
    3. Write these main criteria on the whiteboard and brainstorm criteria that are more specific for your organization; include these on the list as well.
    4. Discuss the criteria. Eliminate criteria that won’t contribute strongly to the prioritization process and vote on the remaining. Select four main criteria from the list.
    5. After selecting the four main criteria, write these on the whiteboard and brainstorm the dimensions that fall under the criteria. These should be more specific/measurable aspects of the criteria. These will be the statements that values are assigned to for prioritizing projects so they should be clear. Use the Prioritization Criteria List in the tool to help generate ideas.
    6. After creating the dimensions, determine what the scoring statements will be. These are the statements that will be used to determine the score out of 10 that the different dimensions will receive.
    7. Adjust the Settings and Project Data tabs in the IT Steering Committee Project Prioritization Tool to reflect your selections.
    8. Edit Info-Tech’s IT Project Intake Form or the intake form that you currently use to contain these criteria and scoring parameters.

    INPUT

    • Group input
    • IT Steering Committee Project Prioritization Tool

    OUTPUT

    • Project prioritization criteria to be used for current and future projects

    Materials

    • Whiteboard and markers

    Participants

    • IT steering committee
    • CIO
    • IT leadership

    Adjust prioritization criteria weightings to reflect organizational needs

    4.3 Estimated Time: 1 hour

    1. In the second steering committee meeting, after deciding what the project prioritization criteria will be, you need to determine how much weight (the importance) each criteria will receive.
    2. Use the four agreed upon criteria with two dimensions each, determined in the previous activity.
    3. Perform a $100 test to assign proportions to each of the criteria dimensions.
      1. Divide the committee into pairs.
      2. Tell each pair that they have $100 divide among the 4 major criteria based on how important they feel the criteria is.
      3. After dividing the initial $100, ask them to divide the amount they allocated to each criteria into the two sub-dimensions.
      4. Next, ask them to present their reasoning for the allocations to the rest of the committee.
      5. Discuss the weighting allotments and vote on the best one (or combination).
      6. Input the weightings in the Settings tab of the IT Steering Committee Project Prioritization Tool and document the discussion.
    4. After customizing the chart establish the owner of the document. This person should be a member of the PMO or the most suitable IT leader if a PMO doesn’t exist.
    5. Only perform this adjustment annually or if a major strategic change happens within the organization.

    INPUT

    • Group discussion

    OUTPUT

    • Agreed upon criteria weighting
    • Complete prioritization tool

    Materials

    • IT Steering Committee Project Prioritization Tool
    • Whiteboard and sticky notes

    Participants

    • IT steering committee
    • IT leadership

    Document the prioritization criteria weightings in Info-Tech’s IT Steering Committee Project Prioritization Tool.

    Configure the prioritization tool to align your portfolio with business strategy

    4.4 Estimated Time: 60 minutes

    Download Info-Tech’s Project Intake and Prioritization Tool.

    A screenshot of Info-Tech's Project Intake and Prioritization Tool.

    Rank: Project ranking will dynamically update relative to your portfolio capacity (established in Settings tab) and the Size, Scoring Progress, Remove from Ranking, and Overall Score columns. The projects in green represent top priorities based on these inputs, while yellow projects warrant additional consideration should capacity permit.

    Scoring Progress: You will be able to determine some items on the scorecard earlier in the scoring progress (such as strategic and operational alignment). As you fill in scoring columns on the Project Data tab, the Scoring Progress column will dynamically update to track progress.

    The Overall Score will update automatically as you complete the scoring columns (refer to Activity 4.2).

    Days in Backlog: This column will help with backlog management, automatically tracking the number of days since an item was added to the list based on day added and current date.

    Validate your new prioritization criteria using previous projects

    4.5 Estimated Time: 2 hours

    1. After deciding on the prioritization criteria, you need to test their validity.
    2. Look at the portfolio of projects that were completed in the previous year.
    3. Go through each project and score it according to the criteria that were determined in the previous exercise.
    4. Enter the scores and appropriate weighting (according to goals/strategy of the previous year) into the IT Steering Committee Project Prioritization Tool.
    5. Look at the prioritization given to the projects in reference to how they were previously prioritized.
    6. Adjust the criteria and weighting to either align the new prioritization criteria with previous criteria or to align with desired outcomes.
    7. After scoring the old projects, pilot test the tool with upcoming projects.

    INPUT

    • Information on previous year’s projects
    • Group discussion

    OUTPUT

    • Pilot tested project prioritization criteria

    Materials

    • IT Steering Committee Project Prioritization Tool

    Participants

    • IT steering committee
    • IT leadership
    • PMO

    Pilot the scorecard to validate criteria and weightings

    4.6 Estimated Time: 60 minutes

    1. Pilot your criteria and weightings in the IT Steering Committee Project Prioritization Tool using project data from one or two projects currently going through approval process.
    2. For most projects, you will be able to determine strategic and operational alignment early in the scoring process, while the feasibility and financial requirements will come later during business case development. Score each column as you can. The tool will automatically track your progress in the Scoring Progress column on the Project Data tab.

    Projects that are scored but not prioritized will populate the portfolio backlog. Items in the backlog will need to be rescored periodically, as circumstances can change, impacting scores. Factors necessitating rescoring can include:

    • Assumptions in business case have changed.
    • Organizational change – e.g. a new CEO or a change in strategic objectives.
    • Major emergencies or disruptions – e.g. a security breach.

    Score projects using the Project Data tab in Info-Tech’s IT Steering Committee Project Prioritization Tool

    A screenshot of Info-Tech's <em data-verified=IT Steering Committee Project Prioritization Tool is depicted. The Data Tab is shown.">

    Use Info-Tech’s IT Project Intake Form to streamline the project prioritization and approval process

    4.7

    • Use Info-Tech’s IT Project Intake Form template to streamline the project intake and prioritization process.
    • Customize the chart on page 2 to include the prioritization criteria that were selected during this phase of the blueprint.
    • Including the prioritization criteria at the project intake phase will free up a lot of time for the steering committee. It will be their job to verify that the criteria scores are accurate.
    A screenshot of Info-Tech's IT Project Intake Form is depicted.

    After prioritizing and selecting your projects, determine how they will be resourced

    Consult these Info-Tech blueprints on project portfolio management to create effective portfolio project management resourcing processes.

    A Screenshot of Info-Tech's Create Project Management Success Blueprint is depicted. Create Project Management Success A Screenshot of Info-Tech's Develop a Project Portfolio Management Strategy Blueprint is depicted. Develop a Project Portfolio Management Strategy

    CASE STUDY

    Industry: Consumer Goods

    Source: Interview

    "Clear project intake and prioritization criteria allow for the new committee to make objective priority decisions."

    CHALLENGE

    One of the biggest problems that the previous steering committee at the company had was that their project intake and prioritization process was not consistent. Projects were being prioritized based on politics and managers taking advantage of the system.

    The procedure was not formalized so there were no objective criteria on which to weigh the value of proposed projects. In addition to poor meeting attendance, this led to the overall process being very inconsistent.

    SOLUTION

    The new CIO, with consultation from the newly formed committee, drafted a set of criteria that focused on the value and execution of their project portfolio. These criteria were included on their intake forms to streamline the rating process.

    All of the project scores are now reviewed by the steering committee, and they are able to facilitate the prioritization process more easily.

    The objective criteria process also helped to prevent managers from taking advantage of the prioritization process to push self-serving projects through.

    OUTCOME

    This was seen as a contributor to the increase in satisfaction scores for IT, which improved by 12% overall.

    The new streamlined process helped to reduce capacity constraints on IT, and it alerted the company to the need for more IT employees to help reduce these constraints further. The IT department was given permission to hire two new additional staff members.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    4.1

    A screenshot of activity 4.1 is depicted. Activity 4.1 was about defining your prioritization criteria and customize our <em data-verified=IT Steering Committee Project Prioritization Tool.">

    Define your prioritization criteria and customize our IT Steering Committee Project Prioritization Tool

    With the help of Info-Tech advisors, create criteria for determining a project’s priority. Customize the tool to reflect the criteria and their weighting. Run pilot tests of the tool to verify the criteria and enter your current project portfolio.

    Research contributors and experts

    • Andy Lomasky, Manager, Technology & Management Consulting, McGladrey LLP
    • Angie Embree, CIO, Best Friends Animal Society
    • Corinne Bell, CTO and Director of IT Services, Landmark College
    • John Hanskenecht, Director of Technology, University of Detroit Jesuit High School and Academy
    • Lori Baker, CIO, Village of Northbrook
    • Lynne Allard, IT Supervisor, Nipissing Parry Sound Catholic School Board
    • Norman Allen, Senior IT Manager, Baker Tilly
    • Paul Martinello, VP, IT Services, Cambridge and North Dumfries Hydro Inc.
    • Renee Martinez, IT Director/CIO, City of Santa Fe
    • Sam Wong, Director, IT, Seneca College
    • Suzanne Barnes, Director, Information Systems, Pathfinder International
    • Walt Joyce, CTO, Peoples Bank

    Appendices

    GOVERNANCE & ITSC & IT Management

    Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.

    The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.

    Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.

    These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.

    IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.

    Strategic IT Steering Committee
    Tactical

    Project Governance Service Governance

    Risk Governance Information Governance

    IT Management
    Operational Risk Task Force

    This blueprint focuses exclusively on building the IT Steering committee. For more information on IT governance see Info-Tech’s related blueprint: Tailor an IT Governance Plan to Fit Organizational Needs.

    IT steering committees play an important role in IT governance

    By bucketing responsibilities into these areas, you’ll be able to account for most key IT decisions and help the business to understand their role in governance, fostering ownership and joint accountability.

    The five governance areas are:

    Governance of the IT Portfolio and Investments: Ensures that funding and resources are systematically allocated to the priority projects that deliver value.

    Governance of Projects: Ensures that IT projects deliver the expected value, and that the PM methodology is measured and effective.

    Governance of Risks: Ensures the organization’s ability to assess and deliver IT projects and services with acceptable risk.

    Governance of Services: Ensures that IT delivers the required services at the acceptable performance levels.

    Governance of Information and Data: Ensures the appropriate classification and retention of data based on business need.

    A survey of stakeholders identified a need for increased stakeholder involvement and transparency in decision making

    A bar graph is depicted. The title is: I understand how decisions are made in the following areas. The areas include risk, services, projects, portfolio, and information. A circle graph is depicted. The title is: Do IT decisions involve the right people?

    Overall, survey respondents indicated a lack of understanding about how decisions are made around risk, services, projects, and investments, and that business involvement in decision making was too minimal.

    Satisfaction with decision quality around investments and PPM are uneven and largely not well understood

    72% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).

    A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. Title of the graph: IT decisions around service delivery and quality involve the right people?

    Overall, services were ranked #1 in importance of the 5 areas

    62% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).

    A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. Title of the graph: IT decisions around service delivery and quality involve the right people?

    Projects ranked as one of the areas with which participants are most satisfied with the quality of decisions

    70% of stakeholders do not understand how decisions around projects selection, success, and changes are made.

    A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. The title is: IT decisions around project changes, delays, and metrics involve the right people?

    Stakeholders are largely unaware of how decisions around risk are made and believe business participation needs to increase

    78% of stakeholders do not understand how decisions around risk are made

    A bar graph is depicted. The title is: How satisfied are you with the quality of decisions made around risk? A bar graph is depicted. The title is: IT decisions around acceptable risk involve the right people?

    The majority of stakeholders believe that they are aware of how decisions around information are made

    67% of stakeholders believe they do understand how decisions around information (data) retention and classification are made.

    A bar graph is depicted. The title is: How satisfied are you with the quality of decisions around information governance? A bar graph is depicted. The title is: IT decisions around information retention and classification involve the right people?

    Enable Product Delivery – Executive Leadership Workshop

    • Buy Link or Shortcode: {j2store}353|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Development
    • Parent Category Link: /development
    • You need to clearly convey the direction and strategy of your product portfolio to gain alignment, support, and funding from your organization.
    • IT organizations are traditionally organized to deliver initiatives in specific periods of time. This conflicts with product delivery, which continuously delivers value over the lifetime of a product.
    • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.

    Our Advice

    Critical Insight

    • Empowered product managers and product owners are the key to ensuring your delivery teams are delivering the right value at the right time to the right stakeholders.
    • Establishing operationally aligned product families helps bridge the gap between enterprise priorities and product enhancements.
    • Leadership must be aligned to empower and support Agile values and product teams to unlock the full value realization within your organization.

    Impact and Result

    • Common understanding of product management and Agile delivery.
    • Commitment to support and empower product teams.

    Enable Product Delivery – Executive Leadership Workshop Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Enabling Product Delivery – Executive workshop to align senior leadership with their transition to product management and delivery.

    • Enabling Product Delivery – Executive Workshop Storyboard

    2. Enabling Product Delivery –Executive Workshop Outcomes.

    • Enabling Product Delivery – Executive Workshop Outcomes
    [infographic]

    Workshop: Enable Product Delivery – Executive Leadership Workshop

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Understanding Your Top Challenges

    The Purpose

    Understand the drivers for your product transformation.

    Key Benefits Achieved

    Define the drivers for your transition to product-centric delivery.

    Activities

    1.1 What is driving your organization to become product focused?

    Outputs

    List of challenges and drivers

    2 Transitioning From Projects to Product-Centric Delivery

    The Purpose

    Understand the product transformation journey and differences.

    Key Benefits Achieved

    Identify the cultural, behavioral, and leadership changes needed for a successful transformation.

    Activities

    2.1 Define the differences between projects and product delivery

    Outputs

    List of differences

    3 Enterprise Agility and the Value of Change

    The Purpose

    Understand why smaller iterations increase value realization and decrease accumulated risk.

    Key Benefits Achieved

    Leverage smaller iterations to reduce time to value and accumulated risk to core operations.

    Activities

    3.1 What is business agility?

    Outputs

    Common understanding about the value of smaller iterations

    4 Defining Products and Product Management in Your Context

    The Purpose

    Establish an organizational starting definition of products.

    Key Benefits Achieved

    Tailor product management to meet the needs and vision of your organization.

    Activities

    4.1 What is a product? Who are your consumers?

    4.2 Identify enablers and blockers of product ownership

    4.3 Define a set of guiding principles for product management

    Outputs

    Product definition

    List of enablers and blockers of product ownership

    Set of guiding principles for product management

    5 Connecting Product Management to Agile Practices

    The Purpose

    Understand the relationship between product management and product delivery.

    Key Benefits Achieved

    Optimize product management to prioritize the right changes for the right people at the right time.

    Activities

    5.1 Discussions

    Outputs

    Common understanding

    6 Commit to Empowering Agile Product Teams

    The Purpose

    Personalize and commit to supporting product teams.

    Key Benefits Achieved

    Embrace leadership and cultural changes needed to empower and support teams.

    Activities

    6.1 Your management culture

    6.2 Personal Cultural Stop, Start, and Continue

    6.3 Now, Next, Later to support product owners

    Outputs

    Your management culture map

    Personal Cultural Stop, Start, and Continue list

    Now, Next, Later roadmap

    Further reading

    Enable Product Delivery – Executive Leadership Workshop

    Strengthen product management in your organization through effective executive leadership by focusing on product teams, core capabilities, and proper alignment.

    Objective of this workshop

    To develop a common understanding and foundation for product management so we, as leaders, better understand how to lead product owners, product managers, and their teams.

    Enable Product Delivery - Executive Leadership Workshop

    Learn how enterprise agility can provide lasting value to the organization

    Clarify your role in supporting your teams to deliver lasting value to stakeholders and customers

    1. Understanding Your Top Challenges
      • Define your challenges, goals, and opportunities Agile and product management will impact.
    2. Transitioning from Projects to Product-centric Delivery
      • Understand the shift from fixed delivery to continuous improvement and delivery of value.
    3. Enterprise Agility and the Value of Change
      • Organizations need to embrace change and leverage smaller delivery cycles.
    4. Defining Your "Products" and Product Management
      • Define products in your culture and how to empower product delivery teams.
    5. Connecting Product Management to Agile Practices
      • Use product ownership to drive increased ROI into your product delivery teams and lifecycles.
    6. Commit to Empowering Agile Product Teams
      • Define the actions and changes you must make for this transformation to be successful.

    Your Product Transformation Journey

    1. Make the Case for Product Delivery
      • Align your organization with the practices to deliver what matters most
    2. Enable Product Delivery – Executive Workshop
      • One-day executive workshop – align and prepare your leadership
      • Audience: Senior executives and IT leadership.
        Size: 8-16 people
        Time: 6 hours
    3. Deliver on Your Digital Product Vision
      • Enhance product backlogs, roadmapping, and strategic alignment
      • Audience: Product Owners/Mangers
        Size: 10-20 people
        Time: 3-4 days
    4. Deliver Your Digital Products at Scale
      • Scale Product Families to Align Enterprise Goals
      • Audience: Product Owners/Mangers
        Size: 10-20 people
        Time: 3-4 days
    5. Mature and Scale Product Ownership
      • Align and mature your product owners
      • Audience: Product Owners/Mangers
        Size: 8-16 people
        Time: 2-4 days

    Repeat workshops with different companies, operating units, departments, or teams as needed.

    What is a workshop?

    We WILL ENGAGE in discussions and activities:

    • Flexible, to accommodate the needs of the group.
    • Open forum for discussion and questions.
    • Share your knowledge, expertise, and experiences (roadblocks and success stories).
    • Everyone is part of the process.
    • Builds upon itself.

    This workshop will NOT be:

    • A lecture or class.
    • A monologue that never ends.
    • Technical training.
    • A presentation.
    • Us making all the decisions.

    Roles within the workshop

    We each have a role to play to make our workshop successful!

    Facilitators

    • Introduce the best practice framework used by Info-Tech.
    • Ask questions about processes, procedures, and assumptions.
    • Guide for the methodology.
    • Liaison for any other relevant Info-Tech research or services.

    Participants

    • Contribute and speak out as much as needed.
    • Provide expertise on the current processes and technology.
    • Ask questions.
    • Provide feedback.
    • Collaborate and work together to produce solutions.

    Understanding Your Top Challenges

    • Understanding Your Top Challenges
    • Transitioning From Projects to Product-Centric Delivery
    • Enterprise Agility and the Value of Change
    • Defining Your Products and Product Management
    • Connecting Product Management to Agile Practices
    • Commit to Empowering Agile Product Teams
    • Wrap-Up and Retrospective

    Executive Summary

    Your Challenge

    • Products are the lifeblood of an organization. They deliver the capabilities needed to deliver value to customers, internal users, and stakeholders.
    • The shift to becoming a product organization is intended to continually increase the value you provide to the broader organization as you grow and evolve.
    • You need to clearly convey the direction and strategy of your product portfolio to gain alignment, support, and funding from your organization.

    Common Obstacles

    • IT organizations are traditionally organized to deliver initiatives in specific periods of time. This conflicts with product delivery, which continuously delivers value over the lifetime of a product.
    • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.
    • Product owners struggle to prioritize changes to deliver product value. This creates a gap and conflict between product and enterprise goals.

    Info-Tech's Approach

    Info-Tech's approach will guide you through:

    • Understanding the top challenges driving your product initiative.
    • Improving your transitioning from projects to product-centric delivery.
    • Enhancing enterprise agility and the value of change.
    • Defining products and product management in your context.
    • Connecting product management to Agile practices.
    • Committing to empowering Agile Product teams.
    This is an image of an Info-Tech Thought Map for Accelerate Your Transition to Product Delivery
    This is an image of an Info-Tech Thought Map for Delier on your Digital Product Vision
    This is an image of an Info-Tech Thought Map for Deliver Digital Products at Scale via Enterprise Product Families.
    This is an image of an Info-Tech Thought Map for What We Mean by an Applcation Department Strategy.

    What is driving your organization to become product focused?

    30 minutes

    • Team introductions:
      • Share your name and role
      • What are the key challenges you are looking to solve around product management?
      • What blockers or challenges will we need to overcome?

    Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.

    Input

    • Organizational knowledge
    • Goals and challenges

    Output

    • List of key challenges
    • List of workshop expectations
    • Parking lot items

    Transitioning From Projects to Product-Centric Delivery

    • Understanding Your Top Challenges
    • Transitioning From Projects to Product-Centric Delivery
    • Enterprise Agility and the Value of Change
    • Defining Your Products and Product Management
    • Connecting Product Management to Agile Practices
    • Commit to Empowering Agile Product Teams
    • Wrap-Up and Retrospective

    Define the differences between projects and product delivery

    30 minutes

    • Consider project delivery and product delivery.
    • Discussion:
      • What are some differences between the two?

    Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.

    Input

    • Organizational knowledge
    • Internal terms and definitions

    Output

    • List of differences between projects and product delivery

    Define the differences between projects and product delivery

    15 minutes

    Project Delivery

    vs

    Product Delivery

    Point in time

    What is changed

    Method of funding changes

    Needs an owner

    Input

    • Organizational knowledge
    • Internal terms and definitions

    Output

    • List of differences between projects and product delivery

    Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.

    Identify the differences between a project-centric and a product-centric organization

    Project

    Product

    Fund Projects

    Funding

    Fund Products or Teams

    Line of Business Sponsor

    Prioritization

    Product Owner

    Makes Specific Changes
    to a Product

    Product Management

    Improve Product Maturity
    and Support

    Assign People to Work

    Work Allocation

    Assign Work
    to Product Teams

    Project Manager Manages

    Capacity Management

    Team Manages Capacity

    Info-Tech Insight

    Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end user value and enterprise alignment.

    Projects can be a mechanism for funding product changes and improvements

    This is an image showing the relationship between the project lifecycle, a hybrid lifecycle, and a product lifecycle.

    Projects within products

    Regardless of whether you recognize yourself as a "product-based" or "project-based" shop, the same basic principles should apply.

    You go through a period or periods of project-like development to build a version of an application or product.

    You also have parallel services along with your project development, which encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

    While Agile and product are intertwined, they are not the same!

    Delivering products does not necessarily require an Agile mindset. However, Agile methods help facilitate the journey because product thinking is baked into them.

    This image shows the product delivery maturity process from waterfall to continuous integration and delivery.

    Product roadmaps guide delivery and communicate your strategy

    In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

    This is an image adapted from Pichler, What is Product Management.

    Adapted from: Pichler, "What Is Product Management?"

    Info-Tech Insight

    The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.

    Streamline Your Workforce During a Pandemic

    • Buy Link or Shortcode: {j2store}515|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Lead
    • Parent Category Link: /lead

    Reduced infection rates in compromised areas are providing hope that these difficult times will pass. However, organizations are facing harsh realities in real time. With significant reductions in revenue, employers are facing pressure to quickly implement cost-cutting strategies, resulting in mass layoffs of valuable employees.

    Our Advice

    Critical Insight

    Employees are an organization’s greatest asset. When faced with cost-cutting pressures, look for redeployment opportunities that use talent as a resource to get through hard times before resorting to difficult layoff decisions.

    Impact and Result

    Make the most of your workforce in this unprecedented situation by following McLean & Company’s process to initiate redeployment efforts and reduce costs. If all else fails, follow our guidance on planning for layoffs and considerations when doing so.

    Streamline Your Workforce During a Pandemic Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Meet with leadership

    Set a strategy with senior leadership, brainstorm underused and understaffed employee segments and departments, then determine an approach to redeployments and layoffs.

    • Streamline Your Workforce During a Pandemic Storyboard
    • Redeployment and Layoff Strategy Workbook

    2. Plan individual and department redeployment

    Collect key information, prepare and redeploy, and roll up information across the organization.

    • Short-Term Survival Segment Evaluation Tool
    • Skills Inventory for Redeployment Tool
    • Redeployment Action and Communication Plan
    • Crisis Communication Guide for HR
    • Crisis Communication Guide for Leaders
    • Leadership Crisis Communication Guide Template
    • 3i's of Engaging Management – Manager Guide
    • Feedback and Coaching Guide for Managers
    • Redeployment Communication Roll-up Template

    3. Plan individual and department layoffs

    Plan for layoffs, execute on the layoff plan, and communicate to employees.

    • Employee Departure Checklist Tool
    • 10 Communication Best Practices in the Face of Crisis
    • Termination Logistics Tool
    • Termination Costing Tool
    • COVID-19: Employee-Facing Frequently Asked Questions Template
    • COVID-19: Employee-Facing Frequently Asked Questions
    • Standard Internal Communications Plan

    4. Monitor and manage departmental effectiveness

    Monitor departmental performance, review organizational performance, and determine next steps.

    • HR Metrics Library
    • Standard HR Scorecard
    [infographic]

    Build a Security Metrics Program to Drive Maturity

    • Buy Link or Shortcode: {j2store}266|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $22,947 Average $ Saved
    • member rating average days saved: 8 Average Days Saved
    • Parent Category Name: Security Processes & Operations
    • Parent Category Link: /security-processes-and-operations
    • Many security leaders put off adding metrics to their program because they don't know where to start or how to assess what is worth measuring.
    • Sometimes, this uncertainty causes the belief that their security programs are not mature enough for metrics to be worthwhile.
    • Because metrics can become very technical and precise,it's easy to think that they're inherently complicated (not true).

    Our Advice

    Critical Insight

    • The best metrics are tied to goals.
    • Tying your metrics to goals ensures that you are collecting metrics for a specific purpose rather than just to watch the numbers change.

    Impact and Result

    • A metric, really, is just a measure of success against a given goal. Gradually, programs will achieve their goals and set new more specific goals, and with them come more-specific metrics.
    • It is not necessary to jump into highly technical metrics right away. A lot can be gained from metrics that track behaviors.
    • A metrics program can be very simple and still effectively demonstrate the value of security to the organization. The key is to link your metrics to the goals or objectives the security team is pursuing, even if they are simple implementation plans (e.g. percentage of departments that have received security training course).

    Build a Security Metrics Program to Drive Maturity Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should build a security metrics program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Link security metrics to goals to boost maturity

    Develop goals and KPIs to measure your progress.

    • Build a Security Metrics Program to Drive Maturity – Phase 1: Link Security Metrics to Goals to Boost Maturity
    • Security Metrics Determination and Tracking Tool
    • KPI Development Worksheets

    2. Adapt your reporting strategy for various metric types

    Learn how to present different types of metrics.

    • Build a Security Metrics Program to Drive Maturity – Phase 2: Adapt Your Reporting Strategy for Various Metric Types
    • Security Metrics KPX Dashboard
    • Board-Level Security Metrics Presentation Template
    [infographic]

    Workshop: Build a Security Metrics Program to Drive Maturity

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Current State, Initiatives, and Goals

    The Purpose

    Create a prioritized list of goals to improve the security program’s current state.

    Key Benefits Achieved

    Insight into the current program and the direct it needs to head in.

    Activities

    1.1 Discuss current state and existing approach to metrics.

    1.2 Review contract metrics already in place (or available).

    1.3 Determine security areas that should be measured.

    1.4 Determine what stakeholders are involved.

    1.5 Review current initiatives to address those risks (security strategy, if in place).

    1.6 Begin developing SMART goals for your initiative roadmap.

    Outputs

    Gap analysis results

    SMART goals

    2 KPI Development

    The Purpose

    Develop unique KPIs to measure progress against your security goals.

    Key Benefits Achieved

    Learn how to develop KPIs

    Prioritized list of security goals

    Activities

    2.1 Continue SMART goal development.

    2.2 Sort goals into types.

    2.3 Rephrase goals as KPIs and list associated metric(s).

    2.4 Continue KPI development.

    Outputs

    KPI Evolution Worksheet

    3 Metrics Prioritization

    The Purpose

    Determine which metrics will be included in the initial program launch.

    Key Benefits Achieved

    A set of realistic and manageable goals-based metrics.

    Activities

    3.1 Lay out prioritization criteria.

    3.2 Determine priority metrics (implementation).

    3.3 Determine priority metrics (improvement & organizational trend).

    Outputs

    Prioritized metrics

    Tool for tracking and presentation

    4 Metrics Reporting

    The Purpose

    Strategize presentation based around metric type to indicate organization’s risk posture.

    Key Benefits Achieved

    Develop versatile reporting techniques

    Activities

    4.1 Review metric types and discuss reporting strategies for each.

    4.2 Develop a story about risk.

    4.3 Discuss the use of KPXs and how to scale for less mature programs.

    Outputs

    Key Performance Index Tool and presentation materials

    Further reading

    Build a Security Metrics Program to Drive Maturity

    Good metrics come from good goals.

    ANALYST PERSPECTIVE

    Metrics are a maturity driver.

    "Metrics programs tend to fall into two groups: non-existent and unhelpful.

    The reason so many security professionals struggle to develop a meaningful metrics program is because they are unsure of what to measure or why.

    The truth is, for metrics to be useful, they need to be tied to something you care about – a state you are trying to achieve. In other words, some kind of goal. Used this way, metrics act as the scoreboard, letting you know if you’re making progress towards your goals, and thus, boosting your overall maturity."

    Logan Rohde, Research Analyst, Security Practice Info-Tech Research Group

    Executive summary

    Situation

    • Many security leaders put off adding metrics to their program because they don't know where to start or how to assess what is worth measuring.

    Complication

    • Sometimes, this uncertainty causes the belief that their security programs are not mature enough for metrics to be worthwhile.
    • Because metrics can become very technical and precise, it's easy to think they're inherently complicated (not true).

    Resolution

    • A metric, really, is just a measure of success against a given goal. Gradually, programs will achieve their goals and set new, more specific goals, and with them comes more specific metrics.
    • It is not necessary to jump into highly technical metrics right away. A lot can be gained from metrics that track behaviors.
    • A metrics program can be very simple and still effectively demonstrate the value of security to the organization. The key is to link your metrics to the goals or objectives the security team is pursuing, even if they are simple implementation plans (e.g. percentage of departments that have received security training).

    Info-Tech Insight

    1. Metrics lead to maturity, not vice versa
      • Tracking metrics helps you assess progress and regress in your security program. This helps you quantify the maturity gains you’ve made and continue to make informed strategic decisions.
    2. The best metrics are tied to goals
      • Tying your metrics to goals ensures that you are collecting metrics for a specific purpose rather than just to watch the numbers change.

    Our understanding of the problem

    This Research is Designed For:

    • CISO

    This Research Will Help You:

    • Understand the value of metrics.
    • Right-size a metrics program based on your organization’s maturity and risk profile.
    • Tie metrics to goals to create meaningful KPIs.
    • Develop strategies to effectively communicate the right metrics to stakeholders.

    This Research Will Also Assist:

    • CIO
    • Security Manager
    • Business Professionals

    This Research Will Help Them:

    • Become informed on the metrics that matter to them.
    • Understand that investment in security is an investment in the business.
    • Feel confident in the progress of the organization’s security strategy.

    Info-Tech’s framework integrates several best practices to create a best-of-breed security framework

    Information Security Framework

    Governance

    • Context and Leadership
      • Information Security Charter
      • Information Security Organizational Structure
      • Culture and Awareness
    • Evaluation and Direction
      • Security Risk Management
      • Security Policies
      • Security Strategy and Communication
    • Compliance, Audit, and Review
      • Security Compliance Management
      • External Security Audit
      • Internal Security Audit
      • Management Review of Security

    Management

    • Prevention
      • Identity Security
        • Identity and Access Management
      • Data Security
        • Hardware Asset Management
        • Data Security & Privacy
      • Infrastructure Security
        • Network Security
        • Endpoint Security
        • Malicious Code
        • Application Security
        • Vulnerability Management
        • Cryptography Management
        • Physical Security
        • Cloud Security
      • HR Security
        • HR Security
      • Change and Support
        • Configuration and Change Management
        • Vendor Management
    • Detection
      • Security Threat Detection
      • Log and Event Management
    • Response and Recovery
      • Security Incident Management
      • Information Security in BCM
      • Security eDiscovery and Forensics
      • Backup and Recovery
    • Measurement
      • Metrics Program
      • Continuous Improvement

    Metrics help to improve security-business alignment

    While business leaders are now taking a greater interest in cybersecurity, alignment between the two groups still has room for improvement.

    Key statistics show that just...

    5% of public companies feel very confident that they are properly secured against a cyberattack.

    41% of boards take on cybersecurity directly rather than allocating it to another body (e.g. audit committee).

    19% of private companies do not discuss cybersecurity with the board.

    (ISACA, 2018)

    Info-Tech Insight

    Metrics help to level the playing field

    Poor alignment between security and the business often stems from difficulties with explaining how security objectives support business goals, which is ultimately a communication problem.

    However, metrics help to facilitate these conversations, as long as the metrics are expressed in practical, relatable terms.

    Security metrics benefit the business

    Executives get just as much out of management metrics as the people running them.

    1. Metrics assuage executives’ fears
      • Metrics help executives (and security leaders) feel more at ease with where the company is security-wise. Metrics help identify areas for improvement and gaps in the organization’s security posture that can be filled. A good metrics program will help identify deficiencies in most areas, even outside the security program, helping to identify what work needs to be done to reduce risk and increase the security posture of the organization.
    2. Metrics answer executives’ questions
      • Numbers either help ease confusion or signify other areas for improvement. Offering quantifiable evidence, in a language that the business can understand, offers better understanding and insight into the information security program. Metrics also help educate on types of threats, staff needed for security, and budget needs to decrease risk based on management’s threat tolerance. Metrics help make an organization more transparent, prepared, and knowledgeable.
    3. Metrics help to continually prove security’s worth
      • Traditionally, the security team has had to fight for a seat at the executive table, with little to no way to communicate with the business. However, the new trend is that the security team is now being invited before they have even asked to join. This trend allows the security team to better communicate on the organization’s security posture, describe threats and vulnerabilities, present a “plan of action,” and get a pulse on the organization’s risk tolerance.

    Common myths make security metrics seem challenging

    Security professionals have the perception that metrics programs are difficult to create. However, this attitude usually stems from one of the following myths. In reality, security metrics are much simpler than they seem at first, and they usually help resolve existing challenges rather than create new ones.

    Myth Truth
    1 There are certain metrics that are important to all organizations, based on maturity, industry, etc. Metrics are indications of change; for a metric to be useful it needs to be tied to a goal, which helps you understand the change you're seeing as either a positive or a negative. Industry and maturity have little bearing here.
    2 Metrics are only worthwhile once a certain maturity level is reached Metrics are a tool to help an organization along the maturity scale. Metrics help organizations measure progress of their goals by helping them see which tactics are and are not working.
    3 Security metrics should focus on specific, technical details (e.g. of systems) Metrics are usually a means of demonstrating, objectively, the state of a security program. That is, they are a means of communicating something. For this reason, it is better that metrics be phrased in easily digestible, non-technical terms (even if they are informed by technical security statistics).

    Tie your metrics to goals to make them worthwhile

    SMART metrics are really SMART goals.

    Specific

    Measurable

    Achievable

    Realistic

    Timebound

    Achievable: What is an achievable metric?

    When we say that a metric is “achievable,” we imply that it is tied to a goal of some kind – the thing we want to achieve.

    How do we set a goal?

    1. Determine what outcome you are trying to achieve.
      • This can be small or large (e.g. I want to determine what existing systems can provide metrics, or I want a 90% pass rate on our monthly phishing tests).
    2. Decide what indicates that you’ve achieved your goal.
      • At what point would you be satisfied with the progress made on the initiative(s) you’re working on? What conditions would indicate victory for you and allow you to move on to another goal?
    3. Develop a key performance indicator (KPI) to measure progress towards that goal.
      • Now that you’ve defined what you’re trying to achieve, find a way to indicate progress in relative or relational terms (e.g. percentage change from last quarter, percentage of implementation completed, ratio of programs in place to those still needing implementation).

    Info-Tech’s security metrics methodology is repeatable and iterative to help boost maturity

    Security Metric Lifecycle

    Start:

    Review current state and decide on priorities.

    Set a SMART goal for improvement.

    Develop an appropriate KPI.

    Use KPI to monitor program improvement.

    Present metrics to the board.

    Revise metrics if necessary.

    Metrics go hand in hand with your security strategy

    A security strategy is ultimately a large goal-setting exercise. You begin by determining your current maturity and how mature you need to be across all areas of information security, i.e. completing a gap analysis.

    As such, linking your metrics program to your security strategy is a great way to get your metrics program up and running – but it’s not the only way.

    Check out the following Info-Tech resource to get started today:

    Build an Information Security Strategy

    The value of security metrics goes beyond simply increasing security

    This blueprint applies to you whether you need to develop a metrics program from scratch or optimize and update your current strategy.

    Value of engaging in security metrics:

    • Increased visibility into your operations.
    • Improved accountability.
    • Better communication with executives as a result of having hard evidence of security performance.
    • Improved security posture through better understanding of what is working and what isn’t within the security program.

    Value of Info-Tech’s security metrics blueprint:

    • Doesn’t overwhelm you and allows you to focus on determining the metrics you need to worry about now without pressuring you to do it all at once.
    • Helps you develop a growth plan as your organization and metrics program mature, so you continue to optimize.
    • Creates effective communication. Prepares you to present the metrics that truly matter to executives rather than confusing them with unnecessary data. Pay attention to metric accuracy and reproducibility. No management wants inconsistent reporting.

    Impact

    Short term: Streamline your program. Based on your organization’s specific requirements and risk profile, figure out which metrics are best for now while also planning for future metrics as your organization matures.

    Long term: Once the program is in place, improvements will come with increased visibility into operations. Investments in security will be encouraged when more evidence is available to executives, contributing to overall improved security posture. Potential opportunities for eventual cost savings also exist as there is more informed security spending and fewer incidents.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked-off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Link Security Metrics to Goals to Boost Maturity – Project Overview

    1. Link Security Metrics to Goals to Boost Maturity 2. Adapt Your Reporting Strategy for Various Metric Types
    Best-Practice Toolkit

    1.1 Review current state and set your goals

    1.2 Develop KPIs and prioritize your goals

    1.3 Implement and monitor the KPI to track goal progress

    2.1 Review best practices for presenting metrics

    2.2 Strategize your presentation based on metric type

    2.3 Tailor presentation to your audience

    2.4 Use your metrics to create a story about risk

    2.5 Revise your metrics

    Guided Implementations
    • Call 1: Setting Goals
    • Call 2: KPI Development
    • Call 1: Best Practices and Reporting Strategy
    • Call 2: Build a Dashboard and Presentation Deck
    Onsite Workshop Module 1: Current State, Initiatives, Goals, and KPIs Module 2: Metrics Reporting

    Phase 1 Outcome:

    • KPI development and populated metrics tracking tool.

    Phase 2 Outcome:

    • Reporting strategy with dashboard and presentation deck.

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
    Activities

    Current State, Initiatives, and Goals

    • Discuss current state and existing approach to metrics.
    • Review contract metrics already in place (or available).
    • Determine security areas that should be measured.
    • Determine which stakeholders are involved.
    • Review current initiatives to address those risks (security strategy, if in place).
    • Begin developing SMART goals for your initiative roadmap.

    KPI Development

    • Continue SMART goal development.
    • Sort goals into types.
    • Rephrase goals as KPIs and list associated metric(s).
    • Continue KPI development.

    Metrics Prioritization

    • Lay out prioritization criteria.
    • Determine priority metrics (implementation).
    • Determine priority metrics (improvement & organizational trend).

    Metrics Reporting

    • Review metric types and discuss reporting strategies for each.
    • Develop a story about risk.
    • Discuss the use of KPXs and how to scale for less mature programs.

    Offsite Finalization

    • Review and finalization of documents drafted during workshop.
    Deliverables
    1. Gap analysis results
    1. Completed KPI development templates
    1. Prioritized metrics and tool for tracking and presentation.
    1. Key Performance Index tool and presentation materials.
    1. Finalization of completed deliverables

    Phase 1

    Link Security Metrics to Goals to Boost Maturity


    Phase 1

    1.1 Review current state and set your goals

    1.2 Develop KPIs and prioritize your goals

    1.3 Implement and monitor KPIs

    This phase will walk you through the following activities:

    • Current state assessment
    • Setting SMART goals
    • KPI development
    • Goals prioritization
    • KPI implementation

    This phase involves the following participants:

    • Security Team

    Outcomes of this phase

    • Goals-based KPIs
    • Security Metrics Determination and Tracking Tool

    Phase 1 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of two to three advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Link Security Metrics to Goals to Boost Maturity

    Proposed Time to Completion: 2-4 weeks

    Step 1.1: Setting Goals

    Start with an analyst kick-off call:

    • Determine current and target maturity for various security programs.
    • Develop SMART Goals.

    Then complete these activities…

    • CMMI Assessment

    Step 1.2 – 1.3: KPI Development

    Review findings with analyst:

    • Prioritize goals
    • Develop KPIs to track progress on goals
    • Track associated metrics

    Then complete these activities…

    • KPI Development

    With these tools & templates:

    • KPI Development Worksheet
    • Security Metrics Determination and Tracking Tool

    Phase 1 Results & Insights:

    • Basic Metrics program

    1.1 Review current state and set your goals

    120 minutes

    Let’s put the security program under the microscope.

    Before program improvement can take place, it is necessary to look at where things are at presently (in terms of maturity) and where we need to get them to.

    In other words, we need to perform a security program gap analysis.

    Info-Tech Best Practice

    The most thorough way of performing this gap analysis is by completing Info-Tech’s Build an Information Security Strategy blueprint, as it will provide you with a prioritized list of initiatives to boost your security program maturity.

    Completing an abbreviated gap analysis...

    • Security Areas
    • Network Security
    • Endpoint Security
    • Vulnerability Management
    • Identity Access Management
    • Incident Management
    • Training & Awareness
    • Compliance, Audit, & Review
    • Risk Management
    • Business Alignment & Governance
    • Data Security
    1. Using the CMMI scale on the next slide, assess your maturity level across the security areas to the left, giving your program a score from 1-5. Record your assessment on a whiteboard.
    2. Zone in on your areas of greatest concern and choose 3 to 5 areas to prioritize for improvement.
    3. Set a SMART goal for improvement, using the criteria on goals slides.

    Use the CMMI scale to contextualize your current maturity

    Use the Capability Maturity Model Integration (CMMI) scale below to help you understand your current level of maturity across the various areas of your security program.

    1. Initial
      • Incident can be managed. Outcomes are unpredictable due to lack of a standard operating procedure.
    2. Repeatable
      • Process in place, but not formally implemented or consistently applied. Outcomes improve but still lack predictability.
    3. Defined
      • Process is formalized and consistently applied. Outcomes become more predictable, due to consistent handling procedure.
    4. Managed
      • Process shows signs of maturity and can be tracked via metrics. Moving towards a predictive approach to incident management.
    5. Optimizing
      • Process reaches a fully reliable level, though improvements still possible. Regularity allows for process to be automated.

    (Adapted from the “CMMI Institute Maturity Model”)

    Base your goals around the five types of metrics

    Choose goals that make sense – even if they seem simple.

    The most effective metrics programs are personalized to reflect the goals of the security team and the business they work for. Using goals-based metrics allows you to make incremental improvements that can be measured and reported on, which makes program maturation a natural process.

    Info-Tech Best Practice

    Before setting a SMART goal, take a moment to consider your maturity for each security area, and which metric type you need to collect first, before moving to more ambitious goals.

    Security Areas

    • Network Security
    • Endpoint Security
    • Vulnerability Management
    • Identity Access Management
    • Incident Management
    • Training & Awareness
    • Compliance, Audit & Review
    • Risk Management
    • Business Alignment & Governance
    • Data Security
    Metric Type Description
    Initial Probe Determines what can be known (i.e. what sources for metrics exist?).
    Baseline Testing Establishes organization’s normal state based on current metrics.
    Implementation Focuses on setting up a series of related processes to increase organizational security (i.e. roll out MFA).
    Improvement Sets a target to be met and then maintained based on organizational risk tolerance.
    Organizational Trends Culls together several metrics to track (sometimes predict) how various trends affect the organization’s overall security. Usually focuses on large-scale issues (e.g. likelihood of a data breach).

    Set SMART goals for your security program

    Specific

    Measurable

    Achievable

    Realistic

    Timebound

    Now that you have determined which security areas you’d like to improve, decide on a goal that meets the SMART criteria.

    Examples of possible goals for various maturity levels:

    1. Perform initial probe to determine number of systems capable of providing metrics by the end of the week.
    2. Take baseline measurements each month for three months to determine organization’s baseline state.
    3. Implement a vulnerability management program to improve baseline state by the end of the quarter.
    4. Improve deployment of critical patches by applying 90% of them within the set window by the end of the year.
    5. Demonstrate how vulnerability management affects broad organizational trends at quarterly report to senior leadership.

    Compare the bolded text in these examples with the metric types on the previous slide

    Record and assess your goals in the Security Metrics Determination and Tracking Tool

    1.1 Security Metrics Determination and Tracking Tool

    Use tab “2. Identify Security Goals” to document and assess your goals.

    To increase visibility into the cost, effort, and value of any given goal, assess them using the following criteria:

    • Initial Cost
    • Ongoing Cost
    • Initial Staffing
    • Ongoing Staffing
    • Alignment w/Business
    • Benefit

    Use the calculated Cost/Effort Rating, Benefit Rating, and Difference Score later in this project to help with goal prioritization.

    Info-Tech Best Practice

    If you have already completed a security strategy with Info-Tech resources, this work may likely have already been done. Consult your Information Security Program Gap Analysis Tool from the Build an Information Security Strategy research.

    1.2 Develop KPIs and prioritize your goals

    There are two paths to success.

    At this time, it is necessary to evaluate the priorities of your security program.

    Option 1: Progress to KPI Development

    • If you would like practice developing KPIs for multiple goals to get used to the process, move to KPI development and then assess which goals you can pursue now based on resources available, saving the rest for later.

    Option 2: Progress to Prioritization of Goals

    • If you are already comfortable with KPI development and do not wish to create extras for later use, then prioritize your goals first and then develop KPIs for them.

    Phase 1 Schematic

    • Gap Analysis
    • Set SMART Goals (You are here.)
      • Develop KPIs
    • Prioritize Goals
    • Implement KPI & Monitor
    • Phase 2

    Develop a key performance indicator (KPI)

    Find out if you’re meeting your goals.

    Terms like “key performance indicator” may make this development practice seem more complicated than it really is. A KPI is just a single metric used to measure success towards a goal. In relational terms (i.e. as a percentage, ratio, etc.) to give it context (e.g. % of improvement over last quarter).

    KPI development is about answering the question: what would indicate that I have achieved my goal?

    To develop a KPI follow these steps:

    1. Review the case study on the following slides to get a sense of how KPIs can start simple and general and get more specific and complex over time.
    2. Using the example to the right, sort your SMART goals from step 1.1 into the various metric types, then determine what success would look like for you. What outcome are you trying to achieve? How will you know when you’ve achieved it?
    3. Fill out the KPI Development Worksheets to create sample KPIs for each of the SMART goals you have created. Ensure that you complete the accompanying KPI Checklist.

    KPIs differ from goal to goal, but their forms follow certain trends

    Metric Type KPI Form
    Initial Probe Progress of probe (e.g. % of systems checked to see if they can supply metrics).
    Baseline Testing What current data shows (e.g. % of systems needing attention).
    Implementation Progress of the implementation (e.g. % of complete vulnerability management program implementation).
    Improvement The threshold or target to be achieved and maintained (e.g. % of incidents responded to within target window).
    Organizational Trends The interplay of several KPIs and how they affect the organization’s risk posture (e.g. assessing the likelihood for a data breach).

    Explore the five metric types

    1. Initial Probe

    Focused on determining how many sources for metrics exist.

    • Question: What am I capable of knowing?
    • Goal: To determine what level of insight we have into our security processes.
    • Possible KPI: % of systems for which metrics are available.
    • Decision: Do we have sufficient resources available to collect metrics?

    2. Baseline Testing

    Focused on gaining initial insights about the state of your security program (what are the measurements?).

    • Question: Does this data suggest areas for improvement?
    • Goal: To create a roadmap for improvement.
    • Possible KPI: % of systems that provide useful metrics to measure improvement.
    • Decision: Is it necessary to acquire tools to increase, enhance, or streamline the metrics-gathering process?

    Info-Tech Insight

    Don't lose hope if you lack resources to move beyond these initial steps. Even if you are struggling to pull data, you can still draw meaningful metrics. The percent or ratio of processes or systems you lack insight into can be very valuable, as it provides a basis to initiate a risk-based discussion with management about the organization's security blind spots.

    Explore the five metric types (cont’d)

    3. Program Implementation

    Focused on developing a basic program to establish basic maturity (e.g. implement an awareness and training program).

    • Question: What needs to be implemented to establish basic maturity?
    • Goal: To begin closing the gap between current and desired maturity.
    • Possible KPI: % of implementation completed.
    • Decision: Have we achieved a formalized and repeatable process?

    4. Improvement

    Focused on attaining operational targets to lower organizational risk.

    • Question: What other related activities could help to support this goal (e.g. regular training sessions)?
    • Goal: To have metrics operate above or below a certain threshold (e.g. lower phishing-test click rate to an average of 10% across the organization)
    • Possible KPI: Phishing click rate %
    • Decision: What other metrics should be tracked to provide insight into KPI fluctuations?

    Info-Tech Insight

    Don't overthink your KPI. In many cases it will simply be your goal rephrased to express a percentage or ratio. In others, like the example above, it makes sense for them to be identical.

    5. Organizational Impact

    Focused on studying several related KPIs (Key Performance Index, or KPX) in an attempt to predict risks.

    • Question: What risks does the organization need to address?
    • Goal: To provide high-level summaries of several metrics that suggest emerging or declining risks.
    • Possible KPI: Likelihood of a given risk (based on the trends of the KPX).
    • Decision: Accept the risk, transfer the risk, mitigate the risk?

    Case study: Healthcare example

    Let’s take a look at KPI development in action.

    Meet Maria, the new CISO at a large hospital that desperately needs security program improvements. Maria’s first move was to learn the true state of the organization’s security. She quickly learned that there was no metrics program in place and that her staff were unaware what, if any, sources were available to pull security metrics from.

    After completing her initial probe into available metrics and then investigating the baseline readings, she determined that her areas of greatest concern were around vulnerability and access management. But she also decided it was time to get a security training and awareness program up and running to help mitigate risks in other areas she can’t deal with right away.

    See examples of Maria’s KPI development on the next four slides...

    Info-Tech Insight

    There is very little variation in the kinds of goals people have around initial probes and baseline testing. Metrics in these areas are virtually always about determining what data sources are available to you and what that data actually shows. The real decisions start in determining what you want to do based on the measures you’re seeing.

    Metric development example: Vulnerability Management

    See examples of Maria’s KPI development on the next four slides...

    Implementation

    Goal: Implement vulnerability management program

    KPI: % increase of insight into existing vulnerabilities

    Associated Metric: # of vulnerability detection methods

    Improvement

    Goal: Improve deployment time for patches

    KPI: % of critical patches fully deployed within target window

    • Associated Metric 1: # of critical vulnerabilities not patched
    • Associated Metric 2: # of patches delayed due to lack of staff
    • Associated Metric X

    Metric development example: Identity Access Management

    Implementation

    Goal: Implement MFA for privileged accounts

    KPI: % of privileged accounts with MFA applied

    Associated Metric: # of privileged accounts

    Improvement

    Goal: Remove all unnecessary privileged accounts

    KPI: % of accounts with unnecessary privileges

    • Associated Metric 1: # of privileged accounts
    • Associated Metric 2: # of necessary privileged accounts
    • Associated Metric X

    Metric development example: Training and Awareness

    Implementation

    Goal: Implement training and awareness program

    KPI: % of organization trained

    Associated Metric: # of departments trained

    Improvement

    Goal: Improve time to report phishing

    KPI: % of phishing cases reported within target window

    • Associated Metric 1: # of phishing tests
    • Associated Metric 2: # of training sessions
    • Associated Metric X

    Metric development example: Key Performance Index

    Organizational Trends

    Goal: Predict Data Breach Likelihood

    • KPX 1: Insider Threat Potential
      • % of phishing cases reported within target window
        • Associated Metrics:
          • # of phishing tests
          • # of training sessions
      • % of critical patches fully deployed within target window
        • Associated Metrics:
          • # of critical vulnerabilities not patched
          • # of patches delayed due to lack of staff
      • % of accounts with unnecessary privileges
        • Associated Metrics:
          • # of privileged accounts
          • # of necessary privileged accounts
    • KPX 2: Data Leakage Issues
      • % of incidents related to unsecured databases
        • Associated Metrics:
          • # of unsecured databases
          • # of business-critical databases
      • % of misclassified data
        • Associated Metrics:
          • # of misclassified data reports
          • # of DLP false positives
      • % of incidents involving data-handling procedure violations.
        • Associated Metrics:
          • # of data processes with SOP
          • # of data processes without SOP
    • KPX 3: Endpoint Vulnerability Issues
      • % of unpatched critical systems
        • Associated Metrics:
          • # of unpatched systems
          • # of missed patches
      • % of incidents related to IoT
        • Associated Metrics:
          • # of IoT devices
          • # of IoT unsecure devices
      • % of incidents related to BYOD
        • Associated Metrics:
          • # of end users doing BYOD
          • # of BYOD incidents

    Develop Goals-Based KPIs

    1.2 120 minutes

    Materials

    • Info-Tech KPI Development Worksheets

    Participants

    • Security Team

    Output

    • List of KPIs for immediate and future use (can be used to populate Info-Tech’s KPI Development Tool).

    It’s your turn.

    Follow the example of the CISO in the previous slides and try developing KPIs for the SMART goals set in step 1.1.

    • To begin, decide if you are starting with implementation or improvement metrics.
    • Enter your goal in the space provided on the left-hand side and work towards the right, assigning a KPI to track progress towards your goal.
    • Use the associated metrics boxes to record what raw data will inform or influence your KPI.
      • Associated metrics are connected to the KPI box with a segmented line. This is because these associated metrics are not absolutely necessary to track progress towards your goal.
      • However, if a KPI starts trending in the wrong direction, these associated metrics would be used to determine where the problem has occurred.
    • If desired, bundle together several related KPIs to create a key performance index (KPX), which is used to forecast the likelihood of certain risks that would have a major business impact (e.g. potential for insider threat, or risk for a data breach).

    Record KPIs and assign them to goals in the Security Metrics Determination and Tracking Tool

    1.2 Security Metrics Determination and Tracking Tool

    Document KPI metadata in the tool and optionally assign them to a goal.

    Tab “3. Identify Goal KPIs” allows you to record each KPI and its accompanying metadata:

    • Source
    • Owner
    • Audience
    • KPI Target
    • Effort to Collect
    • Frequency of Collection
    • Comments

    Optionally, each KPI can be mapped to goals defined on tab “2. Identify Security Goals.”

    Info-Tech Best Practice

    Ensure your metadata is comprehensive, complete, and realistic. A different employee should be able to use only the information outlined in the metadata to continue collecting measurements for the program.

    Complete Info-Tech’s KPI Development Worksheets

    1.2 KPI Development Worksheet

    Use these worksheets to model the maturation of your metrics program.

    Follow the examples contained in this slide deck and practice creating KPIs for:

    • Implementation metrics
    • Improvement metrics
    • Organizational trends metrics

    As well as drafting associated metrics to inform the KPIs you create.

    Info-Tech Best Practice

    Keep your metrics program manageable. This exercise may produce more goals, metrics, and KPIs than you deal with all at once. But that doesn’t mean you can’t save some for future use.

    Build an effort map to prioritize your SMART goals

    1.2 120 minutes

    Materials

    • Whiteboard
    • Sticky notes
    • Laptop

    Participants

    • Security team
    • Other stakeholders

    Output

    • Prioritized list of SMART goals

    An effort map visualizes a cost and benefit analysis. It is a quadrant output that visually shows how your SMART goals were assessed. Use the calculated Cost/Effort Rating and Benefit Rating values from tab “2. Identify Security Goals” of the Security Metrics Determination and Tracking Tool to aid this exercise.

    Steps:

    1. Establish the axes and colors for your effort map:
      1. X-axis (horizontal) - Security benefit
      2. Y-axis (vertical) - Overall cost/effort
      3. Sticky color - Business alignment
    2. Create sticky notes for each SMART goal and place them onto the effort map based on your determined axes.
      • Goal # Example Security Goal - Benefit (1-12) - Cost (1-12)

    The image shows a matric with four quadrants. The X-axis is labelled Low Benefit on the left side and High benefit on the right side. The Y-axis is labelled Low cost at the top and High cost at the bottom. The top left quadrant is labelled Could Dos, the top right quadrant is labelled Must Dos, the lower left quadrant is labelled May Not Dos, and the lower right quadrant is Should Dos. On the right, there are three post-it style notes, the blue one labelled High Alignment, the yellow labelled Medium Alignment, and the pink labelled Low Alignment.

    1.3 Implement and monitor the KPI to track goal progress

    Let’s put your KPI into action!

    Now that you’ve developed KPIs to monitor progress on your goals, it’s time to use them to drive security program maturation by following these steps:

    1. Review the KPI Development Worksheets (completed in step 1.2) for your prioritized list of goals. Be sure that you are able to track all of the associated metrics you have identified.
    2. Track the KPI and associated metrics using Info-Tech’s KPI Development Tool (see following slide).
    3. Update the data as necessary according to your SMART criteria of your goal.

    A Word on Key Risk Indicators...

    The term key risk indicator (KRI) gets used in a few different ways. However, in most cases, KRIs are closely associated with KPIs.

    1. KPIs and KRIs are the same thing
      • A KPI, at its core, is really a measure of risk. Sometimes it is more effective to emphasize that risk rather than performance (i.e. the data shows you’re not meeting your goal).
    2. KRI is KPI going the wrong way
      • After achieving the desired threshold for an improvement goal, our new goal is usually to maintain such a state. When this balance is upset, it indicates that settled risk has once again become active.
    3. KRI as a predictor of emerging risks
      • When organizations reach a highly mature state, they often start assessing how events external to the organization can affect the optimal performance of the organization. They monitor such events or trends and try to predict when the organization is likely to face additional risks.

    Track KPIs in the Security Metrics Determination and Tracking Tool

    1.3 Security Metrics Determination and Tracking Tool

    Once a metric has been measured, you have the option of entering that data into tab “4. Track Metrics” of the Tool.

    Tracking metric data in Info-Tech's tool provides the following data visualizations:

    • Sparklines at the end of each row (on tab “4. Track Metrics”) for a quick sense of metric performance.
    • A metrics dashboard (on tab “5. Graphs”) with three graph options in two color variations for each metric tracked in the tool, and an overall metric program health gauge.

    Info-Tech Best Practice

    Be diligent about measuring and tracking your metrics. Record any potential measurement biases or comments on measurement values to ensure you have a comprehensive record for future use. In the tool, this can be done by adding a comment to a cell with a metric measurement.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    Workshops offer an easy way to accelerate your project. While onsite, our analysts will work with you and your team to facilitate the activities outlined in the blueprint.

    Getting key stakeholders together to formalize the program, while getting started on data discovery and classification, allows you to kickstart the overall program.

    In addition, leverage over-the-phone support through Guided Implementations included in advisory memberships to ensure the continuous improvement of the classification program even after the workshop.

    Logan Rohde

    Research Analyst – Security, Risk & Compliance Info-Tech Research Group

    Ian Mulholland

    Senior Research Analyst – Security, Risk & Compliance Info-Tech Research Group

    Call 1-888-670-8889 for more information.

    Phase 2

    Adapt Your Reporting Strategy for Various Metric Types


    Phase 2

    2.1 Review best practices for presenting metrics

    2.2 Strategize your presentation based on metric type

    2.3 Tailor your presentation to your audience

    2.4 Use your metrics to create a story about risk

    2.5 Revise Metrics

    This phase will walk you through the following activities:

    • Develop reporting strategy
    • Use metrics to create a story about risk
    • Metrics revision

    This phase involves the following participants:

    • Security Team

    Outcomes of this phase

    • Metrics Dashboard
    • Metrics Presentation Deck

    Phase 2 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of two to three advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Adapt Your Reporting Strategy for Various Metric Types

    Proposed Time to Completion: 2-4 weeks

    Step 2.1 – 2.3: Best Practices and Reporting Strategy

    Start with an analyst kick-off call:

    • Do’s and Don’ts of reporting metrics.
    • Strategize presentation based on metric type.

    Then complete these activities…

    • Strategy development for 3-5 metrics

    Step 2.4 – 2.5: Build a Dashboard and Presentation Deck

    Review findings with analyst:

    • Review strategies for reporting.
    • Compile a Key Performance Index.
    • Revise metrics.

    Then complete these activities…

    • Dashboard creation
    • Presentation development

    With these tools & templates:

    • Security Metrics Determination and Tracking Tool Template
    • Security Metrics KPX Dashboard Tool

    Phase 2 Results & Insights:

    • Completed reporting strategy with presentable dashboard

    2.1 Review best practices for presenting metrics

    Avoid technical details (i.e. raw data) by focusing on the KPI.

    • KPIs add context to understand the behavior and associated risks.

    Put things in terms of risk; it's the language you both understand.

    • This usually means explaining what will happen if not addressed and what you recommend.
    • There are always three options:
      • Address it completely
      • Address it partially
      • Do not address it (i.e. accept the risk)

    Explain why you’re monitoring metrics in terms of the goals you’re hoping to achieve.

    • This sets you up well to explain what you've been doing and why it's important for you to meet your goals.

    Choose between KPI or KRI as the presentation format.

    • Base your decision on whether you are trying to emphasize current success or risk.

    Match presentation with the audience.

    • Board presentations will be short; middle-management ones may be a bit longer.
    • Maximize your results by focusing on the minimum possible information to make sure you sufficiently get your point across.
    • With the board, plan on showing no more than three slides.

    Read between the lines.

    • It can be difficult to get time with the board, so you may find yourself in a trial and error position, so pay attention to cues or suggestions that indicate the board is interested in something.
    • If you can, make an ally to get the inside scoop on what the board cares about.

    Read the news if you’re stuck for content.

    • Board members are likely to have awareness (and interest) in large-scale risks like data breaches and ransomware.

    Present your metrics as a story.

    • Summarize how the security program looks to you and why the metrics lead you to see it this way.

    2.2 Strategize your presentation based on metric type (1 of 5)

    Metric Type: Initial Probe

    Scenario: Implementing your first metrics program.

    • All metrics programs start with determining what measurements you are capable of taking.

    Decisions: Do you have sufficient insight into the program? (i.e. do you need to acquire additional tools to collect metrics?)

    Strategy: If there are no barriers to this (e.g. budget), then focus your presentation on the fact that you are addressing the risk of not knowing what your organization's baseline state is and what potential issues exist but are unknown. This is likely the first phase of an improvement plan, so sketching the overall plan is a good idea too.

    • If budget is an issue, explain the risks associated with not knowing and what you would need to make it happen.

    Possible KPIs:

    • % of project complete.
    • % of systems that provide worthwhile metrics.

    Strategize your presentation based on metric type (2 of 5)

    Metric Type: Baseline Testing

    Scenario: You've taken the metrics to determine what your organization’s normal state is and you're now looking towards addressing your gaps or problem areas.

    Decisions: What needs to be prioritized first and why? Are additional resources required to make this happen?

    Strategy: Explain your impression of the organization's normal state and what you plan to do about it. In other words, what goals are you prioritizing and why? Be sure to note any challenges that may occur along the way (e.g. staffing).

    • If the board doesn't like to open their pocketbook, your best play is to explain what stands to happen (or is happening) if risks are not addressed.

    Possible KPIs:

    • % of goals complete.
    • % of metrics indicating urgent attention needed.

    Strategize your presentation based on metric type (3 of 5)

    Metric Type: Implementation

    Scenario: You are now implementing solutions to address your security priorities.

    Decisions: What, to you, would establish the basis of a program?

    Strategy: Focus on what you're doing to implement a certain security need, why, and what still needs to be done when you’re finished.

    • Example: To establish a training and awareness program, a good first step is to actually hold training sessions with each department. A single lecture is simple but something to build from. A good next step would be to hold regular training sessions or implement monthly phishing tests.

    Possible KPIs:

    • % of implementation complete (e.g. % of departments trained).

    Strategize your presentation based on metric type (4 of 5)

    Metric Type: Improvement

    Scenario: Now that a basic program has been established, you are looking to develop its maturity to boost overall performance (i.e. setting a new development goal).

    Decisions: What is a reasonable target, given the organization's risk tolerance and current state?

    Strategy: Explain that you're now working to tighten up the security program. Note that although things are improving, risk will always remain, so we need to keep it within a threshold that’s proportionate with our risk tolerance.

    • Example: Lower phishing-test click rate to 10% or less. Phishing will always be a risk, and just one slip up can have a huge effect on business (i.e. lost money).

    Possible KPIs:

    • % of staff passing the phishing test.
    • % of employees reporting phishing attempts within time window.

    Strategize your presentation based on metric type (5 of 5)

    Metric Type: Organizational Trends

    Scenario: You've reached a mature state and now how several KPIs being tracked. You begin to look at several KPIs together (i.e. a KPX) to assess the organization's exposure for certain broad risk trends.

    Decisions: Which KPIs can be used together to look at broader risks?

    Strategy: Focus on the overall likelihood of a certain risk and why you've chosen to assess it with your chosen KPIs. Spend some time discussing what factors affect the movement of these KPIs, demonstrating how smaller behaviors create a ripple effect that affects the organization’s exposure to large-scale risks.

    Possible KPX: Insider Threat Risk

    • % of phishing test failures.
    • % of critical patches missed.
    • % of accounts with unnecessary privileges.

    Change your strategy to address security challenges

    Even challenges can elicit useful metrics.

    Not every security program is capable of progressing smoothly through the various metric types. In some cases, it is impossible to move towards goals and metrics for implementation, improvement, or organizational trends because the security program lacks resources.

    Info-Tech Insight

    When your business is suffering from a lack of resources, acquiring these resources automatically becomes the goal that your metrics should be addressing. To do this, focus on what risks are being created because something is missing.

    When your security program is lacking a critical resource, such as staff or technology, your metrics should focus on what security processes are suffering due to this lack. In other words, what critical activities are not getting done?

    KPI Examples:

    • % of critical patches not deployed due to lack of staff.
    • % of budget shortfall to acquire vulnerability scanner.
    • % of systems with unknown risk due to lack of vulnerability scanner.

    2.3 Tailor presentation to your audience

    Metrics come in three forms...

    1. Raw Data

    • Taken from logs or reports, provides values but not context.
    • Useful for those with technical understanding of the organization’s security program.

    2. Management-Level

    • Raw data that has been contextualized and indicates performance of something (i.e. a KPI).
    • Useful for those with familiarity with the overall state of the security program but do not have a hands-on role.

    3. Board-Level

    • KPI with additional context indicating overall effect on the organization.
    • Useful for those removed from the security program but who need to understand the relationship between security, business goals, and cyber risk.

    For a metric to be useful it must...

    1. Be understood by the audience it’s being presented to.
      • Using the criteria on the left, choose which metric form is most appropriate.
    2. Indicate whether or not a certain target or goal is being met.
      • Don’t expect metrics to speak for themselves; explain what the indications and implications are.
    3. Drive some kind of behavioral or strategic change if that target or goal is not being met.
      • Metrics should either affirm that things are where you want them to be or compel you to take action to make an improvement. If not, it is not a worthwhile metric.

    As a general rule, security metrics should become decreasingly technical and increasingly behavior-based as they are presented up the organizational hierarchy.

    "The higher you travel up the corporate chain, the more challenging it becomes to create meaningful security metrics. Security metrics are intimately tied to their underlying technologies, but the last thing the CEO cares about is technical details." – Ben Rothke, Senior Information Security Specialist, Tapad.

    Plan for reporting success

    The future of your security program may depend on this presentation; make it count.

    Reporting metrics is not just another presentation. Rather, it is an opportunity to demonstrate and explain the value of security.

    It is also a chance to correct any misconceptions about what security does or how it works.

    Use the tips on the right to help make your presentation as relatable as possible.

    Info-Tech Insight

    There is a difference between data manipulation and strategic presentation: the goal is not to bend the truth, but to present it in a way that allows you to show the board what they need to see and to explain it in terms familiar to them.

    General Tips for a Successful Presentation

    Avoid jargon; speak in practical terms

    • The board won’t receive your message if they can’t understand you.
    • Explain things as simply as you can; they only need to know enough to make decisions about addressing cyber risk.

    Address compliance

    • Boards are often interested in compliance, so be prepared to talk about it, but clarify that it doesn't equal security.
    • Instead, use compliance as a bridge to discussing areas of the security program that need attention.

    Have solid answers

    • Try to avoid answering questions with the answer, “It depends.”
      • Depends on what?
      • Why?
      • What do you recommend?
    • The board is relying on you for guidance, so be prepared to clarify what the board is asking (you may have to read between the lines to do this).
    • Also address the pain points of board members and have answers to their questions about how to resolve them.

    2.4 Use your metrics to create a story about risk

    Become the narrator of your organization’s security program.

    Security is about managing risk. This is also its primary value to the organization. As such, risk should be the theme of the story you tell.

    "Build a cohesive story that people can understand . . . Raw metrics are valuable from an operations standpoint, but at the executive level, it's about a cohesive story that helps executives understand the value of the security program and keeps the company moving forward. "– Adam Ely, CSO and Co-Founder, Bluebox Security, qtd. by Tenable, 2016

    How to Develop Your Own Story...

    1. Review your security program goals and the metrics you’re using to track progress towards them. Then, decide which metrics best tell this story (i.e. what you’re doing and why).
      • Less is more when presenting metrics, so be realistic about how much your audience can digest in one sitting.
      • Three metrics is usually a safe number; choose the ones that are most representative of your goals.
    2. Explain why you chose the goals you did (i.e. what risks were you addressing?). Then, make an honest assessment of how the security program is doing as far as meeting those goals:
      • What’s going well?
      • What still needs improvement?
      • What about your metrics suggests this?
    3. Address how risks have changed and explain your new recommended course of action.
      • What risks were present when you started?
      • What risks remain despite your progress?
      • How do these risks affect the business operation and what can security do to help?

    Story arc for security metrics

    The following model encapsulates the basic trajectory of all story development.

    Use this model to help you put together your story about risk.

    Introduction: Overall assessment of security program.

    Initial Incident: Determination of the problems and associated risks.

    Rising Action: Creation of goals and metrics to measure progress.

    Climax: Major development indicated by metrics.

    Falling Action: New insights gained about organization’s risks.

    Resolution: Recommendations based on observations.

    Info-Tech Best Practice

    Follow this model to ensure that your metrics presentation follows a coherent storyline that explains how you assessed the problem, why you chose to address it the way you did, what you learned in doing so, and finally what should be done next to boost the security program’s maturity.

    Use a nesting-doll approach when presenting metrics

    Move from high-level to low-level to support your claims

    1. Avoid the temptation to emphasize technical details when presenting metrics. The importance of a metric should be clear from just its name.
    2. This does not mean that technical details should be disregarded entirely. Your digestible, high-level metrics should be a snapshot of what’s taking place on the security ground floor.
    3. With this in mind, we should think of our metrics like a nesting doll, with each metrics level being supported by the one beneath it.

    ...How do you know that?

    Board-Level KPI

    Mgmt.-Level KPI

    Raw Data

    Think of your lower-level metrics as evidence to back up the story you are telling.

    When you’re asked how you arrived at a given conclusion, you know it’s time to go down a level and to explain those results.

    Think of this like showing your work.

    Info-Tech Insight

    This approach is built into the KPX reporting format, but can be used for all metric types by drawing from your associated metrics and goals already achieved.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics Determination and Tracking Tool

    Choose the dashboard tool that makes the most sense for you.

    Info-Tech provides two options for metric dashboards to meet the varying needs of our members.

    If you’re just starting out, you’ll likely be inclined towards the dashboard within the Security Metrics Determination and Tracking Tool (seen here).

    The image shows a screenshot of the Security Metrics Determination and Tracking Tool.

    But if you’ve already got several KPIs to report on, you may prefer the Security Metrics KPX Dashboard Tool, featured on the following slides.

    Info-Tech Best Practice

    Not all graphs will be needed in all cases. When presenting, consider taking screenshots of the most relevant data and displaying them in Info-Tech’s Board-Level Security Metrics Presentation Template.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image shows a screenshot of the Definitions section of the Security Metrics KPX Dashboard

    1. Start by customizing the definitions on tab 1 to match your organization’s understanding of high, medium, and low risk across the three impact areas (functional, informational, and recoverability).
    2. Next, enter up to 5 business goals that your security program supports.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image shows a screenshot of tab 2 of the Security Metrics KPX Dashboard.

    1. On tab 2, enter the large-scale risk you are tracking
    2. Proceed by naming each of your KPXs after three broad risks that – to you – contribute to the large-scale risk.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image is the same screenshot from the previous section, of tab 2 of the Security Metrics KPX Dashboard.

    1. Then, add up to five KPIs aimed at managing more granular risks that contribute to the broad risk.
    2. Assess the frequency and impact associated with these more granular risks to determine how likely it is to contribute to the broad risk the KPX is tracking.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image is the same screenshot of tab 2 of the Security Metrics KPX Dashboard.

    1. Repeat as necessary for the other KPXs on tab 2.
    2. Repeat steps 3-7 for up to two more large-scale risks and associated KPXs on tabs 3 and 4.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image shows a chart titled Business Alignment, with sample Business Goals and KPXs filled in.

    1. If desired, complete the Business Alignment evaluation (located to the right of KPX 2 on tabs 2-4) to demonstrate how well security is supporting business goals.

    "An important key to remember is to be consistent and stick to one framework once you've chosen it. As you meet with the same audiences repeatedly, having the same framework for reference will ensure that your communications become smoother over time." – Caroline Wong, Chief Strategy Officer, Cobalt.io

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image shows a screenshot of the dashboard on tab 5 of the Security Metrics KPX Dashboard.

    1. Use the dashboard on tab 5 to help you present your security metrics to senior leadership.

    Use one of Info-Tech’s dashboards to present your metrics

    2.4 Security Metrics KPX Dashboard

    Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

    The image shows the same screenshot of Tab 2 of the Security Metrics KPX Dashboard that was shown in previous sections.

    Best Practice:

    This tool helps you convert your KPIs into the language of risk by assessing frequency and severity, which helps to make the risk relatable for senior leadership. However, it is still useful to track fluctuations in terms of percentage. To do this, track changes in the frequency, severity, and trend scores from quarter to quarter.

    Customize Info-Tech’s Security Metrics Presentation Template

    2.4 Board-Level Security Metrics Presentation Template

    Use the Board-Level Security Metrics Presentation Template deck to help structure and deliver your metrics presentation to the board.

    To make the dashboard slide, simply copy and paste the charts from the dashboard tool and arrange the images as needed.

    Adapt the status report and business alignment slides to reflect the story about risk that you are telling.

    2.5 Revise your metrics

    What's next?

    Now that you’ve made it through your metrics presentation, it’s important to reassess your goals with feedback from your audience in mind. Use the following workflow.

    The image shows a flowchart titled Metrics-Revision Workflow. The flowchart begins with the question Have you completed your goal? and then works through multiple potential answers.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    Workshops offer an easy way to accelerate your project. While onsite, our analysts will work with you and your team to facilitate the activities outlined in the blueprint.

    Getting key stakeholders together to formalize the program, while getting started on data discovery and classification, allows you to kickstart the overall program.

    In addition, leverage over-the-phone support through Guided Implementations included in advisory memberships to ensure the continuous improvement of the classification program even after the workshop.

    Logan Rohde

    Research Analyst – Security, Risk & Compliance Info-Tech Research Group

    Ian Mulholland

    Senior Research Analyst – Security, Risk & Compliance Info-Tech Research Group

    Call 1-888-670-8889 for more information.

    Insight breakdown

    Metrics lead to maturity, not vice versa.

    • Tracking metrics helps you assess progress and regress in your security program, which helps you quantify the maturity gains you’ve made.

    Don't lose hope if you lack resources to move beyond baseline testing.

    • Even if you are struggling to pull data, you can still draw meaningful metrics. The percent or ratio of processes or systems you lack insight into can be very valuable, as it provides a basis to initiate a risk-based discussion with management about the organization's security blind spots.

    The best metrics are tied to goals.

    • Tying your metrics to goals ensures that you are collecting metrics for a specific purpose rather than just to watch the numbers change.

    Summary of accomplishment

    Knowledge Gained

    • Current maturity assessment of security areas
    • Setting SMART goals
    • Metric types
    • KPI development
    • Goals prioritization
    • Reporting and revision strategies

    Processes Optimized

    • Metrics development
    • Metrics collection
    • Metrics reporting

    Deliverables Completed

    • KPI Development Worksheet
    • Security Metrics Determination and Tracking Tool
    • Security Metrics KPX Dashboard Tool
    • Board-Level Security Metrics Presentation Template

    Research contributors and experts

    Mike Creaney, Senior Security Engineer at Federal Home Loan Bank of Chicago

    Peter Chestna, Director, Enterprise Head of Application Security at BMO Financial Group

    Zane Lackey, Co-Founder / Chief Security Officer at Signal Sciences

    Ben Rothke, Senior Information Security Specialist at Tapad

    Caroline Wong, Chief Strategy Officer at Cobalt.io

    2 anonymous contributors

    Related Info-Tech research

    Build an Information Security Strategy

    Tailor best practices to effectively manage information security.

    Implement a Security Governance and Management Program

    Align security and business objectives to get the greatest benefit from both.

    Bibliography

    Capability Maturity Model Integration (CMMI). ISACA. Carnegie Mellon University.

    Ely, Adam. “Choose Security Metrics That Tell a Story.” Using Security Metrics to Drive Action: 33 Experts Share How to Communicate Security Program Effectiveness to Business Executives and the Board Eds. 2016. Web.

    https://www.ciosummits.com/Online_Assets_Tenable_eBook-_Using_Security_Metrics_to_Drive_Action.pdf

    ISACA. “Board Director Concerns about Cyber and Technology Risk.” CSX. 11 Sep. 2018. Web.

    Rothke, Ben. “CEOs Require Security Metrics with a High-Level Focus.” Using Security Metrics to Drive Action: 33 Experts Share How to Communicate Security Program Effectiveness to Business Executives and the Board Eds. 2016. Web.

    https://www.ciosummits.com/Online_Assets_Tenable_eBook-_Using_Security_Metrics_to_Drive_Action.pdf

    Wong, Caroline. Security Metrics: A Beginner’s Guide. McGraw Hill: New York, 2012.

    Skills Development on the Mainframe Platform

    • Buy Link or Shortcode: {j2store}336|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Strategy and Organizational Design
    • Parent Category Link: /strategy-and-organizational-design

    Mainframes remain a critical part of an organization’s infrastructure and will need to support these platforms for the foreseeable future. Despite the importance, it can be a challenge for organizations to find qualified resources to support them. Meanwhile, companies are unsure of where to find help to train and develop their teams on mainframe technologies and are at risk of a skills gap within their teams.

    Our Advice

    Critical Insight

    • Mainframes continue to have wide usage, particularly in enterprise organizations. The complexity of moving or replatforming many of these applications means these platforms will be around for a long time still.
    • Companies need to be proactive about developing their teams to support their mainframe systems.

    Impact and Result

    • Companies can protect their assets by cultivating a pipeline of qualified resources to support their mainframe infrastructure.
    • There is a robust training ecosystem headed by large, reputable organizations to help develop and support companies' resources. You don’t have to do it alone.

    Skills Development on the Mainframe Platform Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Skills Development on the Mainframe Platform Storyboard – An overview of the solutions available to support your mainframe training and skills development needs.

    Your mainframes are not going to disappear overnight. These systems often support the most critical operations in your organization. You need to ensure you have the right qualified resources to support your platforms.

    • Skills Development on the Mainframe Platform Storyboard
    [infographic]

    Build a Strategic IT Workforce Plan

    • Buy Link or Shortcode: {j2store}390|cart{/j2store}
    • member rating overall impact: 9.6/10 Overall Impact
    • member rating average dollars saved: $180,171 Average $ Saved
    • member rating average days saved: 19 Average Days Saved
    • Parent Category Name: Organizational Design
    • Parent Category Link: /organizational-design
    • Talent has become a competitive differentiator. To 46% of business leaders, workforce planning is a top priority – yet only 13% do it effectively.
    • CIOs aren’t sure what they need to give the organization a competitive edge or how current staffing line-ups fall short.

    Our Advice

    Critical Insight

    • A well defined strategic workforce plan (SWP) isn’t just a nice-to-have, it’s a must-have.
    • Integrate as much data as possible into your workforce plan to best prepare you for the future. Without knowledge of your future initiatives, you are filling hypothetical holes.
    • To be successful, you need to understand your strategic initiatives, workforce landscape, and external and internal trends.

    Impact and Result

    The workforce planning process does not need to be onerous, especially with help from Info-Tech’s solid planning tools. With the right people involved and enough time invested, developing an SWP will be easier than first thought and time well spent. Leverage Info-Tech’s client-tested 5-step process to build a strategic workforce plan:

    1. Build a project charter
    2. Assess workforce competency needs
    3. Identify impact of internal and external trends
    4. Identify the impact of strategic initiatives on roles
    5. Build and monitor the workforce plan

    Build a Strategic IT Workforce Plan Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should build a strategic workforce plan for IT, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Initiate the project

    Assess the value of a strategic workforce plan and the IT department’s fit for developing one, and then structure the workforce planning project.

    • Build a Strategic Workforce Plan – Phase 1: Initiate the Project
    • IT Strategic Workforce Planning Project Charter Template
    • IT Strategic Workforce Planning Project Plan Template

    2. Analyze workforce needs

    Gather and analyze workforce needs based on an understanding of the relevant internal and external trends, and then produce a prioritized plan of action.

    • Build a Strategic Workforce Plan – Phase 2: Analyze Workforce Needs
    • Workforce Planning Workbook

    3. Build the workforce plan

    Evaluate workforce priorities, plan specific projects to address them, and formalize and integrate strategic workforce planning into regular planning processes.

    • Build a Strategic Workforce Plan – Phase 3: Build and Monitor the SWP
    [infographic]

    Workshop: Build a Strategic IT Workforce Plan

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Project Goals, Metrics, and Current State

    The Purpose

    Develop a shared understanding of the challenges your organization is facing with regards to talent and workforce planning.

    Key Benefits Achieved

    An informed understanding of whether or not you need to develop a strategic workforce plan for IT.

    Activities

    1.1 Identify goals, metrics, and opportunities

    1.2 Segment current roles

    1.3 Identify organizational culture

    1.4 Assign job competencies

    1.5 Assess current talent

    Outputs

    Identified goals, metrics, and opportunities

    Documented organizational culture

    Aligned competencies to roles

    Identified current talent competency levels

    2 Assess Workforce and Analyze Trends

    The Purpose

    Perform an in-depth analysis of how internal and external trends are impacting the workforce.

    Key Benefits Achieved

    An enhanced understanding of the current talent occupying the workforce.

    Activities

    2.1 Assess environmental trends

    2.2 Identify impact on workforce requirements

    2.3 Identify how trends are impacting critical roles

    2.4 Explore viable options

    Outputs

    Complete internal trends analysis

    Complete external trends analysis

    Identified internal and external trends on specific IT roles

    3 Perform Gap Analysis

    The Purpose

    Identify the changing competencies and workforce needs of the future IT organization, including shortages and surpluses.

    Key Benefits Achieved

    Determined impact of strategic initiatives on workforce needs.

    Identification of roles required in the future organization, including surpluses and shortages.

    Identified projects to fill workforce gaps.

    Activities

    3.1 Identify strategic initiatives

    3.2 Identify impact of strategic initiatives on roles

    3.3 Determine workforce estimates

    3.4 Determine projects to address gaps

    Outputs

    Identified workforce estimates for the future

    List of potential projects to address workforce gaps

    4 Prioritize and Plan

    The Purpose

    Prepare an action plan to address the critical gaps identified.

    Key Benefits Achieved

    A prioritized plan of action that will fill gaps and secure better workforce outcomes for the organization.

    Activities

    4.1 Determine and prioritize action items

    4.2 Determine a schedule for review of initiatives

    4.3 Integrate workforce planning into regular planning processes

    Outputs

    Prioritized list of projects

    Completed workforce plan

    Identified opportunities for integration

    Adding the Right Value: Building Cloud Brokerages That Enable

    • Buy Link or Shortcode: {j2store}110|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Strategy and Organizational Design
    • Parent Category Link: /strategy-and-organizational-design

    In many cases, the answer is to develop a cloud brokerage to manage the complexity. But what should your cloud broker be delivering, and how?

    Our Advice

    Critical Insight

    • To avoid failure, you need to provide security and compliance, but basic user satisfaction means becoming a frictionless intermediary.
    • Enabling brokers provide knowledge and guidance for the best usage of cloud.
    • While GCBs fill a critical role as a control point for IT consumption, they can easily turn into a friction point for IT projects. It’s important to find the right balance between enabling compliance and providing frictionless usability.

    Impact and Result

    • Avoid disintermediation.
    • Maintain compliance.
    • Leverage economies of scale.
    • Ensure architecture discipline.

    Adding the Right Value: Building Cloud Brokerages That Enable Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build a Cloud Brokerage Deck – A guide to help you start designing a cloud brokerage that delivers value beyond gatekeeping.

    Define the value, ecosystem, and metrics required to add value as a brokerage. Develop a brokerage value proposition that aligns with your audience and capabilities. Define and rationalize the ecosystem of partners and value-add activities for your brokerage. Define KPIs that allow you to maximize and balance both usability and compliance.

    • Adding the Right Value: Building Cloud Brokerages That Enable Storyboard
    [infographic]

    Further reading

    Adding the Right Value: Building Cloud Brokerages That Enable

    Considerations for implementing an institutional-focused cloud brokerage.

    Your Challenge

    Increasingly, large institutions and governments are adopting cloud-first postures for delivering IT resources. Combined with the growth of cloud offerings that are able to meet the certifications and requirements of this segment that has been driven by federal initiatives like Cloud-First in Canada and Cloud Smart in the United States, these two factors have left institutions (and the businesses that serve them) with the challenge of delivering cloud services to their users while maintaining compliance, control, and IT sanity.

    In many cases, the answer is to develop a cloud brokerage to manage the complexity. But what should your cloud broker be delivering and how?

    Navigating the Problem

    Not all cloud brokerages are the same. And while they can be an answer to cloud complexity, an ineffective brokerage can drain value and complicate operations even further. Cloud brokerages need to be designed:

    1. To deliver the right type of value to its users.
    2. To strike the balance between effective governance & security and flexibility & ease of use.

    Info-Tech’s Approach

    By defining your end goals, framing solutions based on the type of value and rigor your brokerage needs to deliver, and focusing on the right balance of security and flexibility, you can deliver a brokerage that delivers the best of all worlds.

    1. Define the brokerage value you want to deliver.
    2. Build the catalog and partner ecosystem.
    3. Understand how to maximize adoption and minimize disintermediation while maintaining architectural discipline and compliance.

    Info-Tech Insight

    Sometimes a brokerage delivery model makes sense, sometimes it doesn’t! Understanding the value addition you want your brokerage to provide before creating it allows you to not only avoid pitfalls and maximize benefits but also understand when a brokerage model does and doesn’t make sense in the first place.

    Project Overview

    Understand what value you want your brokerage to deliver

    Different institutions want brokerage delivery for different reasons. It’s important to define up front why your users need to work through a brokerage and what value that brokerage needs to deliver.

    What’s in the catalog? Is it there to consolidate and simplify billing and consumption? Or does it add value further up the technology stack or value chain? If so, how does that change the capabilities you need internally and from partners?

    Security and compliance are usually the highest priority

    Among institutions adopting cloud, a broker that can help deliver their defined security and compliance standards is an almost universal requirement. Especially in government institutions, this can mean the need to meet a high standard in both implementation and validation.

    The good news is that even if you lack the complete set of skills in-house, the high certification levels available from hyperscale providers combined with a growing ecosystem of service providers working on these platforms means you can usually find the right partner(s) to make it possible.

    The real goal: frictionless intermediation and enablement

    Ultimately, if end users can’t get what they need from you, they will go around you to get it. This challenge, which has always existed in IT, is further amplified in a cloud service world that offers users a cornucopia of options outside the brokerage. Furthermore, cloud users expect to be able to consume IT seamlessly. Without frictionless satisfaction of user demand your brokerage will become disintermediated, which risks your highest priorities of security and compliance.

    Understand the evolution: Info-Tech thought model

    While initial adoption of cloud brokerages in institutions was focused on ensuring the ability of IT to extend its traditional role as gatekeeper to the realm of cloud services, the focus has now shifted upstream to enabling ease of use and smart adoption of cloud services. This is evidenced clearly in examples like the US government’s renaming of its digital strategy from “Cloud First” to “Cloud Smart” and has been mirrored in other regions and institutions.

    Info-Tech Insights

    To avoid failure, you need to provide security and compliance.

    Basic user satisfaction means becoming a frictionless intermediary.

    Exceed expectations! Enabling brokers provide knowledge and guidance for the best usage of cloud.

    • Security & Compliance
    • Frictionless Intermediation
    • Cloud-Enabling Brokerage

    Define the role of a cloud broker

    Where do brokers fit in the cloud model?

    • NIST Definition: An entity that manages the use, performance, and delivery of cloud services and negotiates relationships between cloud providers and cloud consumers.
    • Similar to a telecom master agent, a cloud broker acts as the middle-person and end-user point of contact, consolidating the management of underlying providers.
    • A government or institutional cloud broker (GCB) is responsible for the delivery of all cloud services consumed by the departments or agencies it supports or that are mandated to use it.

    Balancing governance and agility

    Info-Tech Insight

    While GCBs fill a critical role as a control point for IT consumption, they can easily turn into a friction point for IT projects. It’s important to find the right balance between enabling compliance and providing frictionless usability.

    Model brokerage drivers and benefits

    Reduced costs: Security through standardization: Frictionless consumption: Avoid disinter-mediation; Maintain compliance; Leverage economies of scale; Ensure architecture discipline

    Maintain compliance and ensure architecture discipline: Brokerages can be an effective gating point for ensuring properly governed and managed IT consumption that meets the specific regulations and compliances required for an institution. It can also be a strong catalyst and enabler for moving to even more effective cloud consumption through automation.

    Avoid disintermediation: Especially in institutions, cloud brokers are a key tool in the fight against disintermediation – that is, end users circumventing your IT department’s procurement and governance by consuming an ad hoc cloud service.

    Leverage economies of scale: Simply put, consolidation of your cloud consumption drives effectiveness by making the most of your buying power.

    Info-Tech Insights

    Understanding the importance of each benefit type to your brokerage audience will help you define the type of brokerage you need to build and what skills and partners will be required to deliver the right value.

    The brokerage landscape

    The past ten years have seen governments and institutions evolve from basic acceptance of cloud services to the usage of cloud as the core of most IT initiatives.

    • As part of this evolution, many organizations now have well-defined standards and guidance for the implementation, procurement, and regulation of cloud services for their use.
    • Both Canada (Strategic Plan for Information Management and Information Technology) and the United States (Cloud Smart – formerly known as Cloud First) have recently updated their guidance on adoption of cloud services. The Australian Government has also recently updated its Cloud Computing Policy.
    • AWS and Azure both now claim Full FedRAMP (Federal Risk and Authorization Management Program) certification.
    • This has not only enabled easy adoption of these core hyperscale cloud service by government but also driven the proliferation of a large ecosystem of FedRAMP-authorized cloud service providers.
    • This trend started with government at the federal level but has cascaded downstream to provincial and municipal governments globally, and the same model seems likely to be adopted by other governments and other institution types over time.

    Info-Tech Insight

    The ecosystem of platforms and tools has grown significantly and examples of best practices, especially in government, are readily available. Once you’ve defined your brokerage’s value stance, the building blocks you need to deliver often don’t need to be built from scratch.

    Address the unique challenges of business-led IT in institutions

    With the business taking more accountability and management of their own technology, brokers must learn how to evolve from being gatekeepers to enablers.

    This image This lists the Cons of IT acting as a gatekeeper providing oversight, and the Pros of IT acting as an Enabler in an IT Partnership.  the Cons are: Restrict System Access; Deliver & Monitor Applications; Own Organizational Risk; Train the Business.  The Pros are: Manage Role-Based Access; Deliver & Monitor Platforms; Share Organizational Risk; Coach & Mentor the Business

    Turn brokerage pitfalls into opportunities

    The greatest risks in using a cloud broker come from its nature as a single point of distribution for service and support. Without resources (or automation) to enable scale, as well as responsive processes for supporting users in finding the right services and making those services available through the brokerage, you will lose alignment with your users’ needs, which inevitably leads to disintermediation, loss of IT control, and broken compliance

    Info-Tech Insights

    Standardization and automation are your friend when building a cloud brokerage! Sometimes this means having a flexible catalog of options and configurations, but great brokerages can deliver value by helping their users redefine and evolve their workloads to work more effectively in the cloud. This means providing guidance and facilitating the landing/transformation of users’ workloads in the cloud, the right way.

    Challenges Impact
    • Single point of failure
    • Managing capacity
    • Alignment of brokerage with underlying agencies
    • Additional layer of complexity
    • Inability to deliver service
    • Disintermediation
    • Broken security/compliance
    • Loss of cost control/purchasing power

    Validate your cloud brokerage strategy using Info-Tech’s approach

    Value Definition

    • Define your brokerage type and value addition

    Capabilities Mapping

    • Understand the partners and capabilities you need to be able to deliver

    Measuring Value

    • Define KPIs for both compliant delivery and frictionless intermediation

    Provide Cloud Excellence

    • Move from intermediation to enablement and help users land on the cloud the right way

    Define the categories for your brokerage’s benefit and value

    Depending on the type of brokerage, the value delivered may be as simple as billing consolidation, but many brokerages go much deeper in their value proposition.

    This image depicts a funnel, where the following inputs make up the Broker Value: Integration, Interface and Management Enhancement; User Identity and Risk Management/ Security & Compliance; Cost & Workload Efficiency, Service Aggregation

    Define the categories of brokerage value to add

    • Purchasing Agents save the purchaser time by researching services from different vendors and providing the customer with information about how to use cloud computing to support business goals.
    • Contract Managers may also be assigned power to negotiate contracts with cloud providers on behalf of the customer. In this scenario, the broker may distribute services across multiple vendors to achieve cost-effectiveness, while managing the technical and procurement complexity of dealing with multiple vendors.
      • The broker may provide users with an application program interface (API) and user interface (UI) that hides any complexity and allows the customer to work with their cloud services as if they were being purchased from a single vendor. This type of broker is sometimes referred to as a cloud aggregator.
    • Cloud Enablers can also provide the customer with additional services, such as managing the deduplication, encryption, and cloud data transfer and assisting with data lifecycle management and other activities.
    • Cloud Customizers integrate various underlying cloud services for customers to provide a custom offering under a white label or its own brand.
    • Cloud Agents are essentially the software version of a Contract Manager and act by automating and facilitating the distribution of work between different cloud service providers.

    Info-Tech Insights

    Remember that these categories are general guidelines! Depending on the requirements and value a brokerage needs to deliver, it may fit more than one category of broker type.

    Brokerage types and value addition

    Info-Tech Insights

    Each value addition your brokerage invests in delivering should tie to reinforcing efficiency, compliance, frictionlessness, or enablement.

    Value Addition Purchasing Agent Contract Manager Cloud Enabler Cloud Customizer Cloud Agent
    Underlying service selection

    Standard Activity

    Standard Activity Standard Activity Standard Activity Common Activity
    Support and info Standard Activity

    Common Activity

    Standard Activity Standard Activity Common Activity
    Contract lifecycle (pricing/negotiation) Standard Activity Common Activity Standard Activity
    Workload distribution (to underlying services) (aggregation) Common Activity Standard Activity Standard Activity Standard Activity
    Value-add or layered on services Standard Activity Common Activity
    Customization/integration of underlying services Standard Activity
    Automated workload distribution (i.e. software) Standard Activity

    Start by delivering value in these common brokerage service categories

    Security & Compliance

    • Reporting & Auditing
    • SIEM & SOC Services
    • Patching & Monitoring

    Cost Management

    • Right-Sizing
    • Billing Analysis
    • Anomaly Detection & Change Recommendations

    Data Management

    • Data Tiering
    • Localization Management
    • Data Warehouse/Lake Services

    Resilience & Reliability

    • Backup & Archive
    • Replication & Sync
    • DR & HA Management
    • Ransomware Prevention/Mitigation

    Cloud-Native & DevOps Enablement

    • Infrastructure as Code (IaC)
    • DevOps Tools & Processes
    • SDLC Automation Tools

    Design, Transformation, and Integration

    • CDN Integration
    • AI Tools Integration
    • SaaS Customizations

    Activity: Brokerage value design

    Who are you and who are you building this for?

    • Internal brokerage (i.e. you are a department in an organization that is tasked with providing IT resources to other internal groups)
      • No profit motivation
      • Primary goal is to maintain compliance and avoid disintermediation
    • Third-party brokerage (i.e. you are an MSP that needs to build a brokerage to provide a variety of downstream services and act as the single point of consumption for an organization)
      • Focus on value-addition to the downstream services you facilitate for your client
      • Increased requirement to quickly add new partners/services from downstream as required by your client

    What requirements and pains do you need to address?

    • Remember that in the world of cloud, users ultimately can go around IT to find the resources and tools they want to use. In short, if you don’t provide ease and value, they will get it somewhere else.
    • Assess the different types of cloud brokerages out there as a guide to what sort of value you want to deliver.

    Why are you creating a brokerage? There are several categories of driver and more than one may apply.

    • Compliance and security gating/validation
    • Cost consolidation and governance
    • Value-add or feature enhancement of raw/downstream services being consumed

    It’s important to clearly understand how best you can deliver unique value to ensure that they want to consume from you.

    This is an image of a Venn diagram between the following: Who are you trying to serve?; Why and how are you uniquely positioned to deliver?; What requirements do they have and what pain points can you help solve?.  Where all three circles overlap is the Brokerage Value Proposition.

    Understand the ecosystem you’ll require to deliver value

    GCB

    • Enabling Effectiveness
    • Cost Governance
    • Adoption and User Satisfaction
    • Security & Compliance

    Whatever value proposition and associated services your brokerage has defined, either internal resources or additional partners will be required to run the platform and processes you want to offer on top of the defined base cloud platforms.

    Info-Tech Insights

    Remember to always align your value adds and activities to the four key themes:

    • Efficiency
    • Compliance
    • Frictionlessness
    • Cloud Enablement

    Delivering value may require an ecosystem

    The additional value your broker delivers will depend on the tools and services you can layer on top of the base cloud platform(s) you support.

    In many cases, you may require different partners to fulfil similar functions across different base platforms. Although this increases complexity for the brokerage, it’s also a place where additional value can be delivered to end users by your role as a frictionless intermediary.

    Base Partner/Platform

    • Third-party software & platforms
    • Third-party automations & integrations
    • Third-party service partners
    • Internal value-add functions

    Build the ecosystem you need for your value proposition

    Leverage partners and automation to bake compliance in.

    Different value-add types (based on the category/categories of broker you’re targeting) require different additional platforms and partners to augment the base cloud service you’re brokering.

    Security & Config

    • IaC Tools
    • Cloud Resource Configuration Validation
    • Templating Tools
    • Security Platforms
    • SDN and Networking Platforms
    • Resilience (Backup/Replication/DR/HA) Platforms
    • Data & Storage Management
    • Compliance and Validation Platforms & Partners

    Cost Management

    • Subscription Hierarchy Management
    • Showback and Chargeback Logic
    • Cost Dashboarding and Thresholding
    • Governance and Intervention

    Adoption & User Satisfaction

    • Service Delivery SLAs
    • Support Process & Tools
    • Capacity/Availability Management
    • Portal Usability/UX

    Speed of Evolution

    • Partner and Catalog/Service Additions
    • Broker Catalog Roadmapping
    • User Request Capture (new services)
    • User Request Capture (exceptions)

    Build your features and services lists

    Incorporate your end user, business, and IT perspectives in defining the list of mandatory and desired features of your target solution.

    See our Implement a Proactive and Consistent Vendor Selection Process blueprint for information on procurement practices, including RFP templates.

    End User

    • Visual, drag-and-drop models to define data models, business logic, and user interfaces
    • One-click deployment
    • Self-healing application
    • Vendor-managed infrastructure
    • Active community and marketplace
    • Prebuilt templates and libraries
    • Optical character recognition and natural language processing

    Business

    • Audit and change logs
    • Theme and template builder
    • Template management
    • Knowledgebase and document management
    • Role-based access
    • Business value, operational costs, and other KPI monitoring
    • Regulatory compliance
    • Consistent design and user experience across applications
    • Business workflow automation

    IT

    • Application and system performance monitoring
    • Versioning and code management
    • Automatic application and system refactoring and recovery
    • Exception and error handling
    • Scalability (e.g. load balancing) and infrastructure management
    • Real-time debugging
    • Testing capabilities
    • Security management
    • Application integration management

    Understand the stakeholders

    Hyperscale Platform/Base Platform: Security; Compliance and Validation;Portal/Front-End; Cost Governance; Broker Value Add(s)

    Depending on the value-add(s) you are trying to deliver, as well as the requirements from your institution(s), you will have a different delineation of responsibilities for each of the value-add dimensions. Typically, there will be at least three stakeholders whose role needs to be considered for each dimension:

    • Base Cloud Provider
    • Third-Party Platforms/Service Providers
    • Internal Resources

    Info-Tech Insights

    It’s important to remember that the ecosystem of third-party options available to you in each case will likely be dependent on if a given partner operates or supports your chosen base provider.

    Define the value added by each stakeholder in your value chain

    Value Addition Cost Governance Security & Compliance Adoption and User Satisfaction New Service Addition Speed End-User Cloud Effectiveness
    Base platform(s)
    Third party
    Internal

    A basic table of the stakeholders and platforms involved in your value stream is a critical tool for aligning activities and partners with brokerage value.

    Remember to tie each value-add category you’re embarking on to at least one of the key themes!

    Cost Governance → Efficiency

    Security & Compliance → Compliance

    Adoption & User Satisfaction → Frictionlessness

    New Service Addition Responsiveness → Frictionlessness, Enablement

    End-User Cloud Effectiveness → Enablement

    Info-Tech Insights

    The expectations for how applications are consumed and what a user experience should look like is increasingly being guided by the business and by the disintermediating power of the cloud-app ecosystem.

    “Enabling brokers” help embrace business-led IT

    In environments where compliance and security are a must, the challenges of handing off application management to the business are even more complex. Great brokers learn to act not just as a gatekeeper but an enabler of business-led IT.

    Business Empowerment

    Organizations are looking to enhance their Agile and BizDevOps practices by shifting traditional IT practices left and toward the business.

    Changing Business Needs

    Organizational priorities are constantly changing. Cost reduction opportunities and competitive advantages are lost because of delayed delivery of features.

    Low Barrier to Entry

    Low- and no-code development tools, full-stack solutions, and plug-and-play architectures allow non-technical users to easily build and implement applications without significant internal technical support or expertise.

    Democratization of IT

    A wide range of digital applications, services, and information are readily available and continuously updated through vendor and public marketplaces and open-source communities.

    Technology-Savvy Business

    The business is motivated to learn more about the technology they use so that they can better integrate it into their processes.

    Balance usability and compliance: accelerate cloud effectiveness

    Move to being an accelerator and an enabler! Rather than creating an additional layer of complexity, we can use the abstraction of a cloud brokerage to bring a wide variety of value-adds and partners into the ecosystem without increasing complexity for end users.

    Manage the user experience

    • Your portal is a great source of data for optimizing user adoption and satisfaction.
    • Understand the KPIs that matter to your clients or client groups from both a technical and a service perspective.

    Be proactive and responsive in meeting changing needs

    • Determine dashboard consumption by partner view.
    • Regularly review and address the gaps in your catalog.
    • Provide an easy mechanism for adding user-demanded services.

    Think like a service provider

    • You do need to be able to communicate and even market internally new services and capabilities as you add them or people won't know to come to you to use them.
    • It's also critical in helping people move along the path to enablement and knowing what might be possible that they hadn't considered.

    Provide cloud excellence functions

    Enablement Broker

    • Mentorship & Training
      • Build the skills, knowledge, and experiences of application owners and managers with internal and external expertise.
    • Organizational Change Leadership
      • Facilitate cultural, governance, and other organizational changes through strong relationships with business and IT leadership.
    • Good Delivery Practices & Thinking
      • Develop, share, and maintain a toolkit of good software development lifecycle (SDLC) practices and techniques.
    • Knowledge Sharing
      • Centralize a knowledgebase of up-to-date and accurate documentation and develop community forums to facilitate knowledge transfer.
    • Technology Governance & Leadership
      • Implement the organizational standards, policies, and rules for all applications and platforms and coordinate growth and sprawl.
    • Shared Services & Integrations
      • Provide critical services and integrations to support end users with internal resources or approved third-party providers and partners.

    Gauge value with the right metrics

    Focus your effort on measuring key metrics.

    Category

    Purpose

    Examples

    Business Value – The amount of value and benefits delivered. Justify the investment and impact of the brokerage and its optimization to business operations. ROI, user productivity, end-user satisfaction, business operational costs, error rate
    Application Quality – Satisfaction of application quality standards. Evaluate organizational effort to address and maximize user satisfaction and adoption rates. Adoption rate, usage friction metrics, user satisfaction metrics
    Delivery Effectiveness – The delivery efficiency of changes. Enable members to increase their speed to effective deployment, operation, and innovation on cloud platforms. Speed of deployment, landing/migration success metrics

    Determine measures that demonstrate the value of your brokerage by aligning it with your quality definition, value drivers, and users’ goals and objectives. Recognize that your journey will require constant monitoring and refinement to adjust to situations that may arise as you adopt new products, standards, strategies, tactics, processes, and tools.

    Activity Output

    Ultimately, the goal is designing a brokerage that can evolve from gatekeeping to frictionless intermediation to cloud enablement.

    Maintain focus on the value proposition, your brokerage ecosystem, and the metrics that represent enablement for your users and avoid pitfalls and challenges from the beginning.

    Activity: Define your brokerage type and value addition; Understand the partners and capabilities you need to be able to deliver; Define KPIs for both delivery (compliance) and adoption (frictionlessness); Output: GCB Strategy Plan; Addresses: Why and when you should build a GCB; How to avoid pitfalls; How to maximize benefits; How to maximize responsiveness and user satisfaction; How to roadmap and add services with agility.

    Appendix

    Related blueprints and tools

    Document Your Cloud Strategy

    This blueprint covers aligning your value proposition with general cloud requirements.

    Define Your Digital Business Strategy

    Phase 1 of this research covers identifying value chains to be transformed.

    Embrace Business-Managed Applications

    Phase 1 of this research covers understanding the business-managed applications as a factor in developing a frictionless intermediary model.

    Implement a Proactive and Consistent Vendor Selection Process

    This blueprint provides information on partner selection and procurement practices, including RFP templates.

    Bibliography

    “3 Types of Cloud Brokers That Can Save the Cloud.” Cloud Computing Topics, n.d. Web.

    Australian Government Cloud Computing Policy. Government of Australia, October 2014. Web.

    “Cloud Smart Policy Overview.” CIO.gov, n.d. Web.

    “From Cloud First to Cloud Smart.” CIO.gov, n.d. Web.

    Gardner, Dana. “Cloud brokering: Building a cloud of clouds.” ZDNet, 22 April 2011. Web.

    Narcisi, Gina. “Cloud, Next-Gen Services Help Master Agents Grow Quickly And Beat 'The Squeeze' “As Connectivity Commissions Decline.” CRN, 14 June 2017. Web.

    Smith, Spencer. “Asigra calls out the perils of cloud brokerage model.” TechTarget, 28 June 2019. Web.

    Tan, Aaron. “Australia issues new cloud computing guidelines.” TechTarget, 27 July 2020. Web.

    The European Commission Cloud Strategy. ec.europa.eu, 16 May 2019. Web.

    “TrustRadius Review: Cloud Brokers 2022.” TrustRadius, 2022. Web.

    Yedlin, Debbie. “Pros and Cons of Using a Cloud Broker.” Technology & Business Integrators, 17 April 2015. Web.

    Get Started With Customer Advocacy

    • Buy Link or Shortcode: {j2store}565|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Marketing Solutions
    • Parent Category Link: /marketing-solutions

    Getting started with customer advocacy (CA) is no easy task. Many customer success professionals carry out ad hoc customer advocacy activities to address immediate needs but lack a more strategic approach.

    Our Advice

    Critical Insight

    • Customer success leaders must reposition their CA program around growth; the recognition that customer advocacy is a strategic growth initiative is necessary to succeed in today’s competitive market.
    • Get key stakeholders on board early – especially Sales!
    • Always link your CA efforts back to retention and growth.
    • Make building genuine relationships with your advocates the cornerstone of your CA program.

    Impact and Result

    • Enable the organization to identify and develop meaningful relationships with top customers and advocates.
    • Understand the concepts and benefits of CA and how CA can be used to improve marketing and sales and fuel growth and competitiveness.
    • Follow SoftwareReviews’ methodology to identify where to start to apply CA within the organization.
    • Develop a customer advocacy proof of concept/pilot program to gain stakeholder approval and funding to get started with or expand efforts around customer advocacy.

    Get Started With Customer Advocacy Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Get Started With Customer Advocacy Executive Brief – An overview of why customer advocacy is critical to your organization and the recommended approach for getting started with a pilot program.

    Understand the strategic benefits and process for building a formal customer advocacy program. To be successful, you must reposition CA as a strategic growth initiative and continually link any CA efforts back to growth.

    • Get Started With Customer Advocacy Storyboard

    2. Define Your Advocacy Requirements – Assess your current customer advocacy efforts, identify gaps, and define your program requirements.

    With the assessment tool and steps outlined in the storyboard, you will be able to understand the gaps and pain points, where and how to improve your efforts, and how to establish program requirements.

    • Customer Advocacy Maturity Assessment Tool

    3. Win Executive Approval and Launch Pilot – Develop goals, success metrics, and timelines, and gain approval for your customer advocacy pilot.

    Align on pilot goals, key milestones, and program elements using the template and storyboard to effectively communicate with stakeholders and gain executive buy-in for your customer advocacy pilot.

    • Get Started With Customer Advocacy Executive Presentation Template

    Infographic

    Further reading

    Get Started With Customer Advocacy

    Develop a customer advocacy program to transform customer satisfaction into revenue growth.

    EXECUTIVE BRIEF

    Analyst perspective

    Customer advocacy is critical to driving revenue growth

    The image contains a picture of Emily Wright.

    Customer advocacy puts the customer at the center of everything your organization does. By cultivating a deep understanding of customer needs and how they define value and by delivering positive experiences throughout the customer journey, organizations inspire and empower customers to become evangelists for their brands or products. Both the client and solution provider enjoy satisfying and ongoing business outcomes as a result.

    Focusing on customer advocacy is critical for software solutions providers. Business-to-business (B2B) buyers are increasingly looking to their peers and third-party resources to arm themselves with information on solutions they feel they can trust before they choose to engage with solution providers. Your satisfied customers are now your most trusted and powerful resource.

    Customer advocacy helps build strong relationships with your customers, nurtures brand advocacy, gives your marketing messaging credibility, and differentiates your company from the competition; it’s critical to driving revenue growth. Companies that develop mature advocacy programs can increase Customer Lifetime Value (CLV) by 16% (Wharton Business School, 2009), increase customer retention by 35% (Deloitte, 2011), and give themselves a strong competitive advantage in an increasingly competitive marketplace.

    Emily Wright
    Senior Research Analyst, Advisory
    SoftwareReviews

    Executive summary

    Your Challenge

    Ad hoc customer advocacy (CA) efforts and reference programs, while still useful, are not enough to drive growth. Providers increase their chance for success by assessing if they face the following challenges:

    • Lack of referenceable customers that can turn into passionate advocates, or a limited pool that is at risk of burnout.
    • Lack of references for all key customer types, verticals, etc., especially in new growth segments or those that are hard to recruit.
    • Lack of a consistent program for gathering customer feedback and input to make improvements and increase customer satisfaction.
    • Lack of executive and stakeholder (e.g. Sales, Customer Success, channel partners, etc.) buy-in for the importance and value of customer advocacy.

    Building a strong customer advocacy program must be a high priority for customer service/success leaders in today’s highly competitive software markets.

    Common Obstacles

    Getting started with customer advocacy is no easy task. Many customer success professionals carry out ad hoc customer advocacy activities to address immediate needs but lack a more strategic approach. What separates them from success are several nagging obstacles:

    • Efforts lack funding and buy-in from stakeholders.
    • Senior management doesn’t fully understand the business value of a customer advocacy program.
    • Duplicate efforts are taking place between Sales, Marketing, product teams, etc., because ownership, roles, and responsibilities have not been determined.
    • Relationships are guarded/hoarded by those who feel they own the relationship (e.g. Sales, Customer Success, channel partners, etc.).
    • Customer-facing staff often lack the necessary skills to foster customer advocacy.

    SoftwareReviews’ Approach

    This blueprint will help leaders of customer advocacy programs get started with developing a formalized pilot program that will demonstrate the value of customer advocacy and lay a strong foundation to justify rollout. Through SoftwareReviews’ approach, customer advocacy leaders will:

    • Enable the organization to identify and develop meaningful relationships with top customers and advocates.
    • Understand the concepts and benefits of CA and how CA can be used to improve marketing and sales and fuel growth and competitiveness.
    • Follow SoftwareReviews’ methodology to identify where to start to apply CA within the organization.
    • Develop a customer advocacy proof of concept/pilot program to gain stakeholder approval and funding to get started with or expand efforts around customer advocacy.

    What is customer advocacy?

    “Customer advocacy is the act of putting customer needs first and working to deliver solution-based assistance through your products and services." – Testimonial Hero, 2021

    Customer advocacy is designed to keep customers loyal through customer engagement and advocacy marketing campaigns. Successful customer advocacy leaders experience decreased churn while increasing return on investment (ROI) through retention, acquisition, and cost savings.

    Businesses that implement customer advocacy throughout their organizations find new ways of supporting customers, provide additional customer value, and ensure their brands stand unique among the competition.

    Customer Advocacy Is…

    • An integral part of any marketing and/or business strategy.
    • Essential to improving and maintaining high levels of customer satisfaction.
    • Focused on delivering value to customers.
    • Not only a set of actions, but a mindset that should be fostered and reinforced through a customer-centric culture.
    • Mutually beneficial relationships for both company and customer.

    Customer Advocacy Is Not…

    • Only referrals and testimonials.
    • Solely about what you can get from your advocates.
    • Brand advocacy. Brand advocacy is the desired outcome of customer advocacy.
    • Transactional. Brand advocates must be engaged.
    • A nice-to-have.
    • Solved entirely by software. Think about what you want to achieve and how a software solution can you help you reach those goals.

    SoftwareReviews Insight

    Customer advocacy has evolved into being a valued company asset versus a simple referral program – success requires an organization-wide customer-first mindset and the recognition that customer advocacy is a strategic growth initiative necessary to succeed in today’s competitive market.

    Customer advocacy: Essential to high retention

    When customers advocate for your company and products, they are eager to retain the value they receive

    • Customer acts of advocacy correlate to high retention.
    • Acts of advocacy won’t happen unless customers feel their interests are placed ahead of your company’s, thereby increasing satisfaction and customer success. That’s the definition of a customer-centric culture.
    • And yet your company does receive significant benefits from customer advocacy:
      • When customers advocate and renew, your costs go down and margins rise because it costs less to keep a happy customer than it does to bring a new customer onboard.
      • When renewal rates are high, customer lifetime value increases, also increasing profitability.

    Acquiring a new customer can cost five times more than retaining an existing customer (Huify, 2018).

    Increasing customer retention by 5% can increase profits by 25% to 95% (Bain & Company, cited in Harvard Business Review, 2014).

    SoftwareReviews Insight

    Don’t overlook the value of customer advocacy to retention! Despite the common knowledge that it’s far easier and cheaper to sell to an existing customer than to sell to a new prospect, most companies fail to leverage their customer advocacy programs and continue to put pressure on Marketing to focus their budgets on customer acquisition.

    Customer advocacy can also be your ultimate growth strategy

    In your marketing and sales messaging, acts of advocacy serve as excellent proof points for value delivered.

    Forty-five percent of businesses rank online reviews as a top source of information for selecting software during this (top of funnel) stage, followed closely by recommendations and referrals at 42%. These sources are topped only by company websites at 54% (Clutch, 2020).

    With referrals coming from customer advocates to prospects via your lead gen engine and through seller talk tracks, customer advocacy is central to sales, marketing, and customer experience success.

    ✓ Advocates can help your new customers learn your solution and ensure higher adoption and satisfaction.
    ✓ Advocates can provide valuable, honest feedback on new updates and features.

    The image contains a picture to demonstrate the cycle of customer advocacy. The image has four circles, with one big circle in the middle and three circles surrounding with arrows pointing in both directions in between them. The middle circle is labelled customer advocacy. The three circles are labelled: sales, customer success, marketing.

    “A customer advocacy program is not just a fancy buzz word or a marketing tool that’s nice to have. It’s a core discipline that every major brand needs to integrate into their overall marketing, sales and customer success strategies if they expect to survive in this trust economy. Customer advocacy arguably is the common asset that runs throughout all marketing, sales and customer success activities regardless of the stage of the buyer’s journey and ties it all together.” – RO Innovation, 2017

    Positive experience drives acts of advocacy

    More than price or product, experience now leads the way in customer advocacy and retention

    Advocacy happens when customers recommend your product. Our research shows that the biggest drivers of likeliness to recommend and acts of customer advocacy are the positive experiences customers have with vendors and their products, not product features or cost savings. Customers want to feel that:

    1. Their productivity and performance is enhanced and the vendor is helping them to innovate and grow as a company.
    2. Their vendor inspires them and helps them to continually improve.
    3. They can rely on the vendor and the product they purchased.
    4. They are respected by the vendor.
    5. They can trust that the vendor will be on their side and save them time.

    The image contains a graph to demonstrate the correlation of likeliness to recommend a satisfaction driver. Where anything above a 0.5 indicates a strong driver of satisfaction.

    Note that anything above 0.5 indicates a strong driver of satisfaction.
    Source: SoftwareReviews buyer reviews (based on 82,560 unique reviews).

    SoftwareReviews Insight

    True customer satisfaction comes from helping customers innovate, enhancing their performance, inspiring them to continually improve, and being reliable, respectful, trustworthy, and conscious of their time. These true drivers of satisfaction should be considered in your customer advocacy and retention efforts. The experience customers have with your product and brand is what will differentiate your brand from competitors, drive advocacy, and ultimately, power business growth. Talk to a SoftwareReviews advisor to learn how users rate your product on these satisfaction drivers in the SoftwareReviews Emotional Footprint Report.

    Yet challenges exist for customer advocacy program leaders

    Customer success leaders without a strong customer advocacy program feel numerous avoidable pains:

    • Lack of compelling stories and proof points for the sales team, causing long sales cycles.
    • Heavy reliance on a small pool of worn-out references.
    • Lack of references for all needed customer types, verticals, etc.
    • Lack of a reliable customer feedback process for solution improvements.
    • Overspending on acquiring new customers due to a lack of customer proof points.
    • Missed opportunities that could grow the business (customer lifetime value, upsell/cross-sell, etc.).

    Marketing, customer success, and sales teams experiencing any one of the above challenges must consider getting started with a more formalized customer advocacy program.

    Obstacles to customer advocacy programs

    Leaders must overcome several barriers in developing a customer advocacy program:

    • Stakeholders are often unclear on the value customer advocacy programs can bring and require proof of benefits to invest.
    • Efforts are duplicated among sales, marketing, product, and customer success teams, given ownership and collaboration practices are ill-defined or nonexistent.
    • There is a culture of guarding or hoarding customer relationships by those who feel they own the relationship, or there’s high turnover among employees who own the customer relationships.
    • The governance, technology, people, skills, and/or processes to take customer advocacy to the next level are lacking.
    • Leaders don’t know where to start with customer advocacy, what needs to be improved, or what to focus on first.

    A lack of customer centricity hurts organizations

    12% of people believe when a company says they put customers first. (Source: HubSpot, 2019)

    Brands struggle to follow through on brand promises, and a mismatch between expectations and lived experience emerges. Customer advocacy can help close this gap and help companies live up to their customer-first messaging.

    42% of companies don’t conduct any customer surveys or collect feedback. (Source: HubSpot, 2019)

    Too many companies are not truly listening to their customers. Companies that don’t collect feedback aren’t going to know what to change to improve customer satisfaction. Customer advocacy will orient companies around their customer and create a reliable feedback loop that informs product and service enhancements.

    Customer advocacy is no longer a nice-to-have but a necessity for solution providers

    B2B buyers increasingly turn to peers to learn about solutions:

    “84% of B2B decision makers start the buying process with a referral.” (Source: Influitive, Gainsight & Pendo, 2020)

    “46% of B2B buyers rely on customer references for information before purchasing.” (Source: RO Innovation, 2017)

    “91% of B2B purchasers’ buying decisions are influenced by word-of-mouth recommendations.” (Source: ReferralRock, 2022)

    “76% of individuals admit that they’re more likely to trust content shared by ‘normal’ people than content shared by brands.” (Source: TrustPilot, 2020)

    By ignoring the importance of customer advocacy, companies and brands are risking stagnation and missing out on opportunities to gain competitive advantage and achieve growth.

    Getting Started With Customer Advocacy: SoftwareReviews' Approach

    1 BUILD
    Build the business case
    Identify your key stakeholders, steering committee, and working team, understand key customer advocacy principles, and note success barriers and ways to overcome them as your first steps.

    2 DEVELOP
    Develop your advocacy requirements
    Assess your current customer advocacy maturity, identify gaps in your current efforts, and develop your ideal advocate profile.

    3 WIN
    Win executive approval and implement pilot
    Determine goals and success metrics for the pilot, establish a timeline and key project milestones, create advocate communication materials, and finally gain executive buy-in and implement the pilot.

    SoftwareReviews Insight
    Building and implementing a customer advocacy pilot will help lay the foundation for a full program and demonstrate to executives and key stakeholders the impact on revenue, retention, and CLV that can be achieved through coordinated and well-planned customer advocacy efforts.

    Customer advocacy benefits

    Our research benefits customer advocacy program managers by enabling them to:

    • Explain why having a centralized, proactive customer advocacy program is important.
    • Clearly communicate the benefits and business case for having a formalized customer advocacy program.
    • Develop a customer advocacy pilot to provide a proof of concept (POC) and demonstrate the value of customer advocacy.
    • Assess the maturity of your current customer advocacy efforts and identify what to improve and how to improve to grow your customer advocacy function.

    "Advocacy is the currency for business and the fuel for explosive growth. Successful marketing executives who understand this make advocacy programs an essential part of their go-to-market strategy. They also know that advocacy isn't something you simply 'turn on': ... ultimately, it's about making human connections and building relationships that have enduring value for everyone involved."
    - Dan Cote, Influitive, Dec. 2021

    Case Study: Advocate impact on sales at Genesys

    Genesys' Goal

    Provide sales team with compelling customer reviews, quotes, stories, videos, and references.

    Approach to Advocacy

    • Customers were able to share their stories through Genesys' customer hub GCAP as quotes, reviews, etc., and could sign up to host reference forum sessions for prospective customers.
    • Content was developed that demonstrated ROI with using Genesys' solutions, including "top-tier logos, inspiring quotes, and reference forums featuring some of their top advocates" (Influitive, 2021).
    • Leveraged customer advocacy-specific software solution integration with the CRM to easily identify reference recommendations for Sales.

    Advocate Impact on Sales

    According to Influitive (2021), the impacts were:

    • 386% increase in revenue influences from references calls
    • 82% of revenue has been influence by reference calls
    • 78 reference calls resulted in closed-won opportunities
    • 250 customers and prospects attended 7 reference forums
    • 112 reference slides created for sales enablement
    • 100+ quotes were collect and transformed into 78 quote slides

    Who benefits from getting started with customer advocacy?

    This Research Is Designed for:

    • Customer advocacy leaders and marketers who are looking to:
      • Take a more strategic, proactive, and structured approach to customer advocacy.
      • Find a more effective and reliable way to gather customer feedback and input on products and services.
      • Develop and nurture a customer-oriented mindset throughout the organization.
      • Improve marketing credibility both within the company and outside to prospective customers.

    This Research Will Help You:

    • Explain why having a centralized, proactive customer advocacy program is important.
    • Clearly communicate the benefits and business case for having a formalized customer advocacy program.
    • Develop a customer advocacy pilot to provide a proof of concept (POC) and demonstrate the value of customer advocacy.
    • Assess the maturity of your current customer advocacy efforts and identify what to improve and how to improve to grow your customer advocacy function.

    This Research Will Also Assist:

    • Customer success leaders and sales directors who are responsible for:
      • Gathering customer references and testimonials.
      • Referral or voice of the customer (VoC) programs.

    This Research Will Help Them:

    • Align stakeholders on an overall program of identifying ideal advocates.
    • Coordinate customer advocacy efforts and actions.
    • Gather and make use of customer feedback to improve products, solutions, and service provided.
    • Provide an amazing customer experience throughout the entirety of the customer journey.

    SoftwareReviews’ methodology for getting started with customer advocacy

    Phase Steps

    1. Build the business case

    1. Identify your key stakeholders, steering committee, and working team
    2. Understand the concepts and benefits of customer advocacy as they apply to your organization
    3. Outline barriers to success, risks, and risk mitigation tactics

    2. Develop your advocacy requirements

    1. Assess your customer advocacy maturity using the SoftwareReviews CA Maturity Assessment Tool
    2. Identify gaps/pains in current CA efforts and add tasks to your action plan
    3. Develop ideal advocate profile/identify target advocate segment(s)

    3. Create implementation plan and pitch CA pilot

    1. Determine pilot goals and success metrics
    2. Establish timeline and create advocate communication materials
    3. Gain executive buy-in and implement pilot

    Phase Outcomes

    1. Common understanding of CA concepts and benefits
    2. Buy-in from CEO and head of Sales
    3. List of opportunities, risks, and risk mitigation tactics
    1. Identification of gaps in current customer advocacy efforts and/or activities
    2. Understanding customer advocacy readiness
    3. Identification of ideal advocate profile/target segment
    4. Basic actions to bridge gaps in CA efforts
    1. Clear objective for CA pilot
    2. Key metrics for program success
    3. Pilot timelines and milestones
    4. Executive presentation with business case for CA

    Insight summary

    Customer advocacy is a critical strategic growth initiative
    Customer advocacy (CA) has evolved into being a highly valued company asset as opposed to a simple referral program, but not everyone in the organization sees it that way. Customer success leaders must reposition their CA program around growth instead of focusing solely on retention and communicate this to key stakeholders. The recognition that customer advocacy is a strategic growth initiative is necessary to succeed in today’s competitive market.

    Get key stakeholders on board early – especially Sales!
    Work to bring the CEO and the head of Sales on your side early. Sales is the gatekeeper – they need to open the door to customers to turn them into advocates. Clearly reposition CA for growth and communicate that to the CEO and head of Sales; wider buy-in will follow.

    Identify the highest priority segment for generating acts of advocacy
    By focusing on the highest priority segment, you accomplish a number of things: generating growth in a critical customer segment, proving the value of customer advocacy to key stakeholders (especially Sales), and setting a strong foundation for customer advocacy to build upon and expand the program out to other segments.

    Always link your CA efforts back to retention and growth
    By clearly demonstrating the impact that customer advocacy has on not only retention but also overall growth, marketers will gain buy-in from key stakeholders, secure funding for a full CA program, and gain the resources needed to expand customer advocacy efforts.

    Focus on providing value to advocates
    Many organizations take a transactional approach to customer advocacy, focusing on what their advocates can do for them. To truly succeed with CA, focus on providing your advocates with value first and put them in the spotlight.

    Make building genuine relationships with your advocates the cornerstone of your CA program
    "57% of small businesses say that having a relationship with their consumers is the primary driver of repeat business" (Factory360).

    Guided Implementation

    What does our GI on getting started with building customer advocacy look like?

    Build the Business Case

    Call #1: Identify key stakeholders. Map out motivations and anticipate any concerns or objections. Determine steering committee and working team. Plan next call – 1 week.

    Call #2: Discuss concepts and benefits of customer advocacy as they apply to organizational goals. Plan next call – 1 week.

    Call #3: Discuss barriers to success, risks, and risk mitigation tactics. Plan next call – 1 week.

    Call #4: Finalize CA goals, opportunities, and risks and develop business case. Plan next call – 2 weeks.

    Develop Your Advocacy Requirements

    Call #5: Review the SoftwareReviews CA Maturity Assessment Tool. Assess your current level of customer advocacy maturity. Plan next call – 1 week.

    Call #6: Review gaps and pains in current CA efforts. Discuss tactics and possible CA pilot program goals. Begin adding tasks to action plan. Plan next call – 2 weeks.

    Call #7: Discuss ideal advocate profile and target segments. Plan next call – 2 weeks.

    Call #8: Validate and finalize ideal advocate profile. Plan next call – 1 week.

    Win Executive Approval and Implement Pilot

    Call #9: Discuss CA pilot scope. Discuss performance metrics and KPIs. Plan next call – 3 days.

    Call #10: Determine timeline and key milestones. Plan next call –2 weeks.

    Call #11: Develop advocate communication materials. Plan next call – 3 days.

    Call #12: Review final business case and coach on executive presentation. Plan next call – 1 week.

    A Guided Implementation (GI) is series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization. For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst. Your engagement managers will work with you to schedule analyst calls.


    Customer Advocacy Workshop

    Pre-Workshop Day 1 Day 2 Day 3 Day 4 Day 5 Post-Workshop
    Activities Identify Stakeholders & CA Pilot Team Build the Business Case Assess Current CA Efforts Develop Advocacy Goals & Ideal Advocate Profile Develop Project Timelines, Materials, and Exec Presentation Next Steps and Wrap-Up (offsite) Pitch CA Pilot
    0.1 Identify key stakeholders to involve in customer advocacy pilot and workshop; understand their motivations and anticipate possible concerns. 1.1 Review key CA concepts and identify benefits of CA for the organization.
    1.2 Outline barriers to success, risks, and risk mitigation tactics.
    2.1 Assess your customer advocacy maturity using the SoftwareReviews CA Maturity Assessment Tool.
    2.2 Identify gaps/pains in current CA efforts.
    2.3 Prioritize gaps from diagnostic and any other critical pain points.
    3.1 Identify and document the ideal advocate profile and target customer segment for pilot.
    3.2 Determine goal(s) and success metrics for program pilot.
    4.1 Develop pilot timelines and key milestones.
    4.2 Outline materials needed and possible messaging.
    4.3 Build the executive buy-in presentation.
    5.1 Complete in-progress deliverables from the previous four days. 6.1 Present to executive team and stakeholders.
    6.2 Gain executive buy-in and key stakeholder approval.
    6.3 Execute CA pilot.
    Deliverables
    1. Rationale for CA pilot; clear benefits, and how they apply to the organization.
    2. Documented barriers to success, risks, and risk mitigation tactics.
    1. CA Maturity Assessment results.
    2. Identification of gaps in current customer advocacy efforts and/or activities.
    1. Documented ideal advocate profile/target customer segment.
    2. Clear goal(s) and success metrics for CA pilot.
    1. Documented pilot timelines and key milestones.
    2. Draft/outlines of advocate materials.
    3. Draft executive presentation with business case for CA.
    1. Finalized implementation plan for CA pilot.
    2. Finalized executive presentation with business case for CA.
    1. Buy-in from decision makers and key stakeholders.

    Contact your account representative for more information.
    workshops@infotech.com
    1-888-670-8889

    Get started!

    Know your target market and audience, deploy well-designed strategies based on shared values, and make meaningful connections with people.

    Phase 1
    Build the Business Case

    Phase 2
    Develop Your Advocacy Requirements

    Phase 3
    Win Executive Approval and Implement Pilot

    Phase 1: Build the Business Case

    Steps
    1.1 Identify your key stakeholders, steering committee, and working team
    1.2 Understand the concepts and benefits of customer advocacy as they apply to your organization
    1.3 Outline barriers to success, risks, and risk mitigation tactics

    Phase Outcome

    • Common understanding of CA concepts and benefits
    • Buy-in from CEO and head of Sales
    • List of barriers to success, risks, and risk mitigation tactics

    Build the business case

    Step 1.1 Identify your key stakeholders, steering committee, and working team

    Total duration: 2.5-8.0 hours

    Objective
    Identify, document, and finalize your key stakeholders to know who to involve and how to get them onboard by truly understanding the forces of influence.

    Output

    • Robust stakeholder list with key stakeholders identified.
    • Steering committee and working team decided.

    Participants

    • Customer advocacy lead
    • Identified stakeholders
    • Workstream leads

    MarTech
    None

    Tools

    1.1.1 Identify Stakeholders
    (60-120 min.)

    Identify
    Using the guidance on slide 28, identify all stakeholders who would be involved or impacted by your customer advocacy pilot by entering names and titles into columns A and B on slide 27 "Stakeholder List Worksheet."

    Document
    Document as much information about each stakeholder as possible in columns C, D, E, and F into the table on slide 27.

    1.1.2 Select Steering Committee & Working Team
    (60-90 min.)

    Select
    Using the guidance on slides 28 and 29 and the information collected in the table on slide 27, identify the stakeholders that are steering committee members, functional workstream leads, or operations; document in column G on slide 27.

    Document
    Open the Executive Presentation Template to slides 5 and 6 and document your final steering committee and working team selections. Be sure to note the Executive Sponsor and Program Manager on slide 5.

    Tips & Reminders

    1. It is critical to identify "key stakeholders"; a single missed key stakeholder can disrupt an initiative. A good way to ensure that nobody is missed is to first uncover as many stakeholders as possible and later decide how important they are.
    2. Ensure steering committee representation from each department this initiative would impact or that may need to be involved in decision-making or problem-solving endeavors.

    Consult Info-Tech's Manage Stakeholder Relations blueprint for additional guidance on identifying and managing stakeholders, or contact one of our analysts for more personalized assistance and guidance.

    Stakeholder List Worksheet

    *Possible Roles
    Executive Sponsor
    Program Manager
    Workstream Lead
    Functional Lead
    Steering Committee
    Operations
    A B C D E F G
    Name Position Decision Involvement
    (Driver / Approver / Contributor / Informe
    Direct Benefit?
    (Yes / No)
    Motivation Concerns *Role in Customer Advocacy Pilot
    E.g. Jane Doe VP, Customer Success A N
    • Increase customer retention
    • Customer advocate burnout
    Workstream Lead

    Customer advocacy stakeholders

    What to consider when identifying stakeholders required for CA:
    Customer advocacy should be done as a part of a cross-functional company initiative. When identifying stakeholders, consider:

    • Who can make the ultimate decision on approving the CA program?
    • Who are the senior leadership members you need buy-in from?
    • Who do you need to support the CA program?
    • Who is affected by the CA program?
    • Who will help you build the CA program?
    • Where and among who is there enthusiasm for customer advocacy?
    • Consider stakeholders from Customer Success, Marketing, Sales, Product, PR & Social, etc.
    Key Roles Supporting an Effective Customer Advocacy Pilot
    Executive Sponsor
    • Owns the function at the management/C-suite level
    • Responsible for breaking down barriers and ensuring alignment with organizational strategy
    • CMO, VP of Marketing, and in SMB providers, the CEO
    Program Manager
    • Typically, a senior member of the marketing team
    • Responsible for organizing the customer advocacy pilot, preparing summary executive-level communications, and approval requests
    • Program manages the customer advocacy pilot, and in many cases, the continued formal program
    • Product Marketing Director, or other Marketing Director, who has strong program management skills, has run large-scale marketing or product programs, and is familiar with the stakeholder roles and enabling technologies
    Functional / Workstream Leads
    • Works alongside the Program Manager on planning and implementing the customer advocacy pilot and ensures functional workstreams are aligned with pilot objectives
    • Typical customer advocacy pilots will have a team comprised of representatives from Marketing, Sales, and Customer Success
    Steering Committee
    • Comprised of C-suite/management-level individuals that guide key decisions, approve requests, and mitigate any functional conflicts
    • Responsible for validating goals and priorities, enabling adequate resourcing, and critical decision making
    • CMO, CRO/Head of Sales, Head of Customer Success
    Operations
    • Comprised of individuals whose application and tech tools knowledge and skills support integration of customer advocacy functions into existing tech stack/CRM (e.g. adding custom fields into CRM)
    • Responsible for helping select technology that enables customer advocacy program activities
    • CRM, Marketing Applications, and Analytics Managers, IT Managers

    Customer advocacy working team

    Consider the skills and knowledge required for planning and executing a customer advocacy pilot.

    Workstream leads should have strong project management and collaboration skills and deep understanding of both product and customers (persona, journeys, satisfaction, etc.).

    Required Skills Suggested Functions
    • Project management
    • CRM knowledge
    • Marketing automation experience
    • MarTech knowledge
    • Understanding of buyer persona and journey
    • Product knowledge
    • Understanding of executive-level goals for the pilot
    • Content creation
    • Customer advocacy experience, if possible
    • Customer satisfaction
    • Email and event marketing experience
    • Customer Success
    • Marketing
    • Sales
    • Product
    • PR/Corporate Comms.

    Build the business case

    Step 1.2 Understand key concepts and benefits of customer advocacy

    Total duration: 2.0-4.0 hours

    Objective
    Understand customer advocacy and what benefits you seek from your customer advocacy program, and get set up to best communicate them to executives and decision makers.

    Output

    • Documented customer advocacy benefits

    Participants

    • Customer advocacy lead

    MarTech
    None

    Tools

    1.2.1 Discuss Key Concepts
    (60-120 min.)

    Envision
    Schedule a visioning session with key stakeholders and share the Get Started With Customer Advocacy Executive Brief (slides 3-23 in this deck).

    Discuss how key customer advocacy concepts can apply to your organization and how CA can contribute to organizational growth.

    Document
    Determine the top benefits sought from the customer advocacy program pilot and record them on slides 4 and 12 in the Executive Presentation Template.

    Finalize
    Work with the Executive Sponsor to finalize the "Message from the CMO" on slide 4 in the Executive Presentation Template.

    Tips & Reminders

    Keep in mind that while we're starting off broadly, the pilot for your customer advocacy program should be narrow and focused in scope.

    Build the business case

    Step 1.3 Understand barriers to success, risks, and risk mitigation tactics

    Total duration: 2.0-8.0 hours

    Objective
    Anticipate threats to pilot success; identify barriers to success, any possible risks, and what can be done to reduce the chances of a negative pilot outcome.

    Output

    • Awareness of barriers
    • Tactics to mitigate risk

    Participants

    • Customer advocacy lead
    • Key stakeholders

    MarTech
    None

    Tools

    1.3.1 Brainstorm Barriers to Success & Possible Risks
    (60-120 min.)

    Identify
    Using slide 7 of the Executive Presentation Template, brainstorm any barriers to success that may exist and risks to the customer advocacy program pilot success. Consider the people, processes, and technology that may be required.

    Document
    Document all information on slide 7 of the Executive Presentation Template.

    1.3.2 Develop Risk Mitigation Tactics
    (60-300 min.)

    Develop
    Brainstorm different ways to address any of the identified barriers to success and reduce any risks. Consider the people, processes, and technology that may be required.

    Document
    Document all risk mitigation tactics on slide 7 of the Executive Presentation Template.

    Tips & Reminders
    There are several types of risk to explore. Consider the following when brainstorming possible risks:

    • Damage to brand (if advocate guidance not provided)
    • Legal (compliance with regulations and laws around contact, incentives, etc.)
    • Advocate burnout
    • Negative advocate feedback

    Phase 2: Develop Your Advocacy Requirements

    Steps
    2.1 Assess your customer advocacy maturity
    2.2 Identify and document gaps and pain points
    2.3 Develop your ideal advocate profile

    Phase Outcome

    • Identification of gaps in current customer advocacy efforts or activities
    • Understanding of customer advocacy readiness and maturity
    • Identification of ideal advocate profile/target segment
    • Basic actions to bridge gaps in CA efforts

    Develop your advocacy requirements

    Step 2.1 Assess your customer advocacy maturity

    Total duration: 2.0-8.0 hours

    Objective
    Use the Customer Advocacy Maturity Assessment Tool to understand your organization's current level of customer advocacy maturity and what to prioritize in the program pilot.

    Output

    • Current level of customer advocacy maturity
    • Know areas to focus on in program pilot

    Participants

    • Customer advocacy lead
    • Key stakeholders

    MarTech
    None

    Tools

    2.1.1 Diagnose Current Customer Advocacy Maturity
    (60-120 min.)

    Diagnose
    Begin on tab 1 of the Customer Advocacy Maturity Assessment Tool and read all instructions.

    Navigate to tab 2. Considering the current state of customer advocacy efforts, answer the diagnostic questions in the Diagnostic tab of the Customer Advocacy Maturity Assessment Tool.

    After completing the questions, you will receive a diagnostic result on tab 3 that will identify areas of strength and weakness and make high-level recommendations for your customer advocacy program pilot.

    2.1.2 Discuss Results
    (60-300 min.)

    Discuss
    Schedule a call to discuss your customer advocacy maturity diagnostic results with a SoftwareReviews Advisor.

    Prioritize the recommendations from the diagnostic, noting which will be included in the program pilot and which require funding and resources to advance.

    Transfer
    Transfer results into slides 8 and 11 of the Executive Presentation Template.

    Tips & Reminders
    Complete the diagnostic with a handful of key stakeholders identified in the previous phase. This will help provide a more balanced and accurate assessment of your organization’s current level of customer advocacy maturity.

    Develop your advocacy requirements

    Step 2.2 Identify and document gaps and pain points

    Total duration: 2.5-8.0 hours

    Objective
    Understand the current pain points within key customer-related processes and within any current customer advocacy efforts taking place.

    Output

    • Prioritized list of pain points that could be addressed by a customer advocacy program.

    Participants

    • Customer advocacy lead
    • Key stakeholders

    MarTech
    None

    Tools

    2.2.1 Identify Pain Points
    (60-120 min.)

    Identify
    Identify and list current pain points being experienced around customer advocacy efforts and processes around sales, marketing, customer success, and product feedback.

    Add any gaps identified in the diagnostic to the list.

    Transfer
    Transfer key information into slide 9 of Executive Presentation Template.

    2.2.2 Prioritize Pain Points
    (60-300 min.)

    Prioritize
    Indicate which pains are the most important and that a customer advocacy program could help improve.

    Schedule a call to discuss the outputs of this step with a SoftwareReviews Advisor.

    Document
    Document priorities on slide 9 of Executive Presentation Template.

    Tips & Reminders

    Customer advocacy won't solve for everything; it's important to be clear about what pain points can and can't be addressed through a customer advocacy program.

    Develop your advocacy requirements

    Step 2.3 Develop your ideal advocate profile

    Total duration: 3.0-9.0 hours

    Objective
    Develop an ideal advocate persona profile that can be used to identify potential advocates, guide campaign messaging, and facilitate advocate engagement.

    Output

    • Ideal advocate persona profile

    Participants

    • Customer advocacy lead
    • Key stakeholders
    • Sales lead
    • Marketing lead
    • Customer Success lead
    • Product lead

    MarTech
    May require the use of:

    • CRM or marketing automation platform
    • Available and up-to-date customer database

    Tools

    2.3.1 Brainstorm Session Around Ideal Advocate Persona
    (60-150 min.)

    Brainstorm
    Lead the team to prioritize an initial, single, most important persona and to collaborate to complete the template.

    Choose your ideal advocate for the pilot based on your most important audience. Start with firmographics like company size, industry, and geography.

    Next, consider satisfaction levels and behavioral attributes, such as renewals, engagement, usage, and satisfaction scores.

    Identify motivations and possible incentives for advocate activities.

    Document
    Use slide 10 of the Executive Presentation Template to complete this exercise.

    2.3.2 Review and Refine Advocate Persona
    (60-300 min.)

    Review & Refine
    Place the Executive Presentation Template in a shared drive for team collaboration. Encourage the team to share persona knowledge within the shared drive version.

    Hold any necessary follow-up sessions to further refine persona.

    Validate
    Interview advocates that best represent your ideal advocate profile on their type of preferred involvement with your company, their role and needs when it comes to your solution, ways they'd be willing to advocate, and rewards sought.

    Confirm
    Incorporate feedback and inputs into slide 10 of the Executive Presentation Template. Ensure everyone agrees on persona developed.

    Tips & Reminders

    1. When identifying potential advocates, choose based on your most important audience.
    2. Ensure you're selecting those with the highest satisfaction scores.
    3. Ideally, select candidates that have, on their own, advocated previously such as in social posts, who may have acted as a reference, or who have been highly visible as a positive influence at customer events.
    4. Knowing motivations will determine the type of acts of advocacy they would be most willing to perform and the incentives for participating in the program.

    Consider the following criteria when identifying advocates and developing your ideal advocate persona:

    Demographics Firmographics Satisfaction & Needs/Value Sought Behavior Motivation
    Role - user, decision-maker, etc. Company size: # of employees Satisfaction score Purchase frequency & repeat purchases (renewals), upgrades Career building/promotion
    Department Company size: revenue NPS score Usage Collaboration with peers
    Geography CLV score Engagement (e.g. email opens, response, meetings) Educate others
    Industry Value delivered (outcomes, occasions used, etc.) Social media interaction, posts Influence (on product, service)
    Tenure as client Benefits sought
    Account size ($) Minimal and resolved service tickets, escalations
    1. When identifying potential advocates, choose based on your most important audience/segments. 2. Ensure you're selecting those with the highest satisfaction, NPS, and CLV scores. 3. When identifying potential advocates, choose based on high engagement and interaction, regular renewals, and high usage. 4. Knowing motivations will determine the type of acts of advocacy they would be most willing to perform and incentives for participating in the program.

    Phase 3: Win Executive Approval and Implement Pilot

    Steps
    3.1 Determine pilot goals and success metrics
    3.2 Establish timeline and create advocate communication materials
    3.3 Gain executive buy-in and implement pilot

    Phase Outcome

    • Clear objective for CA pilot
    • Key metrics for program success
    • Pilot timelines and milestones
    • Executive presentation with business case for CA

    Win executive approval and implement pilot

    Step 3.1 Determine pilot goals and success metrics

    Total duration: 2.0-4.0 hours

    Objective
    Set goals and determine the scope for the customer advocacy program pilot.

    Output

    • Documented business objectives for the pilot
    • Documented success metrics

    Participants

    • Customer advocacy lead
    • Key stakeholders
    • Sales lead
    • Marketing lead
    • Customer Success lead
    • Product lead

    MarTech
    May require to use, set up, or install platforms like:

    • Register to a survey platform
    • CRM or marketing automation platform

    Tools

    3.1.1 Establish Pilot Goals
    (60-120 min.)

    Set
    Organize a meeting with department heads and review organizational and individual department goals.

    Using the Venn diagram on slide 39 in this deck, identify customer advocacy goals that align with business goals. Select the highest priority goal for the pilot.

    Check that the goal aligns with benefits sought or addresses pain points identified in the previous phase.

    Document
    Document the goals on slides 9 and 16 of the Executive Presentation Template.

    3.1.2 Establish Pilot Success Metrics
    (60-120 min.)

    Decide
    Decide how you will measure the success of your program pilot using slide 40 in this document.

    Document
    Document metrics on slide 16 of the Executive Presentation Template.

    Tips & Reminders

    1. Don't boil the ocean. Pick the most important goal that can be achieved through the customer advocacy pilot to gain executive buy-in and support or resources for a formal customer advocacy program. Once successfully completed, you'll be able to tackle new goals and expand the program.
    2. Keep your metrics simple, few in number, and relatively easy to track

    Connect customer advocacy goals with organizational goals

    List possible customer advocacy goals, identifying areas of overlap with organizational goals by taking the following steps:

    1. List organizational/departmental goals in the green oval.
    2. List possible customer advocacy program goals in the purple oval.
    3. Enter goals that are covered in both the Organizational Goals and Customer Advocacy Goals sections into the Shared Goals section in the center.
    4. Highlight the highest priority goal for the customer advocacy program pilot to tackle.
    Organizational Goals Shared Goals Customer Advocacy Goals
    Example Example: Gain customer references to help advance sales and improve win rates Example: Develop pool of customer references
    [insert goal] [insert goal] Example: Gather customer feedback
    [insert goal] [insert goal] [insert goal]
    [insert goal] [insert goal] [insert goal]

    Customer advocacy success metrics for consideration

    This table provides a starting point for measuring the success of your customer advocacy pilot depending on the goals you've set.

    This list is by no means exhaustive; the metrics here can be used, or new metrics that would better capture success measurement can be created and tracked.

    Metric
    Revenue influenced by reference calls ($ / % increase)
    # of reference calls resulting in closed-won opportunities
    # of quotes collected
    % of community growth YoY
    # of pieces of product feedback collected
    # of acts of advocacy
    % membership growth
    % product usage amongst community members
    # of social shares, clicks
    CSAT score for community members
    % of registered qualified leads
    # of leads registered
    # of member sign-ups
    # of net-new referenceable customers
    % growth rate of products used by members
    % engagement rate
    # of published third-party reviews
    % increase in fulfilled RFPs

    When selecting metrics, remember:
    When choosing metrics for your customer advocacy pilot, be sure to align them to your specific goals. If possible, try to connect your advocacy efforts back to retention, growth, or revenue.

    Do not choose too many metrics; one per goal should suffice.

    Ensure that you can track the metrics you select to measure - the data is available and measuring won't be overly manual or time-consuming.

    Win executive approval and implement pilot

    Step 3.2 Establish timeline and create advocate communication materials

    Total duration: 2.5-8.0 hours

    Objective
    Outline who will be involved in what roles and capacities and what tasks and activities need to completed.

    Output

    • Timeline and milestones
    • Advocate program materials

    Participants

    • Customer advocacy lead
    • Key stakeholders
    • Sales lead
    • Marketing lead
    • Customer Success lead
    • Product lead

    MarTech
    None

    Tools

    3.2.1 Establish Timeline & Milestones
    (30-60 min.)

    List & Assign
    List all key tasks, phases, and milestones on slides 13, 14, and 15 in the Executive Presentation Template.

    Include any activities that help close gaps or address pain points from slide 9 in the Executive Presentation Template.

    Assign workstream leads on slide 15 in the Executive Presentation Template.

    Finalize all tasks and activities with working team.

    3.2.2 Design & Build Advocate Program Materials
    (180-300 min.)

    Decide
    Determine materials needed to recruit advocates and explain the program to advocate candidates.

    Determine the types of acts of advocacy you are looking for.

    Determine incentives/rewards that will be provided to advocates, such as access to new products or services.

    Build
    Build out all communication materials.

    Obtain incentives.

    Tips & Reminders

    1. When determining incentives, use the validated ideal advocate profile for guidance (i.e. what motivates your advocates?).
    2. Ensure to leave a buffer in the timeline if the need to adjust course arises.

    Win executive approval and implement pilot

    Step 3.3 Implement pilot and gain executive buy-in

    Total duration: 2.5-8.0 hours

    Objective
    Successfully implement the customer advocacy pilot program and communicate results to gain approval for full-fledged program.

    Output

    • Deliver Executive Presentation
    • Successful customer advocacy pilot
    • Provide regular updates to stakeholders, executives

    Participants

    • Customer advocacy lead
    • Workstream leads

    MarTech
    May require the use of:

    • CRM or Marketing Automation Platform
    • Available and up-to-date customer database

    Tools

    3.3.1 Complete & Deliver Executive Presentation
    (60-120 min.)

    Present
    Finalize the Executive Presentation.

    Hold stakeholder meeting and introduce the program pilot.

    3.3.2 Gain Executive Buy-in
    (60-300 min.)

    Pitch
    Present the final results of the customer advocacy pilot using the Executive Presentation Template and gain approval.

    3.3.3 Implement the Customer Advocacy Program Pilot
    (30-60 min.)

    Launch
    Launch the customer advocacy program pilot. Follow the timelines and activities outlined in the Executive Presentation Template. Track/document all advocate outreach, activity, and progress against success metrics.

    Communicate
    Establish a regular cadence to communicate with steering committee, stakeholders. Use the Executive Presentation Template to present progress and resolve roadblocks if/as they arise.

    Tips & Reminders

    1. Continually collect feedback and input from advocates and stakeholders throughout the process.
    2. Don't be afraid to make changes on the go if it helps to achieve the end goal of your pilot.
    3. If the pilot program was successful, consider scaling it up and rolling it out to more customers.

    Summary of Accomplishment

    Mission Accomplished

    • You successfully launched your customer advocacy program pilot and demonstrated clear benefits and ROI. By identifying the needs of the business and aligning those needs with key customer advocacy activities, marketers and customer advocacy leaders can prioritize the most important tasks for the pilot while also identifying potential opportunities for expansion pending executive approval.
    • SoftwareReviews' comprehensive and tactical approach takes you through the steps to build the foundation for a strategic customer advocacy program. Our methodology ensures that a customer advocacy pilot is developed to deliver the desired outcomes and ROI, increasing stakeholder buy-in and setting up your organization for customer advocacy success.

    If you would like additional support, contact us and we'll make sure you get the professional expertise you need.

    Contact your account representative for more information.
    info@softwarereviews.com
    1-888-670-8889

    Related SoftwareReviews Research

    Measure and Manage the Customer Satisfaction Metrics That Matter the Most
    Understand what truly keeps your customer satisfied. Measure what matters to improve customer experience and increase satisfaction and advocacy.

    • Understand the true drivers of satisfaction and dissatisfaction among your customer segments.
    • Establish process and cadence for effective satisfaction measurement and monitoring.
    • Know where resources are needed most to improve satisfaction levels and increase retention.

    Develop the Right Message to Engage Buyers
    Sixty percent of marketers find it hard to produce high-quality content consistently. SaaS marketers have an even more difficult job due to the technical nature of content production.

    • Create more compelling and relevant content that aligns with a buyer's needs and journey.
    • Shrink marketing and sales cycles.
    • Increase the pace of content production.

    Create a Buyer Persona and Journey
    Get deeper buyer understanding and achieve product-market fit, with easier access to market and sales.

    • Reduce time and resources wasted chasing the wrong prospects.
    • Increase open and click-through rates.
    • Perform more effective sales discovery.
    • Increase win rate.

    Bibliography

    "15 Award-Winning Customer Advocacy Success Stories." Influitive, 2021. Accessed 8 June 2023.

    "Advocacy Marketing." Influitive, June 2016. Accessed 26 Oct. 2021.

    Andrews, Marcus. "42% of Companies Don’t Listen to their Customers. Yikes." HubSpot, June 2019. Accessed 2 Nov. 2021.

    "Before you leap! Webcast." Point of Reference, Sept. 2019. Accessed 4 Nov. 2021.

    "Brand Loyalty: 5 Interesting Statistics." Factory360, Jan. 2016. Accessed 2 Nov. 2021.

    Brenner, Michael. "The Data Driven Guide to Customer Advocacy." Marketing Insider Group, Sept. 2021. Accessed 3 Feb. 2022.

    Carroll, Brian. "Why Customer Advocacy Should Be at the Heart of Your Marketing." Marketing Insider Group, Sept. 2017. Accessed 3 Feb. 2022.

    Cote, Dan. "Advocacy Blooms and Business Booms When Customers and Employees Engage." Influitive, Dec. 2021. Accessed 3 Feb. 2022.

    "Customer Success Strategy Guide." ON24, Jan. 2021. Accessed 2 Nov. 2021.

    Dalao, Kat. "Customer Advocacy: The Revenue-Driving Secret Weapon." ReferralRock, June 2017. Accessed 7 Dec. 2021.

    Frichou, Flora. "Your guide to customer advocacy: What is it, and why is it important?" TrustPilot, Jan. 2020. Accessed 26 Oct. 2021.

    Gallo, Amy. "The Value of Keeping the Right Customers." Harvard Business Review, Oct. 2014. Accessed 10 March 2022.

    Huhn, Jessica. "61 B2B Referral Marketing Statistics and Quotes." ReferralRock, March 2022. Accessed 10 March 2022.

    Kemper, Grayson. "B2B Buying Process: How Businesses Purchase B2B Services and Software." Clutch, Feb. 2020. Accessed 6 Jan. 2022.

    Kettner, Kyle. "The Evolution of Ambassador Marketing." BrandChamp.io, Oct. 2018. Accessed 2 Nov. 2021.

    Landis, Taylor. "Customer Retention Marketing vs. Customer Acquisition Marketing." OutboundEngine, April 2022. Accessed 23 April 2022.

    Miels, Emily. "What is customer advocacy? Definition and strategies." Zendesk Blog, June 2021. Accessed 27 Oct. 2021.

    Mohammad, Qasim. "The 5 Biggest Obstacles to Implementing a Successful B2B Customer Advocacy Program." HubSpot, June 2018. Accessed 6 Jan. 2022.

    Murphy, Brandon. "Brand Advocacy and Social Media - 2009 GMA Conference." Deloitte, Dec. 2009. Accessed 8 June 2023.

    Patel, Neil. "Why SaaS Brand Advocacy is More Important than Ever in 2021." Neil Patel, Feb. 2021. Accessed 4 Nov. 2021.

    Pieri, Carl. "The Plain-English Guide to Customer Advocacy." HubSpot, Apr. 2020. Accessed 27 Oct. 2021.

    Schmitt, Philipp; Skiera, Bernd; Van den Bulte, Christophe. "Referral Programs and Customer Value." Wharton Journal of Marketing, Jan. 2011. Accessed 8 June 2023.

    "The Complete Guide to Customer Advocacy." Gray Group International, 2020. Accessed 15 Oct. 2021.

    "The Customer-powered Enterprise: Playbook." Influitive, Gainsight & Pendo. 2020. Accessed 26 Oct. 2021.

    "The Winning Case for a Customer Advocacy Solution." RO Innovation, 2017. Accessed 26 Oct. 2021.

    Tidey, Will. "Acquisition vs. Retention: The Importance of Customer Lifetime Value." Huify, Feb. 2018. Accessed 10 Mar. 2022.

    "What a Brand Advocate Is and Why Your Company Needs One." RockContent, Jan. 2021. Accessed 7 Feb. 2022.

    "What is Customer Advocacy? A Definition and Strategies to Implement It." Testimonial Hero, Oct. 2021. Accessed 26 Jan. 2022.

    Equip Managers to Effectively Manage Virtual Teams

    • Buy Link or Shortcode: {j2store}600|cart{/j2store}
    • member rating overall impact: 9.7/10 Overall Impact
    • member rating average dollars saved: $20,240 Average $ Saved
    • member rating average days saved: 4 Average Days Saved
    • Parent Category Name: Manage & Coach
    • Parent Category Link: /manage-coach
    • Virtual team members must rely upon collaboration technology to communicate and collaborate.
    • Management practices and approaches that work face to face do not always translate effectively in virtual contexts.
    • Managers cannot rely upon spontaneous social interactions that happen organically when people are colocated to build meaningful and trusting relationships. Space and time need to be created in a virtual environment for this to happen.
    • Observing an employee’s performance or development can be more difficult, and relying on others’ feedback becomes more critical for managing performance and development.

    Our Advice

    Critical Insight

    • Managing virtual teams does not require developing new manager competencies. Instead, managers need to “dial up” competencies they already have and adjust their approaches.
    • Setting clear expectations with virtual teams creates the foundation needed to manage them effectively.
    • Virtual employees crave more meaningful interactions about performance and development with their managers.

    Impact and Result

    • Create a solid foundation for managing virtual teams by setting clear expectations and taking a more planful approach to managing performance and employee development.
    • Dial up key management competencies that you already have. Managers do not need to develop new competencies; they just need to adjust and refocus their approaches.

    Equip Managers to Effectively Manage Virtual Teams Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Equip managers to effectively manage virtual teams

    Equip managers to become more effective with managing remote teams.

    The workbook serves as a reference guide participants will use to support formal training.

    • Training Deck: Equip Managers to Effectively Manage Virtual Teams
    • Workbook: Equip Managers to Effectively Manage Virtual Teams
    • Standard Participant Training Session Evaluation Template

    2. Additional Resources

    Many organizations are developing plans to allow employees more flexible work options, including remote work. Use these resources to help managers and employees make the most of remote work arrangements.

    • Work-From-Home Tips for Managers
    • Work-From-Home Tips for Employees
    • Health & Safety at Home Infographic
    • Wellness and Working From Home
    • Ergonomic Workspaces Infographic
    [infographic]

    Further reading

    Equip Managers to Effectively Manage Virtual Teams

    Learning objectives

    Describe the benefits of virtual teams.

    Create a plan for adopting effective management practices and setting clear expectations with virtual teams.

    Identify potential solutions to the challenges of managing performance and developing members of virtual teams.

    Create an action plan to increase effectiveness in managing virtual teams.

    Target audience

    People managers who manage or plan to manage virtual teams.

    Training length

    Two three-hour sessions

    Training material

    • Use the speaker’s notes in the notes pane section of each slide to plan and practice the training session.
    • Activity slides are scattered throughout this training deck and are clearly numbered in the slide title.
    • Notes in italics are written to the facilitator and are not meant to be read aloud.
    • Download the Workbook for participants to use.

    Suggested materials for activities:

    • Index cards or sticky notes
    • Markers
    • Whiteboard/large table space/flip chart

    Agenda & activities

    Section 1

    Section 2

    10 min

    Welcome: Overview & Introductions

    • Introductions
    10 min

    Welcome: Overview & Introductions

    • Session 1 Review
    • Session 2 Overview
    50 min

    1.1 Introduction to virtual teams

    • What kind of virtual team do you lead?
    • Virtual team benefits and challenges
    55 min

    2.1 Managing wellbeing in a virtual team context

    • Share current practices and challenges regarding wellbeing in virtual teams
    • Identify and discuss proposed solutions
    • Develop draft action plan for managing wellbeing in a virtual team context
    5 min

    Break

    5 min Break
    45 min

    1.2 Laying the foundation for a virtual team

    • Identify behaviors to better inform, interact with, and involve team members
    60 min

    2.2 Managing performance in a virtual team context

    • Share current performance management practices for virtual teams
    • Identify challenges of current practices and propose solutions
    • Develop draft action plan for managing performance in a virtual team context
    10 min

    Break

    10 min Break
    55 min

    1.2 Laying the foundation for a virtual team

    • Identify and share ways you prefer to communicate for different activities
    • Develop draft action plan for laying the foundation for a virtual team
    40 min

    Action planning & conclusion

    • Refine consolidated action plan (three parts) and commit to implementing it
    • Key takeaways
    5 min

    Session 1 Wrap-Up

    Recommended Customization

    Review all slides and adjust the language or content as needed to suit your organizational context and culture.

    The pencil icon to the left denotes slides requiring customization of the slide and/or the speaker’s notes, e.g. adding in an organization-specific process.

    Customization instructions are found in the notes pane.

    Tips

    • Adjust the speaker’s notes on the slides before (or after) any slides you modify or delete to ensure logical transitions between slides.
    • Update the agenda to reflect new timings if major modifications are made.
    • Even seasoned leaders need to be reminded of the basics now and again. Rather than delete more basic slides, cut back on the amount of time spent covering them and frame the content as a refresher.
    • Participant Workbooks
    • Relevant organization-specific documents (see side panel)
    • Training Session Feedback Form

    Required Information

    • Communication guidelines for managers (e.g. cadence of manager interactions)
    • Performance management process and guidelines
    • Employee development guidelines
    • List of available resources (e.g. social collaboration tools)

    Effectively Manage Virtual Teams

    Section 1.1

    Practical foundations for managing teams in a remote environment

    Feasibility of virtual IT teams

    Most organizations are planning some combination of remote and onsite work in 2022.

    This is an image of a bar graph demonstrating the percentage of companies who have the following plans for return to work: Full work-from-home (All employees WFH permanently) - 4% ; No work-from-home permitted	9% ; Partial work-from-home team (Eligible employees can WFH for a certain portion of their work week)	23% ; Balanced work-from-home team (All employees can WFH for a certain portion of their work week)	28% ; Hybrid work-from-home team (Eligible employees WFH on a full-time basis)	37%

    Source: IT Talent Trends, 2022; n=199

    Speaker’s Notes:

    Most organizations are planning some combination of remote and onsite work in 2022 – the highest reported plans for WFH were hybrid, balanced, and partial work-from-home. This builds on our findings in the IT Talent Trends 2022 report.

    Feasibility of virtual IT teams

    What percentage of roles in IT are capable of being performed remotely permanently?

    Approximately what percentage of roles in IT are capable of being performed remotely permanently?

    0% to less than 10%: 3%; 10% to less than 25%: 5%; 25% to less than 50%: 12%; 50% to less than 75%: 30%; 75% to 100%L 50%.

    IT Talent Trends, 2022; n=207

    Speaker’s Notes:

    80% of respondents estimated that 50 to 100% of IT roles can be performed remotely.

    Virtual teams take all kinds of forms

    A virtual team is any team that has members that are not colocated and relies on technology for communications.

    This image depicts the three levels of virtual teams, Municipal; National; Global.

    Speaker’s Notes:

    Before we start, it will be useful to review what we mean by the term “virtual team.” For our purposes we will be defining a virtual team as any team that has members that are not colocated and relies on technology for communications.

    There are a wide variety of virtual work arrangements and a variety of terms used to describe them. For example, some common terms include:

    • “Flexible work arrangements”: Employees have the option to work where they see fit (within certain constraints). They may choose to work from the office, home, a shared office space, the road, etc.
    • “Remote work,” “work from home,” and “telecommuting”: These are just various ways of describing how or where people are working virtually. They all share the idea that these kinds of employees are not colocated.
    • “Multi-office team”: the team members all work in office environments, but they may not always be in the same office as their team members or manager.

    Our definition of virtual work covers all of these terms. It is also distance neutral, meaning that it applies equally to teams that are dispersed globally or regionally or even those working in the same cities but dispersed throughout different buildings. Our definition also applies whether virtual employees work full time or part time.

    The challenges facing managers arise as soon as some team members are not colocated and have to rely on technology to communicate and coordinate work. Greater distances between employees can complicate challenges (e.g. time zone coordination), but the core challenges of managing virtual teams are the same whether those workers are merely located in different buildings in the same city or in different buildings on different continents.

    1.1 What kind of virtual team do you lead?

    15 Minutes

    Working on your own, take five minutes to figure out what kind of virtual team you lead.

    1. How many people on your team work virtually (all, most, or a small percentage)?
    2. How often and how regularly do they tend to work virtually (full time, part time regularly, or part time as needed)?
    3. What kinds of virtual work arrangements are there on your team (multi-site, work from home, mobile employees)?
    4. Where do your workers tend to be physically located (different offices but in the same city/region or globally dispersed)?
    5. Record this information in your workbook.
    6. Discuss as a group.

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Size of virtual team
    • Current remote work practices

    Output

    • Documented list of current state of remote work

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Advantages

    Benefits to the organization

    Benefits to employees

    Operational continuity in disaster situations that prevent employees from coming into the office.

    Cost savings: Employees who WFH half the time can save $2,500 to $4,000 per year (Global Workplace Analytics, 2021).

    Cost savings: Organizations save ~$11,000 annually per employee working from home half the time (Global Workplace Analytics, 2021).

    Time savings: Employees who WFH half the time save on average 11 workdays per year (Global Workplace Analytics, 2021).

    Increased attraction: 71% of employees would likely choose one employer over another based on WFH offerings (Owl Labs, 2021).

    Improved wellbeing:

    83% employees agree that WFH would make them happier.

    80% agree that WFH would decrease their stress.

    81% agree that WFH would improve their ability to manage their work-life balance.

    (Owl Labs, 2021)

    Increased retention: 74% of employees would be less likely to leave their employer if they could WFH (Owl Labs, 2021).

    Increased flexibility: 32% of employees rated the “ability to have a flexible schedule” as the biggest benefit of WFH (OWL Labs, 2021).

    Increased productivity: 50% of employees report they would maintain or increase their productivity while working from home (Glassdoor Team, 2020).

    Increased engagement: Offsite employees tend to have higher overall engagement than onsite employees (McLean & Company Engagement Survey, 2020).

    Speaker’s Notes:

    Remote work arrangements are becoming more and more common, and for good reason: there are a lot of benefits to the organization – and to employees.

    #1: Save Money

    Perhaps one of the most common reasons for opting for remote-work arrangements is the potential cost savings. One study found that organizations could save about $11,000 per employee working from home half the time (Global Workplace Analytics, 2021).

    #2 Increased Attraction

    In addition, supporting remote-work arrangements can attract employees. One study found that 71% of employees would likely choose one employer over another based on WFH offerings (Owl Labs, 2019).

    #3 Improve productivity.

    There are also improvements to productivity. Fifty percent of employees report they would maintain or increase their productivity while working from home (Glassdoor Team, 2020).

    Remote work also has benefits to employees.

    #1: Save Money

    As with organizations, employees also benefit financially from remote work arrangements, saving between $2,500 and $4,000 and on average 11 working days while working from home half of the time.

    #2: Improved Wellbeing

    Most employees agree that working from home makes them happier, reduces stress, and provides an improved work-life balance through increased flexibility.

    Challenges

    Organizations

    • Concerns that WFH may stifle innovation (Scientific American, 2021), likely due to the potential lack of collaboration and knowledge sharing.
    • Fewer organic opportunities for informal interaction between employees working from home means active efforts are required to foster organizational culture.

    Leaders

    • 42% of managers believe that monitoring the productivity of their direct reports is a top challenge of WFH (Ultimate Software, 2019).
    • The lack of in-person supervision compounded with a lack of trust in employees leads many leaders to believe that WFH will result in a drop in productivity.

    Employees

    • 20% of employees report collaboration/communication as their top struggle with WFH (Owl Labs, 2021).
    • Employees often experience burnout from working longer hours due to the lack of commute, blurring of work and home life, and the perceived need to prove their productivity.

    Many of these barriers can be addressed by changing traditional mindsets and finding alternative ways of working, but the traditional approach to work is so entrenched that it has been hard to make the shift.

    Speaker’s Notes:

    Many organizations are still grappling with the challenges of remote work. Some are just perceived challenges, while others are quite real.

    Limited innovation and a lack of informal interaction are a potential consequence of failing to properly adapt to the remote-work environment.

    Leaders also face challenges with remote work. Losing in-person supervision has led to the lack of trust and a perceived drop in productivity.

    A study conducted 2021 asked remote workers to identify their biggest struggle with working remotely. The top three struggles remote workers report facing are unplugging after work, loneliness, and collaborating and/or communicating.

    Seeing the struggles remote workers identify is a good reminder that these employees have a unique set of challenges. They need their managers to help them set boundaries around their work; create feelings of connectedness to the organization, culture, and team; and be expert communicators.

    1.2 Virtual teams: benefits and challenges

    20 Minutes

    1. Discuss and list:
      1. Any positives you’ve experienced since managing virtual employees.
      2. Any challenges you’ve had to manage connected to managing virtual employees.
    2. Record information in the workbook.

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Personal experiences managing remote teams

    Output

    • List of benefits and challenges of remote work

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Effectively Manage Virtual Teams

    Section 1.2

    Laying the foundations for a virtual team

    The 3i’s: Inform, interact, and involve your way to effective management:

    Inform

    Interact Involve

    ↓ Down

    Connect

    ↑ Up

    Tell employees the whys

    Get to know employees

    Solicit input from employees

    Speaker’s Notes:

    Effectively managing a virtual team really comes down to adopting management approaches that will engage virtual employees.

    Managing a virtual team does not actually require a new management style. The basics of effective management are the same in both colocated and virtual teams; however, the emphasis on certain behaviors and actions we take often differs. Managing a virtual team requires much more thoughtfulness and planning in our everyday interactions with our teams as we cannot rely on the relative ease of face-to-face interactions available to colocated teams.

    The 3i’s Engaging Management Model is useful when interacting with all employees and provides a handy framework for more planful interactions with virtual employees.

    Think of your management responsibilities in these three buckets – they are the most important components of being an effective manager. We’re first going to look at inform and involve before moving on to interact.

    Inform: Relay information down from senior management and leaders to employees. Communicate the rationale behind decisions and priorities, and always explain how they will directly affect employees.

    Why is this important? According to McLean & Company’s Engagement Survey data, employees who say their managers keep them well informed about decisions that affect them are 3.4 times more likely to be engaged (Source: McLean & Company, 2020; N=77,363). Your first reaction to this might be “I already do this,” which may very well be the case. Keep in mind, though, we sometimes tend to communicate on a “need-to-know basis,” especially when we are stressed or short on time. Engaging employees takes more. Always focus on explaining the “why?” or the rationale behind business decisions.

    It might seem like this domain should be the least affected, since important company announcements probably continue in a remote environment. But remember that information like that also flows informally. And even in formal settings, there are question-and-answer opportunities. Or maybe your employee might come to your office to ask for more details. Virtual team members can’t gather around the watercooler. They don’t have the same opportunities to hear information in passing as people who are colocated do, so managers need to make a concerted effort to share information with virtual team members in a clear and timely way.

    Swinging over to the other end, we have involve: Involve your employees. Solicit information and feedback from employees and collaborate with them.

    However, it’s not enough to just solicit their feedback and input; you also need to act on it.

    Make sure you involve your employees in a meaningful way. Such collaboration makes employees feel like a valued part of the team. Not to mention that they often have information and perspectives that can help make your decisions stronger!

    Employees who say their department leaders act on feedback from them are 3.9 times more likely to be engaged than those whose leaders don’t. (Source: McLean & Company, 2020; N=59,779). That is a huge difference!

    Keeping virtual employees engaged and feeling connected and committed to the organization requires planful and regular application of the 3i’s model.

    Finally, Interact: Connect with employees on a personal level; get to know them and understand who they are on a personal and professional level.

    Why? Well, over and above the fact that it can be rewarding for you to build stronger relationships with your team, our data shows that human connection makes a significant difference with employees. Employees who believe their managers care about them as a person are 3.8 times more likely to be engaged than those who do not (Source: McLean & Company, 2017; N=70,927).

    And you might find that in a remote environment, this is the area that suffers the most, since a lot of these interactions tend to be unscripted, unscheduled, and face to face.

    Typically, if we weren’t in the midst of a pandemic, we’d emphasize the importance of allocating some budget to travel and get some face-to-face time with your staff. Meeting and interacting with team members face to face is crucial to building trusting relationships, and ultimately, an effective team, so given the context of our current circumstances, we recommend the use of video when interacting with your employees who are remote.

    Relay information down from senior management to employees.

    Ensure they’ve seen and understand any organization-wide communication.

    Share any updates in a timely manner.

    Connect with employees on a personal level.
    Ask how they’re doing with the new work arrangement.
    Express empathy for challenges (sick family member, COVID-19 diagnosis, etc.).
    Ask how you can support them.
    Schedule informal virtual coffee breaks a couple of times a week and talk about non-work topics.

    Get information from employees and collaborate with them.
    Invite their input (e.g. have a “winning remotely” brainstorming session).
    Escalate any challenges you can’t address to your VP.
    Give them as much autonomy over their work as possible – don’t micromanage.

    1.3 Identify behaviors to inform, interact with, and involve team members

    20 Minutes

    Individually:

    1. Identify one behavior for each of Inform, Interact, and Involve to improve.
    2. Record information in the workbook.

    As a group:

    1. Discuss behaviors to improve for each of Inform, Interact, and Involve and record new ideas to incorporate into your leadership practice.

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • 3i's Model
    • Current leadership behaviors to improve

    Output

    • List of behaviors to better inform, interact, and involve team members

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Laying the foundation: Set clear expectations

    Tasks

    • What are the daily and weekly team activities? How do they affect one another?

    Goals

    • Clarify any adjustments to strategy based on the situation; clarify metrics.

    Communication

    • How often and when will you check in? What should they come to you for? What modalities will you use and when?

    Roadblocks

    • Involve your team in deciding how to handle roadblocks and challenges.

    Speaker’s Notes:

    Clear expectations are important in any environment, remote or not. But it is much harder to do in a remote environment. The barrier to seeking clarification is so much higher (For example, email vs. catching someone in hallway, or you can’t notice that a colleague is struggling without them asking).

    Communication – This is one area where the importance actually changes in a remote context. We’ve been talking about a lot of practices that are the same in importance whether you’re in an office or remote, and maybe you just enact them differently. But clarity around communication processes is actually tremendously more important in a remote environment.

    Adopt a five-step process to set specific and documented expectations

    1. Check in with how your team member is doing on a daily basis. Don’t forget to ask how they are doing personally.
    2. Follow up on previously set expectations. Ask how things are going. Discuss if priorities or expectations have changed and update expectations accordingly.
    3. Ask if they are experiencing any roadblocks and collaborate to find solutions.
    4. Provide feedback and recognition as appropriate.
    5. Document newly set expectations – either through a collaboration tool or through email.

    Speaker’s Notes:

    Suggested best practices: Hold daily team check-ins and hold separate individual check-ins. Increase frequency of these.

    During Check-in
    1. Set up a running Teams chat for your team.
    • This is your community. You must be the biggest cheerleader and keep the team feeling like they are contributing. Make sure everyone is involved.
  • Start each workday with a video scrum to discuss what’s coming today for your team.
    • Ask: What are you planning to work on today? Are there any roadblocks I can help with? Technology working OK?
  • Right after your team meeting, set up an “every morning video call” one-on-one meeting with each team member (5-10 minutes max).
    • Ask: What are you working on today? What will your momentum metrics be? What do you need from me?
  • Set up a separate video call at the end of the afternoon to review what everyone did (5 minutes max).
    • Ask: What went well? What went poorly? How can we improve?
  • After a Check-in
    1. Be accessible:
      • Ensure your team knows the best way to get in touch with you.
      • Email is not ideal for informal, frequent contact – use messaging instead.
    2. Be available:
      • Keep a running conversation going in Teams.
      • Respond in a timely manner; address issues quickly so that your team has what they need to succeed.
      • Let your team know if you’ll be away/offline for longer than an hour during the workday and ask them to do the same (e.g. for an appointment).
      • Help address roadblocks, answer questions, clarify priorities, etc.

    Define communication requirements

    • Set up an ongoing communication with your team.
      • E.g. a running conversation on Slack or Teams
    • Schedule daily virtual meetings and check-ins.
      • This can help to maintain a sense of normalcy and conduct a pulse check on your team.
    • Use video for important conversations.
      • Video chat creates better rapport, shows body language, and lessens feelings of isolation, but it can be taxing.
    • Set expectations about communication.
      • Differentiate between day-to-day communication and updates on the state of events.
    • Clearly communicate the collaboration toolkit.
      • What do we have available? What is the purpose of each?

    Speaker’s Notes:

    With organizational expectations set, we need to establish team expectations around how we collaborate and communicate.

    Today there is no lack of technology available to support our virtual communication. We can use the phone, conference calls, videoconferencing, Skype, instant messaging, [insert organization-specific technological tools.], etc.

    However, it is important to have a common understanding of which tools are most appropriate when and for what.

    What are some of the communication channel techniques you’ve found useful in your informal interactions with employees or that you’ve seen work well between employees?

    [Have participants share any technological tools they find useful and why.]

    Check in with your team on communication requirements

    • Should we share our calendars, hours of availability, and/or IM status?
    • How often should we meet as a team and one on one? Should we institute a time when we should not communicate virtually?
    • Which communication channel should we use in what context? How should we decide which communication method to use?
    • Should I share guidelines for email and meeting etiquette (or any other communication methods)?
    • Should we establish a new team charter?
    • What feedback does the team have regarding how we’ve been communicating?

    Speaker’s Notes:

    Whenever we interact, we make the following kinds of social exchanges. We exchange:

    • Information: Data or opinions
    • Emotions: Feelings and evaluations about the data or opinions
    • Motivations: What we feel like doing in response to data or opinions

    We need to make sure that these exchanges are happening as each team member intends. To do this, we have to be sensitive to what information is being conveyed, what emotions are involved in the interaction, and how we are motivating each other to act through the interaction. Every interaction will have intended and unintended effects on others. No one can pay attention to all of these aspects of communication all the time, but if we develop habits that are conducive to successful exchanges in all three areas, we can become more effective.

    In addition to being mindful of the exchange in our communication, as managers it is critical to build trusting relationships and rapport with employees as we saw in the 3i's model. However, in virtual teams we cannot rely on running into someone in the kitchen or hallway to have an informal conversation. We need to be thoughtful and deliberate in our interactions with employees. We need to find alternative ways to build these relationships with and between employees that are both easy and accepted by ourselves and employees. Because of that, it is important to set communication norms and really understand each other’s preferences. For example:

    • Timing of responses. Set the expectation that emails should be responded to within X hours/days unless otherwise noted in the actual email.
    • When it’s appropriate to send an email vs. using instant messaging.
    • A team charter – the team’s objectives, individual roles and responsibilities, and communication and collaboration guidelines.

    1.4 Identify and share ways you prefer to communicate for different activities

    20 Minutes

    1. Brainstorm and list the different types of exchanges you have with your virtual employees and they have with each other.
    2. List the various communication tools in use on your team.
    3. Assign a preferred communication method for each type of exchange

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Current types of exchanges on team
    • Communication methods used

    Output

    • Defined ways to communicate for each communication method

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Effectively Manage Virtual Teams

    Section 2.1
    Balancing wellbeing and performance in a virtual team context

    The pandemic has taken a significant toll on employees’ mental wellbeing

    44% of employees reported declined mental wellbeing since the start of the pandemic.

    • 44% of those who work from home.
    • 34% of those who have other work arrangements (i.e. onsite).
      (Qualtrics, 2020)

    "If one of our colleagues were to fall, break their leg, and get a cast, colleagues would probably rally around that person signing their cast. But, really, we don’t view the health of our brain the same as we do the health of our body."
    – Centre for Addiction and Mental Health (CAMH) Employee

    Speaker’s Notes:

    Despite being over two years into the pandemic, we are still seeing its effect on the physical and mental health of employees.

    The mental health aspect has been often overlooked by organizations, but in order to have a safe, happy, and productive team, you need to give mental health the same level of focus as physical heath. This requires a change in mindset in order for you as a leader to support your team's mental wellbeing during the pandemic and beyond.

    Employees are reporting several key mental wellbeing challenges

    Stress: 67%

    Employees report increasingly high levels of stress from the onset of COVID-19, stating that it has been the most stressful time in their careers.
    (Qualtrics, 2020)

    Anxiety: 57%

    Similarly, employees’ anxiety levels have peaked because of the pandemic and the uncertainty it brings.
    (Qualtrics, 2020)

    Four main themes surrounding stress & anxiety

    • Fear of contracting COVID-19
    • Financial pressures
    • Job security and uncertainty
    • Loneliness caused by social isolation

    Speaker’s Notes:

    The stress and uncertainty about the future caused by the pandemic and its fallout are posing the biggest challenges to employees.

    Organizations shutting down operations, moving to fully remote, or requiring some of their employees to be on site based on the current situation causes a lot of anxiety as employees are not able to plan for what is coming next.

    Adding in the loss of social networks and in-person interactions exacerbates the problem employees are facing. As leaders, it is your job to understand and mitigate these challenges wherever possible.

    Re-examine your workplace barriers to mental wellbeing

    New Barriers

    Old Barriers

    • Childcare/eldercare responsibilities
    • Fear of workplace health risks
    • Work location
    • Lost support networks
    • Changed work schedules
    • Social distancing
    • Workload
    • Fear of stigma
    • Benefits limits
    • Limits to paid time off
    • Lack of manager knowledge

    Key considerations:

    • Work Environment
      • Accessibility of mental wellbeing programs and initiatives
    • Organizational Culture
      • Modeling of wellbeing
      • Paid time off
      • Discussions around mental wellbeing
    • Total Rewards
      • Benefits coverage
      • Employee assistance programs (EAPs)
      • Manager knowledge

    Speaker’s Notes:

    Organizational barriers to mental wellbeing are sadly not new. Workloads, stigma around mental health, lack of sick days, and limits to benefits for mental health supports were challenges before the pandemic. Adding in the new barriers can very easily result in a tipping point for many employees who are simply not equipped to deal with or supported in dealing with the added burden of remote work in a post-pandemic world.

    To provide the needed support to your employees, it’s important to be mindful of the key considerations.

    Holistic employee wellbeing has never been more critical than it is right now

    Employee Wellbeing

    Physical

    The physical body; ensuring a person has the freedom, opportunities, and resources needed to sustainably maintain bodily health.

    Mental

    The psychological ability to cope with information, emotions, desires, and stressors (e.g. change, threats, etc.) in a healthy and balanced way. Essential for day-to-day living and functioning.

    Social

    The state of personal and professional relationships, including personal and community engagement. The capability for genuine, authentic, and mutually affirming interactions with others.

    Financial

    The state of a person’s finances; ensuring that a person feels capable to handle their financial situation and behaviors. The ability to live productively without the weight of financial stress.

    Speaker’s Notes:

    As a manager, you need to be mindful of all of these. Create an atmosphere where people are able to come to you for help if they are struggling in one of these areas. For example, some people might be more comfortable raising physical safety or comfort concerns (personal protective equipment, ergonomics) than concerns about mental health. Or they might feel like their feelings of loneliness are not appropriate to bring into their professional life.

    Wellbeing is a delicate subject, and most of the time, people are reluctant to talk about it. It requires vulnerability. And here’s the thing about it: Your staff will not drive a change in your team around making these topics more acceptable. It has to be the manager. You have to be the one to not just tell but show them that it’s OK to talk about this

    Encourage human-centered workplace behaviors

    Promote empathy as a focus value

    • Listen and show compassion.
    • Allow room for emotions.

    Encourage social connection

    • Leverage networks.
    • Infuse fun where possible.
    • Encourage community and sense of joint purpose.

    Cultivate a growth mindset

    • Encourage mindfulness and resilience.
    • Express gratitude.

    Empower others

    • Ask employees what they need and co-create solutions.
    • Integrate needs of personal and family life with work life.
    • Be clear on accountability.

    Speaker’s Notes:

    As a leader, your focus should be on encouraging the right behaviors on your team and in yourself.
    Show empathy; allowing room for emotion and showing you are willing and able to listen goes a long way to establishing trust.

    A growth mindset applies to resilience too. A person with a growth mindset is more likely to believe that even though they’re struggling now, they will get through it.

    Infuse fun – schedule social check-ins. This is not wasted time, or time off work – it is an integral part of the workday. We have less of it now organically, so you must bring it back deliberately. Remember that theme? We are deliberately reinfusing important organic elements into the workday.

    The last item, empowerment, is interesting – being clear on accountability. Have clear performance expectations. It might sound like telling people what to do would be disempowering, but it’s the opposite. By clarifying the goals of what they need to achieve, you empower them to invent their own “how,” because you and they are both sure they will arrive at the place that you agreed on. We will talk more about this in performance management.

    Emphasize the importance of wellbeing by setting the tone for the team

    Managers must…

    • LEAD BY EXAMPLE
      • Employees look to their managers for cues about how to react in a crisis. If the manager reacts with stress and fear, the team will follow.
    • ENCOURAGE OPEN COMMUNICATION
      • Frequent check-ins and transparent communication are essential during a time of crisis, especially when working remotely.
    • ACKNOWLEDGE THE SITUATION
      • Recognizing the stress that teams may be facing and expressing confidence in them goes a long way.
    • PROMOTE WELLBEING
      • Managers who take care of themselves can better support their teams and encourage them to practice good self-care too.
    • REDUCE STIGMA
      • Reducing stigma around mental health encourages people to come forward with their struggles and get the support they need.

    Speaker’s Notes:

    Emphasize the importance of wellbeing with what you do. If you do not model self-care behavior, people will follow what you do, not what you say.

    Lead by example – Live the behaviors you want to see in your employees. If you show confidence, positivity, and resiliency, it will filter down to your team.

    Encourage open communication – Have regular meetings where your team is able to set the agenda, or allow one-on-ones to be guided by the employee. Make sure these are scheduled and keep them a priority.

    Acknowledge the situation – Pretending things are normal doesn’t help the situation. Talk about the stress that the team is facing and express confidence that you will get through it together.

    Promote wellbeing – Take time off, don’t work when you’re sick, and you will be better able to support your team!

    Reduce stigma – Call it out when you see it and be sure to remind people of and provide access to any supports that the organization has.

    Conduct dedicated conversations around wellbeing

    1. Check in with how each team member is doing frequently and ask how they are doing personally.
    2. Discuss how things are going. Ask: “How is your work situation working out for you so far? Do you feel supported? How are you taking care of yourself in these circumstances?”
    3. Ask if there are any stressors or roadblocks that they have experienced and collaborate to find solutions.
    4. Provide reassurance of your support and confidence in them.
    5. Document the plan for managing stressors and roadblocks – either through a collaboration tool or through email.

    Speaker’s Notes:

    Going back to the idea of a growth mindset – this may be uncomfortable for you as a manager. So here’s a step-by-step guide that over time you can morph into your own style.

    With your team – be prepared to share first and to show it is OK to be vulnerable and address wellbeing seriously.

    1. Make sure you make time for the personal. Ask about their lives and show compassion.
    2. Give opportunities for them to bring up things that might stay hidden otherwise. Ask questions that show you care.
    3. Help identify areas they are struggling with and work with them to move past those areas.
    4. Make sure they feel supported in what they are going through and reassured of their place on the team.
    5. Roll wellbeing into your planning process. This signals to team that you see wellbeing as important, not just a checklist to cover during a team meeting, and are ready to follow through on it.

    Recognize when professional help is needed

    SIGNS OF BURNOUT: Overwhelmed; Frequent personal disclosure; Trouble sleeping and focusing; Frequent time off; Strained relationships; Substance abuse; Poor work performance

    Speaker’s Notes:

    As a leader, it is important to be on the lookout for warning signs of burnout and know when to step in and direct individuals to professional help.

    Poor work performance – They struggle to maintain work performance, even after you’ve worked with them to create coping strategies.

    Overwhelmed – They repeatedly tell you that they feel overwhelmed, very stressed, or physically unwell.

    Frequent personal disclosure – They want to discuss their personal struggles at length on a regular basis.

    Trouble sleeping and focusing – They tell you that they are not sleeping properly and are unable to focus on work.

    Frequent time off – They feel the need to take time off more frequently.

    Strained relationships – They have difficulty communicating effectively with coworkers; relationships are strained.

    Substance abuse – They show signs of substance abuse (e.g. drunk/high while working, social media posts about drinking during the day).

    Keeping an eye out for these signs and being able to step in before they become unmanageable can mean the difference between keeping and losing an employee experiencing burnout.

    Remember: Managers also need support

    • Added burden
    • Lead by example
    • Self-care

    Speaker’s Notes:

    If you’ve got managers under you, be mindful of their unique stressors. Don’t forget to check in with them, too.

    If you are a manager, remember to take care of yourself and check in with your own manager about your own wellbeing.

    2.1 Balance wellbeing and performance in a virtual team context

    30 Minutes

    1. Brainstorm and list current practices and challenges connected to wellbeing on your teams.
    2. Choose one or two wellbeing challenges that are most relevant for your team.
    3. Discuss as a group and identify one solution for each challenge that you can put into action with your own virtual team. Document this under “Action plan to move forward” on the workbook slide “2.1 Balancing wellbeing and performance in a virtual team context.”

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Current practices and challenges connected to wellbeing

    Output

    • Action plan for each challenge listed

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Effectively Manage Virtual Teams

    Section 2.2

    Managing performance in a virtual team context

    Virtual employees are craving more meaningful interactions with their managers

    A survey indicated that, overall, remote employees showed less satisfaction with manager interactions compared to other non-remote employees.

    1. 16% less likely to strongly agree their manager involves them in setting goals at work.
    2. 28% less likely to strongly agree they continually work with their manager to clarify work priorities.
    3. 29% less likely to strongly agree they have reviewed their greatest successes with their manager in the last six months.
    4. 30% less likely to strongly agree they have talked with their manager about progress toward goals in the last six months.

    Speaker’s Notes:

    In many cases, we have put people into virtual roles because they are self-directed and self-motivated workers who can thrive with the kind of autonomy and flexibility that comes with virtual work. As managers, we should expect many of these workers to be proactively interested in how they are performing and in developing their careers.

    It would be a mistake to take a hands-off approach when managing virtual workers. A recent survey indicated that, overall, remote employees showed less satisfaction with manager interactions compared to other non-remote employees. It was also one of the aspects of their work experience they were least satisfied with overall (Gallup, State of the American Workplace, 2017). Simply put, virtual employees are craving more meaningful conversations with their managers.

    While conversations about performance and development are important for all employees (virtual or non-virtual), managers of remote teams can have a significant positive impact on their virtual employees’ experience and engagement at work by making efforts to improve their involvement and support in these areas.

    During this module we will work together to identify ways that each of us can improve how we manage the performance of our virtual employees. At the end of the module everyone will create an action plan that they can put in place with their own teams. In the next module, we go through a similar set of activities to create an action plan for our interactions with employees about their development.

    Building blocks of performance management

    • Goal Setting

    • Setting Expectations

    • Measuring Progress

    • Feedback & Coaching

    Speaker’s Notes:

    [Include a visualization of your existing performance management process in the slide. Walk the participants through the process to remind them of what is expected. While the managers participating in the training should know this, there may be different understandings of it, or it might just be the case that it’s been a while since people looked at the official process. The intention here is merely to ensure everyone is on the same page for the purposes of the activities that follow.]

    Now that we’ve reviewed performance management at a high level, let’s dive into what is currently happening with the performance management of virtual teams.

    I know that you have some fairly extensive material at your organization around how to manage performance. This is fantastic. And we’re going to focus mainly on how things change in a virtual context.

    When measuring progress, how do you as a manager make sure that you are comfortable not seeing your team physically at their desks? This is the biggest challenge for remote managers.

    2.2 Share current performance management practices for virtual teams

    30 Minutes

    1. Brainstorm and list current high-level performance management practices connected to each building block. Record in your workbook.
    2. Discuss current challenges connected to implementing the building blocks with virtual employees.

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Current performance management practices
    • Challenges surrounding performance management

    Output

    • Current state of virtual performance management defined

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Communicate the “why”: Cascade organizational goals

    This image depicts the Cascade of Why- organizational goals. Organizational Mission; Organizational Values; Organizational Goals; Department Goals; Team Goals; Individual Goals

    Speaker’s Notes:

    When assisting your employees with their goals, think about the organization’s overall mission and goals to help you determine team and individual goals.

    • Organizational goals: Employee goals should align with organizational goals. Goals may cascade down through the organization.
    • Department or team goals: Create a clear strategy based on high-level goals for the year so employees can link short-term goals to the larger picture.
    • Individual goals: Employees should draw on their individual development plan to help set performance goals.

    Sometimes it’s difficult to get employees thinking about goals and they need assistance from managers. It’s also important to be clear on team goals to help guide employees in setting individual ones.

    The basic idea is to show people how their individual day-to-day work contributes to the overall success of the organization. It gives them a sense of purpose and a rationale, which translates to motivation. And also helps them problem solve with more autonomy.

    You’re giving people a sense of the importance of their own contribution.

    How to set clear expectations for job performance

    Ensure employees have a clear understanding of what’s expected for their role:

    1. Review their metrics so they understand how they’re being evaluated.
    2. Outline daily, weekly, monthly, and quarterly goals.
    3. If needed, help them plan when and how each part of their job should be done and what to prioritize.
    4. Ask them to come to you early if they experience a roadblock so that you can help rather than having them flounder on their own.
    5. Document instances where employees aren’t meeting role or performance expectations.

    Speaker’s Notes:

    Tailor performance goals to address any root causes of poor performance.

    For example:

    • If personal factors are getting in the way, work with the employee (and HR if necessary) to create a strategy to address any impediments to performing in the role.

    Tips for managing performance remotely

    • Reflect on one key question: What needs to happen for my direct reports to continue their work while working remotely?
    • Manage for results – not employee visibility at the office.
    • Use metrics to measure performance. If you don’t have any, define tasks and deliverables as clearly as possible and conduct regular check-ins.
    • Work with the employee to set goals and metrics to measure progress.

    Focus on results: Be flexible about how and when work gets done, as long as team members are hitting their targets.

    • For example, if they have childcare duties from 3 to 5pm during school closures and want to work later in the evening to make up the time, that’s fine – as long as the work gets done.
    • Set clear expectations about which work must be done during normal work hours (e.g. attend team meetings, client calls) and which can be done at other hours.
    • Team members must arrange with you any nonstandard working hours before they start using an altered schedule. It is your responsibility to keep track of hours and any alternate arrangements.
    • Don’t make team members feel constantly monitored (i.e. “Where were you from 10 to 11am?”); trust them until you have reason not to.

    Encourage your team members to unplug: If they’re sending you emails late at night and they haven’t made an alternate work hours agreement with you, encourage them to take time away from work.

    • It’s harder to unplug when working at home, and everyone needs a break to stay productive.

    Avoid micromanagement with holistic performance measures

    Quality

    How well tasks are accomplished

    Behavior

    Related to specific employee actions, skills, or attitudes

    Quantity

    How much work gets done

    Holistic measures demonstrate all the components required for optimal performance. This is the biggest driver in having comfort as a manager of a remote team and avoiding micromanagement. Typically these are set at the organizational level. You may need to adjust for individual roles, etc.

    Speaker's Notes:

    Metrics come in different types. One way to ensure your metrics capture the full picture is to use a mix of different kinds of metrics.

    Some metrics are quantitative: they describe quantifiable or numerical aspects of the goal. This includes timeliness. On the other hand, qualitative metrics have to do with the final outcome or product. And behavioral metrics have to do with employees' actions, skills, or attitudes. Using different kinds of metrics together helps you set holistic measures, which capture all the components of optimal performance toward your goal and prevent gaming the system.

    Let's take an example:

    A courier might have an objective to do a good job delivering packages. An example of a quantitative measure might be that the courier is required to deliver X number of packages per day on time. The accompanying metrics would be the number of packages delivered per day and the ratio of packages delivered on time vs. late.

    Can you see a problem if we use only these quantitative measures to evaluate the courier's performance?

    Wait to see if anyone volunteers an answer. Discuss suggestions.

    That's right, if the courier's only goal is to deliver more packages, they might start to rush, may ruin the packages, and may offer poor customer service. We can help to guard against this by implementing qualitative and behavioral measures as well. For example, a qualitative measure might be that the courier is required to deliver the packages in mint condition. And the metric would be the number of customer complaints about damaged packages or ratings on a satisfaction survey related to package condition.

    For the behavioral aspect, the courier might be required to provide customer-centric service with a positive attitude. The metrics could be ratings on customer satisfaction surveys related to the courier's demeanor or observations by the manager.

    Managing poor performance virtually: Look for key signs

    It’s crucial to acknowledge that an employee might have an “off week” or need time to balance work and life – things that can be addressed with performance management (PM) techniques. Managers should move into the process for performance improvement when:

    1. Performance fluctuates frequently or significantly.
    2. Performance has dropped for an extended period of time.
    3. Expectations are consistently not being met.

    Key signs to look for:

    • PM data/performance-related assessments
    • Continual absences
    • Decreased quality or quantity of output
    • Frequent excuses (e.g. repeated internet outages)
    • Lack of effort or follow-through
    • Missed deadlines
    • Poor communication or lack of responsiveness
    • Failure to improve

    Speaker’s notes:

    • Let’s talk more about identifying low performance.
    • Everybody has off days or weeks. And what if they are new to the role or new to working remotely? Their performance may be low because they need time to adjust. These sort of situations should be managed, but they don’t require moving into the process for performance improvement.
    • When managing employees who are remote or working in a hybrid situation, it is important to be alert to these signs and check in with your employees on a regular basis. Aim to identify and work with employees on addressing performance issues as they arise rather than waiting until it’s too late. Depending on your availability, the needs of the employee, and the complexity of their role, check-ins could occur daily, weekly, and/or monthly. As I mentioned, for remote employees, it’s often better to check-in more frequently but for a shorter period of time.
    • You want to be present in their work life and available to help them manage through roadblocks and stay on track, but try to avoid over-monitoring employees. Micromanaging can impact the manager-employee relationship and lead to the employee feeling that there is a lack of trust. Remember, the employee needs to be responsible for their own performance and improvement.
    • Check-ins should not just be about the work either. Take some time to check in personally. This is particularly important when managing remotely. It enables you to build a personal relationship with the employee and also keeps you aware if there are other personal issues at play that are impacting their work.
    • So, how do you know what does require performance improvement? There are three key things that you should look for that are clear signals that performance improvement is necessary:
      1. Their performance is fluctuating frequently or significantly.
      2. Their performance has dropped for an extended period of time.
      3. Expectations are consistently not being met.
    • What do you think are some key signs to look for that indicate a performance issue is occurring?

    Managing poor performance virtually: Conducting remote performance conversations

    Video calling

    Always use video calls instead of phone calls when possible so that you don’t lose physical cues and body language.

    Meeting invitations

    Adding HR/your leader to a meeting invite about performance may cause undue stress. Think through who needs to participate and whether they need to be included in the invite itself.

    Communication

    Ensure there are no misunderstandings by setting context for each discussion and having the employee reiterate the takeaways back to you.

    Focus on behavior

    Don’t assume the intent behind the behavior(s) being discussed. Instead, just focus on the behavior itself.

    Policies

    Be sure to adhere to any relevant HR policies and support systems. Working with HR throughout the process will ensure none are overlooked.

    Speaker’s notes:

    There are a few best practices you should follow when having performance conversations:

    • First, if you are in a different work environment than your employee, always use video calls instead of phone calls whenever possible so that you don’t miss out on physical cues and body language. If videoconferencing isn’t the norm, encourage them to turn on their video. Be empathic that it can feel awkward but explain the benefits, and you will both have an easier time communicating and understanding each other.
    • As I’ve mentioned, be considerate of the environment they are in. If they are in the office and you are working remotely, be sure to book a private meeting room for them to go to for the conversation. If they are working from home, be sure to check that they are prepared and able to focus on the conversation.
    • Next, carefully consider who you are adding to the meeting invite and whether it’s necessary for them to be there. Adding HR or your leader to a meeting invite may cause undue stress for the employee.
    • Consider the timing of the invite. Don’t send it out weeks in advance. When a performance problem exists, you’ll want to address it as soon as possible. A day or two of notice would be an ideal approach because it gives them a heads up but will not cause them extended stress or worrying.
    • Be considerate about the timing of the meeting and what else they may have scheduled. For example, a Friday afternoon before they are heading off on vacation or right before they are leading an important client call would not be appropriate timing.
    • As we just mentioned clear communication is critical. Ensure there are no misunderstandings by setting context for each discussion and having the employee reiterate takeaways back to you.
    • Focus on the behavior and don’t assume their intent. It can be tempting to say, “I know you didn’t mean to miss the deadline,” but you don’t know what they intended. Often people are not aware of the impact their behavior can have on others.
    • Lastly, be sure to adhere to any relevant HR policies and support systems. Working with HR throughout the process will ensure nothing is overlooked.

    2.3 Identify challenges of current practices and propose solutions

    30 Minutes

    1. Select one or two challenges from the previous activity.
    2. Identify one solution for each challenge that you can put into action with your own virtual team. Document in the workbook.

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Current performance management practices
    • Challenges surrounding performance management

    Output

    • Action plan to move forward

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Effectively Manage Virtual Teams

    Optional Section

    Employee development in a virtual team setting

    There are three main development approaches for both colocated and virtual employees

    Formal Training; Relational Learning; Experimental Learning

    Speaker’s Notes:

    As we have seen, our virtual employees crave more meaningful interactions with their managers. In addition to performance conversations, managers should also be having regular discussions with their employees about their employee development plans. One key component of these discussions is career planning. Whether you are thinking shorter term – how to become better at their current role – or longer term – how to advance beyond their current role – discussions about employee development are a great way to engage employees. Employees are ultimately responsible for creating and executing their own development plans, but managers are responsible for making sure that employees have thought through these plans and helping employees identify opportunities for executing those plans.

    To help us think about our own employee development practices, identify challenges they pose when working with virtual employees, and create solutions to these challenges, it is useful to think about employee development opportunities according to three types:

    1. The first kind of development opportunity is formal training. Formal training is organized and has a clearly defined curriculum and desired outcome. It usually takes the form of a group training session (like this one) or training videos or materials that employees can watch individually and on their own time. These opportunities usually end with a test or assignment that can be used to evaluate the degree to which the participant achieved the desired learning outcomes.
    2. The second kind of development opportunity is relational learning. Perhaps the most common form of this type of learning is coaching or mentoring. By establishing a long-term work relationship, checking in with employees about their daily work and development goals, and sharing their own experiences and knowledge, mentors help employees reflect and draw out learning from everyday, on-the-job development activities. Other examples include a peer support group or communities of practice. In these group settings peers share best practices and work together to overcome challenges.
    3. The third kind of development opportunity is experiential learning. This kind of opportunity provides employees the chance to work on real work problems, and the output of the development work can directly benefit the organization. Most people learn best by doing. On-the-job experiences that are challenging or new can force people to use and develop new skills and knowledge based on what worked effectively and what failed. Examples of experiential learning are on-the-job learning for new hires, stretch assignments, or special projects that take the employee beyond their daily routine and allow them to try new activities and develop competencies that they would not have the chance to develop as part of their regular job.

    According to McLean & Company, organizations should use the “70-20-10” rule as a rough guideline when working with employees to create their development plans: 10% of the plan should be dedicated to formal training opportunities, 20% to relational learning, and 70% to experiential learning. Managers should work with employees to identify their performance and career goals, ensure that their development plans are aligned with these goals, and include an appropriate mixture of all three kinds of development opportunities.

    To help identify challenges and solutions, think about how virtual work arrangements will impact the employee’s ability to leverage each type of opportunity at our organization.

    Here are some examples that can help us start thinking about the kinds of challenges virtual employees on our team face:

    Career Planning

    • One challenge can be identifying a career path that is consistent with working virtually. If switching from a virtual arrangement to an onsite arrangement is not a viable option for an employee, some career paths may not feasibly be open to them (at least as the company is currently organized). For example, if an employee would eventually like to be promoted to a senior leadership role in their business function but all senior leaders are required to work onsite at corporate headquarters, the employee will need to consider whether such a move is possible for them. In some cases employees may be willing to do this, but in others they may not. The important thing is to have these conversations with virtual employees and avoid the assumption that all career paths can be done virtually, since that might not be the case

    Formal Training

    • This is probably the least problematic form of employee development for virtual employees. In many cases this kind of training is scheduled well in advance, so virtual employees may be able to join non-virtual employees in person for some group training. When this is not possible (due to distance, budget, or time zone), many forms of group training can be recorded and watched by virtual employees later. Training videos and training materials can also easily be shared with virtual employees using existing collaboration software.

    Relational Learning

    • One major challenge here is developing a mentoring relationship virtually. As we discussed in the module on performance management, developing relationships virtually can be challenging because people cannot rely upon the kind of informal and spontaneous interactions that occur when people are located in the same office. Mentors and mentees will have to put in more effort and planning to get to know each other and they will have to schedule frequent check-ins so that employees can reflect upon their progress and experience (with the help of their mentors) more often.
    • Time zones and technology may pose potential barriers for certain candidates to be mentors. In some cases, employees that are best qualified to be mentors may not be as comfortable with collaborative software as other mentors or their mentees. If there are large time zone differences, some people who would otherwise be interested in acting as a mentor may be dissuaded. Managers need to take this into consideration if they are connecting employees with mentors or if they are thinking of taking on the mentor role themselves.

    Experiential Learning

    • Virtual employees risk being overlooked for special projects due to the “out of sight, out of mind” bias: When special projects come up, the temptation is to look around the room and see who is the best fit. The problem is, however, that in some cases the highest performers or best fit may not physically be in the room. In these cases it is important for managers to take on an advocate role for their employees and remind other managers that they have good virtual employees on their team that should be included or contacted. It is also important for managers to keep their team informed about these opportunities as often as possible.
    • Sometimes certain projects or certain kinds of work just cannot be done virtually in a company for a variety of reasons. The experiential learning opportunities will not be open to virtual employees. If such opportunities are open to the majority of other workers in this role (potentially putting virtual employees’ career development at a disadvantage relative to their peers), managers should work with their virtual employees to identify alternative experiences. Managers may also want to consider advocating for more or for higher quality experiential learning opportunities at the organization.

    Now that we have considered some general examples of challenges and solutions, let’s look at our own employee development practices and think about the practical steps we can take as managers to improve employee development for our virtual employees.

    Employee development basics

    • Career planning & performance improvement
    • Formal training
    • Relational learning
    • Experiential learning

    Speaker’s Notes:

    [Customize this slide according to your organization’s own policies and processes for employee development. Provide useful images that outline this on the slide, and in these notes describe the processes/policies that are in place. Note: In some cases policies or processes may not be designed with virtual employees or virtual teams in mind. That is okay for the purposes of this training module. In the following activities participants will discuss how they apply these policies and processes with their virtual teams. If your organization is interested in adapting its policies/processes to better support virtual workers, it may be useful to record those conversations to supplement existing policies later.]

    Now that we have considered some general examples of challenges and solutions, let’s look at our own employee development practices and think about the practical steps we can take as managers to improve employee development for our virtual employees.

    2.4 Share current practices for developing employees on a virtual team

    30 Minutes

    1. Brainstorm and list current high-level employee development practices. Record in your workbook.
    2. Discuss current challenges connected to developing virtual employees. Record in your workbook.
    3. Identify one solution for each challenge that you can put into action with your own virtual team.
    4. Discuss as a group.

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Current employee development practices
    • Challenges surrounding employee development

    Output

    • Action plan to move forward

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Refine Action Plans

    2.5 Refine your action plan and commit to implementing it

    30 Minutes

    1. Review your action plans for consistency and overlap. Highlight any parts you may struggle to complete.
    2. Meeting with your group, summarize your plans to each other. Provide feedback and discuss each other’s action plans.
    3. Discuss how you can hold each other accountable.

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Action items from previous activities.

    Output

    • Action plan to move forward

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Summary of Accomplishment

    • We do not need to go out and learn a new set of manager responsibilities to better manage our virtual teams; rather, we have to “dial up” certain responsibilities we already have or adjust certain approaches that we already take.
    • It is important to set clear expectations. While managers are ultimately responsible for making sure expectations are set and are clearly communicated, they are not the only ones with responsibilities. Employees and managers need to work together to overcome the challenges that virtual work involves.
    • Virtual employees crave meaningful interactions with their managers and team. Managers must take charge in fostering an atmosphere of openness around wellbeing and establish effective performance management strategies. By being proactive with our virtual teams’ wellness and mindful of our performance management habits, we can take significant steps toward keeping these employees engaged and productive.
    • Effective management in virtual contexts requires being more deliberate than is typical in non-virtual contexts. By working as a group to identify challenges and propose solutions, we have helped each other create action plans that we can use going forward to continually improve our management practices.

    If you would like additional support, have our analysts guide you through an info-tech workshop or guided implementation.

    Contact your account representative for more information

    workshops@infotech.com

    1-888-670-8889

    Speaker’s Notes:

    First, let’s take a moment to summarize the key things we have learned today:

    1. We do not need to go out and learn a new set of manager competencies to better manage our virtual teams; rather, we have to “dial up” certain competencies we already have or adjust certain approaches that we already take. In many cases we just need to be more aware of the challenges that virtual communication poses and be more planful in our approaches.
    2. It is important to set clear expectations. While managers are ultimately responsible for making sure expectations are set and clearly communicated, they are not the only ones with responsibilities. Employees and managers need to work together to overcome the challenges that virtual work involves. Making sure that teams have meaningful conversations about expectations, come to a shared understanding of them, and record them will create a firm foundation for all other interactions on the virtual team.
    3. Virtual employees crave meaningful interactions with their managers related to performance and employee development. By creating action plans for improving these kinds of interactions with our teams, we can take significant steps toward keeping these employees engaged and productive.
    4. Effective performance management and employee development in virtual contexts require more planfulness than is required in non-virtual contexts. By working as a group to identify challenges and propose solutions, we have helped each other create action plans that we can use going forward to continually improve our management practices.

    Is there anything that anyone has learned that is not on this list and that they would like to share with the group?

    Finally, were there any challenges identified today that were not addressed?

    [Note to facilitator: Take note of any challenges not addressed and commit to getting back to the participants with some suggested solutions.]

    Additional resources

    Manager Training: Lead Through Change

    Train managers to navigate the interpersonal challenges associated with change management and develop their communication and leadership skills. Upload this LMS module into your learning management system to enable online training.

    Manager Training: Build a Better Manager: Manage Your People

    Management skills training is needed, but organizations are struggling to provide training that makes a long-term difference in the skills managers use in their day to day.

    Many training programs are ineffective because they offer the wrong content, deliver it in a way that is not memorable, and are not aligned with the IT department’s business objectives.

    Blueprint: Manage Poor Performance While Working From Home

    Assess and improve remote work performance with our ready-to-use tools.

    Works Cited

    April, Richard. “10 KPIs Every Sales Manager Should Measure in 2019.” HubSpot, 24 June 2019. Web.

    Banerjea, Peter. “5 Powerful Strategies for Managing a Remote Sales Team.” Badger - Maps for field sales, n.d. Web.

    Bibby, Adrianne. “5 Employers’ Awesome Quotes about Work Flexibility.” FlexJobs, 9 January 2017. Web.

    Brogie, Frank. “The 14 KPIs every field sales rep should strive to improve.” Repsly, 2018. Web.

    Dunn, Julie. “5 smart tips for leading field sales teams.” LevelEleven, March 2015. Web.

    Edinger, Scott. “How great sales leaders coach.” Forbes, 2013. Web.

    “Employee Outlook: Employee Views on Working Life.” CIPD, April 2016. Web.

    Hall, Becki. “The 5 biggest challenges facing remote workers (and how to solve them).” interact, 7 July 2017. Web.

    Hofstede, Geert. “National Cultural Dimensions.” Hofstede Insights, 2012. Web.

    “Inventory of U.S. Greenhouse Gas Emissions and Sinks: 1990-2014 (EPA 430-R-16-002).” Environmental Protection Agency (EPA), 15 April 2016.

    “Latest Telecommuting Statistics.” Global Workplace Analytics, June 2021. Web.

    Knight, Rebecca. “How to manage remote direct reports.” Harvard Business Review, 2015. Web.

    “Rewards and Recognition: 5 ways to show remote worker appreciation.” FurstPerson, 2019. Web.

    Palay, Jonathan. "How to build your sales management cadence." CommercialTribe, 22 March 2018. Web.

    “Sales Activity Management Matrix.” Asian Sales Guru, 2019. Web.

    Smith, Simone. “9 Things to Consider When Recognizing Remote Employees.” hppy, 2018. Web.

    “State of Remote Work 2017.” OWL Labs, 2021. Web.

    “State of the American Workplace.” Gallup, 2017. Web.

    “Telework Savings Potential.” Global Workplace Analytics, June 2021. Web.

    “The Future of Jobs Employment Trends.” World Economic Forum, 2016. Web.

    “The other COVID-19 crisis: Mental health.” Qualtrics, 14 April 2020. Web.

    Thompson, Dan. “The straightforward truth about effective sales leadership.” Sales Hacker, 2017. Web.

    Tsipursky, Gleb. “Remote Work Can Be Better for Innovation Than In-Person Meetings.” Scientific American, 14 Oct. 2021. Web.

    Walsh, Kim. “New sales manager? Follow this guide to crush your first quarter.” HubSpot, May 2019. Web.

    “What Leaders Need to Know about Remote Workers: Surprising Differences in Workplace Happiness and Relationships.” TINYpulse, 2016.

    Zenger, Jack, and Joe Folkman. “Feedback: The Leadership Conundrum.” Talent Quarterly: The Feedback Issue, 2015.

    Contributors

    Anonymous CAMH Employee

    Improve IT Operations With AI and ML

    • Buy Link or Shortcode: {j2store}454|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
    • member rating average days saved: Read what our members are saying
    • Parent Category Name: Operations Management
    • Parent Category Link: /i-and-o-process-management
    • Many IT departments experience difficulty with meeting the business' expectations for service delivery on a regular basis.
    • Despite significant investment in improving various areas of IT operations, you still feel like you’re constantly firefighting.
    • To tackle these issues, businesses tend to invest in purchasing multiple solutions. This not only complicates their IT operations, but also, in some cases, deteriorates functionality.

    Our Advice

    Critical Insight

    • To leverage AI capabilities, you first need to assess the current state of your IT operations and know what your priorities are.
    • Contemplate use cases that will get the most benefit from automation and start with processes that you are relatively comfortable handling.
    • Analyze your initial plan to identify easy wins, then expand your AIOps.

    Impact and Result

    • Perform a current state assessment to spot which areas within your operations management are the least mature and causing you the most grief. Identify which functional areas within operations management need to be prioritized for improvement.
    • Make a shortlist of use cases that will get the most benefit from AI-based technology.
    • Prepare a plan to deploy AI capabilities to improve your IT operations.

    Improve IT Operations With AI and ML Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out about the latest improvements in AIOps and how these can help you improve your IT operations. Review Info-Tech’s methodology and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess the current state of IT operations management

    Identify where your organization currently stands in its operations management practices.

    • AIOps Project Summary Template
    • AIOps Prerequisites Assessment Tool

    2. Identify initiatives that align with operations requirements

    Recognize the benefits of AI and ML for your business. Determine the necessary roles and responsibilities for potential initiatives, then develop and assess your shortlist.

    • AIOps RACI Template
    • AIOps Shortlisting Tool

    3. Develop the AI roadmap

    Analyze your ROI for AIOps and create an action plan. Communicate your AI and ML initiatives to stakeholders to obtain their support.

    • AIOps ROI Calculator
    • AIOps Roadmap Tool
    • AIOps Communications Plan Template
    [infographic]

    Organizational Change Management

    • Buy Link or Shortcode: {j2store}35|cart{/j2store}
    • Related Products: {j2store}35|crosssells{/j2store}
    • member rating overall impact: 9.6/10
    • member rating average dollars saved: $19,055
    • member rating average days saved: 24
    • Parent Category Name: Project Portfolio Management and Projects
    • Parent Category Link: /ppm-and-projects
    If you don't know who is responsible for organizational change, it's you.

    Simplify Remote Deployment With Zero-Touch Provisioning

    • Buy Link or Shortcode: {j2store}310|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $5,199 Average $ Saved
    • member rating average days saved: 5 Average Days Saved
    • Parent Category Name: End-User Computing Strategy
    • Parent Category Link: /end-user-computing-strategy

    Provide better end-user device support to a remote workforce:

    • Remain compliant while purchasing, deploying, supporting, and decommissioning devices.
    • Save time and resources during device deployment while providing a high-quality experience to remote end users.
    • Build a set of capabilities that will let you support different use cases.

    Our Advice

    Critical Insight

    • Zero-touch is more than just deployment. This is more difficult than turning on a tool and provisioning new devices to end users.
    • Consider the entire user experience and device lifecycle to show value to the organization. Don’t forget that you will eventually need to touch the device.

    Impact and Result

    Approach zero-touch provisioning and patching from the end user’s experience:

    • Align your zero-touch approach with stakeholder priorities and larger IT strategies.
    • Build your zero-touch provisioning and patching plan from both the asset lifecycle and the end-user perspective to take a holistic approach that emphasizes customer service.
    • Tailor deployment plans to more easily scope and resource deployment projects.

    Simplify Remote Deployment With Zero-Touch Provisioning Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should adopt zero-touch provisioning, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Design the zero-touch experience

    Design the user’s experience and build a vision to direct your zero-touch provisioning project. Update your ITAM practices to reflect the new experience.

    • Zero-Touch Provisioning and Support Plan
    • HAM Process Workflows (Visio)
    • HAM Process Workflows (PDF)
    • End-User Device Management Standard Operating Procedure

    2. Update device management, provisioning, and patching

    Leverage new tools to manage remote endpoints, keep those devices patched, and allow users to get the apps they need to work.

    • End-User Device Build Book Template

    3. Build a roadmap and communication plan

    Create a roadmap for migrating to zero-touch provisioning.

    • Roadmap Tool
    • Communication Plan Template
    [infographic]

    Fast Track Your GDPR Compliance Efforts

    • Buy Link or Shortcode: {j2store}372|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $25,779 Average $ Saved
    • member rating average days saved: 30 Average Days Saved
    • Parent Category Name: Governance, Risk & Compliance
    • Parent Category Link: /governance-risk-compliance
    • Organizations often tackle compliance efforts in an ad hoc manner, resulting in an ineffective use of resources.
    • The alignment of business objectives, information security, and data privacy is new for many organizations, and it can seem overwhelming.
    • GDPR is an EU regulation that has global implications; it likely applies to your organization more than you think.

    Our Advice

    Critical Insight

    • Financial impact isn’t simply fines. A data controller fined for GDPR non-compliance may sue its data processor for damage.
    • Even day-to-day activities may be considered processing. Screen-sharing from a remote location is considered processing if the data shown onscreen contains personal data!
    • This is not simply an IT problem. Organizations that address GDPR in a siloed approach will not be as successful as organizations that take a cross-functional approach.

    Impact and Result

    • Follow a robust methodology that applies to any organization and aligns operational and situational GDPR scope. Info-Tech's framework allows organizations to tackle GDPR compliance in a right-sized, methodical approach.
    • Adhere to a core, complex GDPR requirement through the use of our documentation templates.
    • Understand how the risk of non-compliance is aligned to both your organization’s functions and data scope.
    • This blueprint will guide you through projects and steps that will result in quick wins for near-term compliance.

    Fast Track Your GDPR Compliance Efforts Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should fast track your GDPR compliance efforts, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Understand your compliance requirements

    Understand the breadth of the regulation’s requirements and document roles and responsibilities.

    • Fast Track Your GDPR Compliance Efforts – Phase 1: Understand Your Compliance Requirements
    • GDPR RACI Chart

    2. Define your GDPR scope

    Define your GDPR scope and prioritize initiatives based on risk.

    • Fast Track Your GDPR Compliance Efforts – Phase 2: Define Your GDPR Scope
    • GDPR Initiative Prioritization Tool

    3. Satisfy documentation requirements

    Understand the requirements for a record of processing and determine who will own it.

    • Fast Track Your GDPR Compliance Efforts – Phase 3: Satisfy Documentation Requirements
    • Record of Processing Template
    • Legitimate Interest Assessment Template
    • Data Protection Impact Assessment Tool
    • A Guide to Data Subject Access Requests

    4. Align your data breach requirements and security program

    Document your DPO decision and align security strategy to data privacy.

    • Fast Track Your GDPR Compliance Efforts – Phase 4: Align Your Data Breach Requirements & Security Program

    5. Prioritize your GDPR initiatives

    Prioritize any initiatives driven out of Phases 1-4 and begin developing policies that help in the documentation effort.

    • Fast Track Your GDPR Compliance Efforts – Phase 5: Prioritize Your GDPR Initiatives
    • Data Protection Policy
    [infographic]

    Workshop: Fast Track Your GDPR Compliance Efforts

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Understand Your Compliance Requirements

    The Purpose

    Kick-off the workshop; understand and define GDPR as it exists in your organizational context.

    Key Benefits Achieved

    Prioritize your business units based on GDPR risk.

    Assign roles and responsibilities.

    Activities

    1.1 Kick-off and introductions.

    1.2 High-level overview of weekly activities and outcomes.

    1.3 Identify and define GDPR initiative within your organization’s context.

    1.4 Determine what actions have been done to prepare; how have regulations been handled in the past?

    1.5 Identify key business units for GDPR committee.

    1.6 Document business units and functions that are within scope.

    1.7 Prioritize business units based on GDPR.

    1.8 Formalize stakeholder support.

    Outputs

    Prioritized business units based on GDPR risk

    GDPR Compliance RACI Chart

    2 Define Your GDPR Scope

    The Purpose

    Know the rationale behind a record of processing.

    Key Benefits Achieved

    Determine who will own the record of processing.

    Activities

    2.1 Understand the necessity for a record of processing.

    2.2 Determine for each prioritized business unit: are you a controller or processor?

    2.3 Develop a record of processing for most-critical business units.

    2.4 Perform legitimate interest assessments.

    2.5 Document an iterative process for creating a record of processing.

    Outputs

    Initial record of processing: 1-2 activities

    Initial legitimate interest assessment: 1-2 activities

    Determination of who will own the record of processing

    3 Satisfy Documentation Requirements and Align With Your Data Breach Requirements and Security Program

    The Purpose

    Review existing security controls and highlight potential requirements.

    Key Benefits Achieved

    Ensure the initiatives you’ll be working on align with existing controls and future goals.

    Activities

    3.1 Determine the appetite to align the GDPR project to data classification and data discovery.

    3.2 Discuss the benefits of data discovery and classification.

    3.3 Review existing incident response plans and highlight gaps.

    3.4 Review existing security controls and highlight potential requirements.

    3.5 Review all initiatives highlighted during days 1-3.

    Outputs

    Highlighted gaps in current incident response and security program controls

    Documented all future initiatives

    4 Prioritize GDPR Initiatives

    The Purpose

    Review project plan and initiatives and prioritize.

    Key Benefits Achieved

    Finalize outputs of the workshop, with a strong understanding of next steps.

    Activities

    4.1 Analyze the necessity for a data protection officer and document decision.

    4.2 Review project plan and initiatives.

    4.3 Prioritize all current initiatives based on regulatory compliance, cost, and ease to implement.

    4.4 Develop a data protection policy.

    4.5 Finalize key deliverables created during the workshop.

    4.6 Present the GDPR project to key stakeholders.

    4.7 Workshop executive presentation and debrief.

    Outputs

    GDPR framework and prioritized initiatives

    Data Protection Policy

    List of key tools

    Communication plans

    Workshop summary documentation

    Embed Business Relationship Management in IT

    • Buy Link or Shortcode: {j2store}270|cart{/j2store}
    • member rating overall impact: 8.8/10 Overall Impact
    • member rating average dollars saved: $21,960 Average $ Saved
    • member rating average days saved: 19 Average Days Saved
    • Parent Category Name: Manage Business Relationships
    • Parent Category Link: /manage-business-relationships
    • While organizations realize they need to improve business relationships, they often don’t know how.
    • IT doesn’t know what their business needs and so can’t add as much value as they’d like.
    • They find that their partners often reach out to third parties before they connect with internal IT.

    Our Advice

    Critical Insight

    • Business relationship management (BRM) is not just about communication, it’s about delivering on business value.
    • Build your BRM program on establishing trust.

    Impact and Result

    • Drive business value into the organization via innovative technology solutions.
    • Improve ability to meet and exceed business goals and objectives, resulting in more satisfied stakeholders (C-suite, board of directors).
    • Enhance ability to execute business activities to meet end customer requirements and expectations, resulting in more satisfied customers.

    Embed Business Relationship Management in IT Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Embed Business Relationship Management Deck – A step-by-step document that walks you through how to establish a practice with well-embedded business relationships, driving IT success.

    This blueprint helps you to establish a relationship with your stakeholders, both within and outside of IT. You’ll learn how to embed relationship management throughout your organization.

    • Embed Business Relationship Management in IT – Phases 1-5

    2. BRM Workbook Deck – A workbook for you to capture the results of your thinking on the BRM practice.

    Use this tool to capture your findings as you work through the blueprint.

    • Embed Business Relationship Management in IT Workbook

    3. BRM Buy-In and Communication Template – A template to help you communicate what BRM is to your organization, that leverages feedback from your business stakeholders and IT.

    Customize this tool to obtain buy in from leadership and other stakeholders. As you continue through the blueprint, continue to leverage this template to communicate what your BRM program is about.

    • BRM Buy-In and Communication Template

    4. BRM Role Expectations Worksheet – A tool to help you establish how the BRM role and/or other roles will be managing relationships.

    This worksheet template is used to outline what the BRM practice will do and associate the expectations and tasks with the roles throughout your organization. Use this to communicate that while your BRM role has a strategic focus and perspective of the relationship, other roles will continue to be important for relationship management.

    • Role Expectations Worksheet

    5. BRM Stakeholder Engagement Plan Worksheet – A tool to help you establish your stakeholders and your engagement with them.

    This worksheet allows you to list the stakeholders and their priority in order to establish how you want to engage with them.

    • BRM Stakeholder Engagement Plan Worksheet

    6. Business Relationship Manager Job Descriptions – These templates can be used as a guide for defining the BRM role.

    These job descriptions will provide you with list of competencies and qualifications necessary for a BRM operating at different levels of maturity. Use this template as a guide, whether hiring internally or externally, for the BRM role.

    • Business Relationship Manager – Level 1
    • Business Relationship Manager – Level 2
    • Business Relationship Manager – Level 3
    [infographic]

    Workshop: Embed Business Relationship Management in IT

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Foundation: Assess and Situate

    The Purpose

    Set the foundation for your BRM practice – understand your current state and set the vision.

    Key Benefits Achieved

    An understanding of current pain points and benefits to be addressed through your BRM practice. Establish alignment on what your BRM practice is – use this to start obtaining buy-in from stakeholders.

    Activities

    1.1 Define BRM

    1.2 Analyze Satisfaction

    1.3 Assess SWOT

    1.4 Create Vision

    1.5 Create the BRM Mission

    1.6 Establish Goals

    Outputs

    BRM definition

    Identify areas to be addressed through the BRM practice

    Shared vision, mission, and understanding of the goals for the brm practice

    2 Plan

    The Purpose

    Determine where the BRM fits and how they will operate within the organization.

    Key Benefits Achieved

    Learn how the BRM practice can best act on your goals.

    Activities

    2.1 Establish Guiding Principles

    2.2 Determine Where BRM Fits

    2.3 Establish BRM Expectations

    2.4 Identify Roles With BRM Responsibilities

    2.5 Align Capabilities

    Outputs

    An understanding of where the BRM sits in the IT organization, how they align to their business partners, and other roles that support business relationships

    3 Implement

    The Purpose

    Determine how to identify and work with key stakeholders.

    Key Benefits Achieved

    Determine ways to engage with stakeholders in ways that add value.

    Activities

    3.1 Brainstorm Sources of Business Value

    3.2 Identify Key Influencers

    3.3 Categorize the Stakeholders

    3.4 Create the Prioritization Map

    3.5 Create Your Engagement Plan

    Outputs

    Shared understanding of business value

    A plan to engage with stakeholders

    4 Reassess and Embed

    The Purpose

    Determine how to continuously improve the BRM practice.

    Key Benefits Achieved

    An ongoing plan for the BRM practice.

    Activities

    4.1 Create Metrics

    4.2 Prioritize Your Projects

    4.3 Create a Portfolio Investment Map

    4.4 Establish Your Annual Plan

    4.5 Build Your Transformation Roadmap

    4.6 Create Your Communication Plan

    Outputs

    Measurements of success for the BRM practice

    Prioritization of projects

    BRM plan

    Further reading

    Embed Business Relationship Management in IT

    Show that IT is worthy of Trusted Partner status.

    Executive Brief

    Analyst Perspective

    Relationships are about trust.

    As long as humans are involved in enabling technology, it will always remain important to ensure that business relationships support business needs. At the cornerstone of those relationships is trust and the establishment of business value. Without trust, you won’t be believed, and without value, you won’t be invited to the business table.

    Business relationship management can be a role, a capability, or a practice – either way it’s essential to ensure it exists within your organization. Show that IT can be a trusted partner by showing the value that IT offers.

    Photo of Allison Straker, Research Director, CIO Practice, Info-Tech Research Group.

    Allison Straker
    Research Director, CIO Practice
    Info-Tech Research Group

    Your challenge: Why focus on business relationship management?

    Is IT saying this about business partners?

    I don’t know what my business needs and so we can’t add as much value as we’d like.

    My partners don’t give us the opportunity to provide new ideas to solve business problems

    My partners listen to third parties before they listen to IT.

    We’re too busy and don’t have the capacity to help my partners.

    Three stamps with the words 'Value', 'Innovation', and 'Advocacy'. Are business partners saying this about IT?

    IT does not create and deliver valuable services/solutions that resolve my business pain points.

    IT does not come to me with innovative solutions to my business problems/challenges/issues.

    IT blocks my efforts to drive the business forward using innovative technology solutions.

    IT does not advocate for my needs with the decision makers in the organization.

    Common obstacles

    While organizations realize they need to do better, they often don’t know how to improve.

    Organizations want to:
    • Understand and strategically align to business goals
    • Ensure stakeholders are satisfied
    • Show project value/success

    … these are all things that a mature business relationship can do to improve your organization.

    Key improvement areas identified by business leaders and IT leaders

    Bar chart comparing 'CXO' and 'CIO' responses to multiple areas one whether they need significant improvement or only some improvement. Areas in question are 'Understand Business Goals', 'Define and align IT strategy', 'Measure stakeholder satisfaction with IT', and 'Measure IT project success'. Source: CEO/CIO Alignment Diagnostic, N=446 organizations.

    Info-Tech’s approach

    BRMs who focus on achieving business value can improve organizational results.

    Visualization of a piggy bank labelled 'Business Value' with a person on a ladder labelled 'Strategic Tactical Operational' putting coins into the bank which are labelled 'External & internal views', 'Applied knowledge of the business', 'Strategic perspective', 'Trusted relationship', and 'Empathetic engagements “What’s in it for me/them?”'.

    Business relationships can take a strategic, tactical, or operational perspective.

    While all levels are needed, focus on a strategic perspective for optimal outcomes.

    Create business value through:

    • Applying your knowledge of the business so that conversations aren’t about what IT provides. Focus on what the overall business requires.
    • Ensuring your knowledge includes what is going on internally at your organization and also what occurs externally within and outside the industry (e.g. vendors, technologies used in similar industries or with similar customer interactions).
    • Discussing with the perspective of “what’s in it for [insert business partner here]” – don’t just present IT’s views.
    • Building a trusted strategic relationship – don’t just do well at the basics but also focus on the strategy that can move the organization to where it needs to be.

    Neither you nor your partners can view IT as separate from your overall business…

    …your IT goals need to be aligned with those of the overall business

    IT Maturity Pyramid with 'business goals' and 'IT goals' moving upward along its sides. It has five levels, 'unstable - Ad hoc – IT is too busy and the business is unsatisfied (too expensive, too long, not delivering on needs)', 'firefighter - Order taker – IT engaged on as-needed basis. IT unable to forecast demand to manage own resources', 'trusted operator - IT and business are not always sure of each other’s direction/priorities’, ‘business partner - IT understands and delivers on business needs', and 'innovator - Business and IT work together to achieve shared goals'.

    IT and other lines of business need to partner together – they are all part of the same overall business.

    Four puzzle pieces fitting together representing 'IT' and three other Lines of Business '(LOB)'

    <

    Why it’s important to establish a BRM program

    IT Benefits

    • Provides IT with a view of the lines of business they empower
    • Allows IT to be more proactive in providing solutions that help business partner teams
    • Allows IT to better manage their workload, as new requests can be prioritized and understood

    Business Benefits

    • Provides business teams with a view of the services that IT can help them with
    • Brings IT to the table with value-driven solutions
    • Creates an overall roadmap aligning both partners
    Ladder labelled 'Strategic Tactical Operational'.
    • Drive business value into the organization via innovative technology solutions.
    • Improve ability to meet and exceed business goals and objectives, resulting in more satisfied stakeholders (C-suite, board of directors).
    • Enhance ability to execute business activities to meet end-customer requirements and expectations, resulting in more satisfied customers.

    Increase your business benefits by moving up higher – from operational to tactical to strategic.

    Piggy bank labelled 'Business Value'.

    When IT understands the business, they provide better value

    Understanding all parties – including the business needs and context – is critical to effective business relationships.

    Establishing a focus on business relationship management is key to improving IT satisfaction.

    When business partners are satisfied that IT understands their needs, they have a higher perception of the value of overall IT

    Bar chart with axes 'Business satisfaction with IT understanding of needs' and 'Perception of IT value'. There is an upward trend.

    The relationship between the perception of IT value and business satisfaction is strong (r=0.89). Can you afford not to increase your understanding of business needs?

    (Source: Info-Tech Research Group diagnostic data/Business-Aligned IT Strategy blueprint (N=652 first-year organizations that completed the CIO Business Vision diagnostic))

    A tale of two IT partners

    Teleconference with an IT partner asking them to 'Tell me everything'.

    One IT partner approached their business partner without sufficient background knowledge to provide insights.

    The relationship was not strong and did not provide the business with the value they desired.

    Research your business and be prepared to apply your knowledge to be a better partner.

    Teleconference with an IT partner that approached with knowledge of your business and industry.

    The other IT partner approached with knowledge of the business and external parties (vendors, competitors, industry).

    The business partners received this positively. They invited the IT partners to meetings as they knew IT would bring value to their sessions.

    BRM success is measurable Measuring tape.

    1) Survey your stakeholders to measure improvements in customer satisfaction 2) Measure BRM success against the goals for the practice

    Business satisfaction survey

    • Audience: Business leaders
    • Frequency: Annual
    • Metrics:
      • Overall Satisfaction score
      • Overall Value score
      • Relationship Satisfaction:
        • Understand needs
        • Meet needs
        • Communication
    Two small tables showing example 'Value' and 'Satisfaction' scores. Dart board with five darts, each representing a goal, 'Demand Shaping', 'Value Realization', 'Servicing', 'Exploring', and 'Other Goal(s)'.
    Table with a breakdown of the example 'Satisfaction' score, with individual scores for 'Needs', 'Execution', and 'Communication'.

    Maturing your BRM practice is a journey

    Info-Tech has developed an approach that can be used by any organization to improve or successfully implement BRM. The same ladder as before with words 'Strategic', 'Tactical', 'Operational', and a person climbing on it. Become a Trusted Partner and Advisor
    KNOWLEDGE OF INDUSTRY

    STRATEGIC

    Value Creator and Innovator

    Strategic view of IT and the business with knowledge of the market and trends; a connector driving value-added services.

    KNOWLEDGE OF FUNCTIONS

    TACTICAL

    Influencer and Advocate

    Two-way voice between IT and business, understanding business processes and activities including IT touchpoints and growing tactical and strategic view of services and value.

    TABLE STAKES:
    COMMUNICATION
    SERVICE DELIVERY
    PROJECT DELIVERY

    OPERATIONAL

    Deliver

    Communication, service, and project delivery and fulfillment, initial engagement with and knowledge of the business.

    Foundation: Define and communicate the meaning and vision of BRM

    At each level, keep maturing your BRM practice

    ITPartnerWhat to do to move to the next level

    Strategic Partner

    Shared goals for maximizing value and shared risk and reward

    5

    Strategic view of IT and the business with knowledge of the market and trends; a connector driving value-added services.

    Value Creator and Innovator

    See partners as integral to business success and growth

    Focus on continuous learning and improvement.

    Trusted Advisor

    Cooperation based on mutual respect and understanding

    4

    Partners understand, work with, and help improve capabilities.

    Influencer and Advocate

    Sees IT as helpful and reliable

    Strategic: IT needs to demonstrate and apply knowledge of business, industry, and external influences.

    Service Provider

    Routine – innovation is a challenge

    3

    Two-way voice between IT and business; understanding business processes and activities including IT touchpoints and growing tactical and strategic view of services and value.

    Priorities set but still always falling behind.

    Views IT as helpful but they don’t provide guidance

    IT needs to excel in portfolio and transition management.

    Business needs to engage IT in strategy.

    Order Taker

    Distrust, reactive

    2

    Focuses on communication, service, and project delivery and fulfillment, initial engagement with and knowledge of the business.

    Delivery Service

    Engages with IT on an as-needed basis

    Improve Tactical: IT needs to demonstrate knowledge of the business they are in. IT to improve BRM and service management.

    Business needs to embrace BRM role and service management.

    Ad Hoc

    Loudest in, first out

    1

    Too busy doing the basics; in firefighter mode.

    Low satisfaction (cost, duration, quality)

    Improve Operational Behavior: IT to show value with “table stakes” – communication, service delivery, project delivery.

    IT needs to establish intake/demand management.


    Business to embrace a new way of approaching their partnership with IT.

    (Adapted from BRM Institute Maturity Model and Info-Tech’s own model)

    The Info-Tech path to implement BRM

    Use Info-Tech’s ASPIRe method to create a continuously improving BRM practice.

    Info-Tech's ASPIRe method visualized as a winding path. It begins with 'Role Definition', goes through many 'Role Refinements' and ends with 'Metrics'. The main steps to which the acronym refers are 'Assess', 'Situate', 'Plan', 'Implement', and 'Reassess & Embed'.

    Insight summary

    BRM is not just about communication, it’s about delivering on business value.

    Business relationship management isn’t just about having a pleasant relationship with stakeholders, nor is it about just delivering things they want. It’s about driving business value in everything that IT does and leveraging relationships with the business and IT, both within and outside your organization.

    Understand your current state to determine the best direction forward.

    Every organization will apply the BRM practice differently. Understand what’s needed within your organization to create the best fit.

    BRM is not just a communication conduit between IT and the business.

    When implemented properly, a BRM is a value creator, advocate, innovator, and influencer.

    The BRM role must be designed to match the maturity level of the IT organization and the business.

    Before you can create incremental business value, you must master the fundamentals of service and project delivery.

    Info-Tech Insight

    Knowledge of your current situation is only half the battle; knowledge of the business/industry is key.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    Key deliverable:

    Executive Buy-In and Communication Presentation Template

    Explain the need for the BRM practice and obtain buy-in from leadership and staff across the organization.

    Sample of Info-Tech's key deliverable, the Executive Buy-In and Communication Presentation Template.

    BRM Workbook

    Capture the thinking behind your organization’s BRM program.

    Sample of Info-Tech's BRM Workbook deliverable.

    BRM Stakeholder Engagement Plan Worksheet

    Worksheet to capture how the BRM practice will engage with stakeholders across the organization.

    Sample of Info-Tech's BRM Stakeholder Engagement Plan Worksheet deliverable.

    BRM Role Expectations Worksheet

    How business relationship management will be supported throughout the organization at a strategic, tactical, and operational level.

    Sample of Info-Tech's BRM Role Expectations Worksheet deliverable.

    Guided Implementation

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

    What does a typical GI on this topic look like?

    Phase 1

    Phase 2

    Phase 3

    Phase 4

    Phase 5

    Call #1: Discuss goals, current state, and an overview of BRM.

    Call #2: Examine business satisfaction and discuss results of SWOT.

    Call #3: Establish BRM mission, vision, and goals. Call #4: Develop guiding principles.

    Call #5: Establish the BRM operating model and role expectations.

    Call #6: Establish business value. Discuss stakeholders and engagement planning. Call #7: Develop metrics. Discuss portfolio management.

    Call #8: Develop a communication or rollout plan.

    Workshop Overview

    Complete the CIO-Business Vision diagnostic prior to the workshop.
    Contact your account representative for more information.
    workshops@infotech.com1-888-670-8889
    Day 1 Day 2 Day 3 Day 4 Post-Workshop
    Activities
    Set the Foundation
    Assess & Situate
    Define the Operating Model
    Plan
    Define Engagement
    Implement
    Implement BRM
    Reassess
    Next steps and Wrap-Up (offsite)

    1.1 Discuss rationale and importance of business relationship management

    1.2 Review CIO BV results

    1.3 Conduct SWOT analysis (analyze strengths, weaknesses, opportunities, and threats)

    1.4 Establish BRM vision and mission

    1.5 Define objectives and goals for maturing the practice

    2.1 Create your list of guiding principles (optional)

    2.2 Define business value

    2.3. Establish the operating model for the BRM practice

    2.4 Define capabilities

    3.1. Identify key stakeholders

    3.2 Map, prioritize, and categorize the stakeholders

    3.4 Create an engagement plan

    4,1 Define metrics

    4.2 Identify remaining enablers/blockers for practice implementation

    4.3 Create roadmap

    4.4 Create communication plan

    5.1 Complete in-progress deliverables from previous four days

    5.2 Set up review time for workshop deliverables and to discuss next steps

    Deliverables
    1. Summary of CIO Business Vision results
    2. Vision and list of objectives for the BRM program
    3. List of business and IT pain points
    1. BRM role descriptions, capabilities, and ownership definitions
    1. BRM reporting structure
    2. BRM engagement plans
    1. BRM communication plan
    2. BRM metrics tracking plan
    3. Action plan and next step
    1. Workshop Report

    ASSESS

    Assess

    1.1 Define BRM

    1.2 Analyze Satisfaction

    1.3 Assess SWOT

    Situate

    2.1 Create Vision

    2.2 Create the BRM Mission

    2.3 Establish Goals

    Plan

    3.1 Establish Guiding Principles

    3.2 Determine Where BRM Fits

    3.3 Establish BRM Expectations

    3.4 Identify Roles With BRM Responsibilities

    3.5 Align Capabilities

    Implement

    4.1 Brainstorm Sources of Business Value

    4.2 Identify Key Influencers

    4.3 Categorize the Stakeholders

    4.4 Create the Prioritization Map

    4.5 Create Your Engagement Plan

    Reassess & Embed

    5.1 Create Metrics

    5.2 Prioritize Your Projects

    5.3 Create a Portfolio Investment Map

    5.4 Establish Your Annual Plan

    5.5 Build Your Transformation Roadmap

    5.6 Create Your Communication Plan

    To assess BRM, clarify what it means to you

    Who are BRM relationships with? Octopus holding icons with labels 'Tech Partners', 'Lines of Business', and 'External Partners'. The BRM has multiple arms/legs to ensure they’re aligned with multiple parties – the partners within the lines of business, external partners, and technology partners.
    What does a BRM do? Engage the right stakeholders – orchestrate key roles, resources, and capabilities to help stimulate, shape, and harvest business value.

    Connect partners (IT and other business) with the resources needed.

    Help stakeholders navigate the organization and find the best path to business value.

    Three figures performing different actions, labelled 'orchestrate', 'connect', and 'navigate'.
    What does a BRM focus on? Circle bisected at many random points to create areas of different colors with four color-coded circles surrounding it. Demand Shaping – Surfacing and shaping business demand
    Value Harvesting – Identifying ways to increase business value and providing insights
    Exploring – Rationalizing demand and reviewing new business, technology, and industry insights
    Servicing – Managing expectations and facilitating business strategy; business capability road mapping

    Determine what business relationship management is

    Many organizations face business dissatisfaction because they do not understand what the role of a BRM should be.

    A BRM Is NOT:
    • Order taker
    • Service desk
    • Project manager
    • Business analyst
    • Service delivery manager
    • Service owner
    • Change manager
    A BRM Is:
    • Value creator
    • Innovator
    • Trusted advisor
    • Strategic partner
    • Influencer
    • Business subject matter expert
    • Advocate for the business
    • Champion for business process improvement
    Business relationship management does not mean a go-between for the business and IT. Its focus should be on delivering VALUE and INNOVATIVE SOLUTIONS to the business.

    1.1 What is BRM?

    1 hour

    Input: Your preliminary thoughts and ideas on BRM

    Output: Themes summarizing what BRM will be at your organization

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Each team member will take a colored sticky note to capture what BRM is and what it isn’t.
    2. As a group, review and discuss the sticky notes.
    3. Group them into themes summarizing what BRM will be at your organization.
    4. Leverage the workbook to brainstorm the definition of BRM at your organization.
    5. Create a refined summary statement and capture it in the Executive Buy-In and Communication Template.

    Download the BRM Workbook

    Download the Executive Buy-In and Communication Template

    It’s important to understand what the business thinks; ask them the right questions

    Leverage the CIO Business Vision Diagnostic to provide clarity on:
    • The organization’s view on satisfaction and importance of core IT services
    • Satisfaction across business priorities
    • IT’s capacity to meet business needs

    Contact your Account Representative to get started

    Sample of various scorecards from the CIO Business Vision Diagnostic.

    1.2 Use their responses to help guide your BRM program

    1 hour

    Input: CIO-Business Vision Diagnostic, Other business feedback

    Output: Summary of your partners’ view of the IT relationship

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: CIO, IT management team

    1. Complete the CIO Business Vision diagnostic.
    2. Analyze the findings from the Business Vision diagnostic or other business relationship and satisfaction surveys. Key areas to look at include:
      • Overall IT Satisfaction
      • IT Value
      • Relationship (Understands Needs, Communicates Effectively, Executes Requests, Trains Effectively)
      • Shadow IT
      • Capacity Needs
      • Business Objectives
    3. Capture the following on your analysis:
      • Success stories – what your business partners are satisfied with
      • Challenges – are the responses consistent across departments?
    4. Leverage the workbook to capture your findings the goals. Key highlights should be documented in the Executive Buy-In and Communication Template.

    Use the BRM Workbook to capture ideas

    Polish the goals in the Executive Buy-In and Communication Template

    Perform a SWOT analysis to explore internal and external business factors

    A SWOT analysis is a structured planning method organizations use to evaluate the effects of internal strengths and weaknesses and external opportunities and threats on a project or business venture.

    Why It Is Important

    • Business SWOT reveals internal and external trends that affect the business. You may uncover relevant information about the business that the other analysis methods did not reveal.
    • The organizational strengths or weaknesses will shed some light on implications that you might not have considered otherwise, such as brand perception or internal staff capability to change.

    Key Tips/Information

    • Although this activity is simple in theory, there is much value to be gained when performed effectively.
    • Focus on weaknesses that can cause a competitive disadvantage and strengths that can cause a competitive advantage.
    • Rank your opportunities and threats based on impact and probability.
    • Info-Tech members who have derived the most insights from a business SWOT analysis usually involved business stakeholders in the analysis.

    SWOT diagram split into four quadrants representing 'Strengths' at top left, 'Opportunities' at bottom left, 'Weaknesses' at top right, and 'Threats' at bottom right.

    Review these questions to help you conduct your SWOT analysis on the business

    Strengths (Internal)
    • What competitive advantage does your organization have?
    • What do you do better than anyone else?
    • What makes you unique (human resources, product offering, experience, etc.)?
    • Do you have location, price, cost, or quality advantages?
    • Does your organizational culture offer an advantage (hiring the best people, etc.)?
    • Do you have a high level of customer engagement or satisfaction?
    Weaknesses (Internal)
    • What areas of your business require improvement?
    • Are there gaps in capabilities?
    • Do you have financial vulnerabilities?
    • Are there leadership gaps (succession, poor management, etc.)?
    • Are there reputational issues?
    • Are there factors contributing to declining sales?
    Opportunities (External)
    • Are there market developments or new markets?
    • Are there industry or lifestyle trends (move to mobile, etc.)?
    • Are there geographical changes in the market?
    • Are there new partnerships or mergers and acquisitions (M&A) opportunities?
    • Are there seasonal factors that can be used to the advantage of the business?
    • Are there demographic changes that can be used to the advantage of the business?
    Threats (External)
    • Are there obstacles that the organization must face?
    • Are there issues with respect to sourcing of staff or technologies?
    • Are there changes in market demand?
    • Are your competitors making changes that you are not making?
    • Are there economic issues that could affect your business?

    1.3 Analyze internal and external business factors using a SWOT analysis

    1 hour

    Input: IT and business stakeholder expertise

    Output: Analysis of internal and external factors impacting the IT organization

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: CIO, IT management team

    1. Break the group into two teams:
      • Assign team A internal strengths and weaknesses.
      • Assign team B external opportunities and threats.
    2. Think about strengths, weaknesses, opportunities, and threats as they pertain to the IT-business relationship. Consider people, process, and technology elements.
    3. Have the teams brainstorm items that fit in their assigned grids. Use the prompt questions on the previous slide as guidance.
    4. Pick someone from each group to fill in the SWOT grid.
    5. Conduct a group discussion about the items on the list; identify implications for the BRM/IT.

    Capture in the BRM Workbook

    SITUATE

    Assess

    1.1 Define BRM

    1.2 Analyze Satisfaction

    1.3 Assess SWOT

    Situate

    2.1 Create Vision

    2.2 Create the BRM Mission

    2.3 Establish Goals

    Plan

    3.1 Establish Guiding Principles

    3.2 Determine Where BRM Fits

    3.3 Establish BRM Expectations

    3.4 Identify Roles With BRM Responsibilities

    3.5 Align Capabilities

    Implement

    4.1 Brainstorm Sources of Business Value

    4.2 Identify Key Influencers

    4.3 Categorize the Stakeholders

    4.4 Create the Prioritization Map

    4.5 Create Your Engagement Plan

    Reassess & Embed

    5.1 Create Metrics

    5.2 Prioritize Your Projects

    5.3 Create a Portfolio Investment Map

    5.4 Establish Your Annual Plan

    5.5 Build Your Transformation Roadmap

    5.6 Create Your Communication Plan

    Your strategy informs your BRM program

    Your strategy is a critical input into your program. Extract critical components of your strategy and convert them into a set of actionable principles that will guide the selection of your operating model.

    Sample of Info-Tech's 'Build a Business-Aligned IT Strategy' blueprint.

    Vision, Mission & Principles Chevron pointing right.
    • Leverage your vision and mission statements that communicate aspirations and purpose for key information that can be turned into design principles.
    Business Goal Implications Chevron pointing right.
    • Implications are derived from your business goals and will provide important context about the way BRM needs to change to meet its overarching objectives.
    • Understand how those implications will change the way that work needs to be done – new capabilities, new roles, new modes of delivery, etc.
    Target-State Maturity Chevron pointing right.
    • Determine your target-state relationship maturity for your organization using the BRM goals that have been uncovered.

    Outline your mission and vision for your BRM practice

    If you don’t know where you’re trying to go, how do you know if you’ve arrived?

    Establish the vision of what your BRM practice will achieve.

    Your vision will paint a picture for your stakeholders, letting them know where you want to go with your BRM practice.

    Stock image of a hand painting on a large canvas.

    The vision will also help motivate and inspire your team members so they understand how they contribute to the organization.

    Your strategy must align with and support your organization’s strategy.

    Good Visions
    • Attainable – Aspirational but still within reach
    • Communicable – Easy to comprehend
    • Memorable – Not easily forgotten
    • Practical – Solid, realistic
    • Shared – Create a culture of shared ownership across the team/company
    When Visions Fail
    • Not Shared: Lack of buy-in, no alignment with stakeholders
    • Impractical: No plan or strategy to deliver on the vision
    • Unattainable: Set too far in the future
    • Forgettable: Not championed, not kept in mind
    (Source: UX Magazine, 2011)

    Derive the BRM vision statement

    Stock image of an easel with a bundle of paint brushes beside it. Begin the process of deriving the business relationship management vision statement by examining your business and user concerns. These are the problems your organization is trying to solve.
    Icon of one person asking another a question.
    Problem Statements
    First, ask what problems your organization hopes to solve.
    Icon of a magnifying glass on a box.
    Analysis
    Second, ask what success would look like when those problems were solved.
    Icon of two photos in quotes.
    Vision Statement
    Third, polish the answer into a short but meaningful phrase.

    Paint the picture for your team and stakeholders so that they align on what BRM will achieve.

    Vision statements demonstrate what your practice “aspires to be”

    Your vision statement communicates a desired future state of the BRM organization. The statement is expressed in the present tense. It seeks to articulate the desired role of business relationship management and how it will be perceived.

    Sample vision statements:

    • To be a trusted advisor and partner in enabling business innovation and growth through an engaged design practice.
    • The group will strive to become a world-class value center that is a catalyst for innovation.
    • Apple: “We believe that we are on the face of the earth to make great products and that’s not changing.” (Mission Statement Academy, May 2019.)
    • Coca-Cola: “To refresh the world in mind, body, and spirit, to inspire moments of optimism and happiness through our brands and actions, and to create value and make a difference.” (Mission Statement Academy, August 2019.)

    2.1 Vision generation

    1 hour

    Input: IT and business strategies

    Output: Vision statement

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Review the goals and the sample vision statements provided on the previous slide.
    2. Brainstorm possible vision statements that can apply to your practice. Refer to the guidance provided on the previous page – ensure that it paints a picture for the reader to show the desired target state.
    3. Leverage the workbook to brainstorm the vision. Capture the refined statement in the Executive Buy-In and Communication Template.
    Strong vision statements have the following characteristics
    • Describe a desired future
    • Focus on ends, not means
    • Communicate promise
    • Concise, no unnecessary words
    • Compelling
    • Achievable
    • Inspirational
    • Memorable

    Use the BRM Workbook to capture ideas

    Polish the goals in the Executive Buy-In and Communication Template

    Create the mission statement from the problems and the vision statement

    Your mission demonstrates your current intent and the purpose driving you to achieve your vision.

    It reflects what the organization does for users/customers.

    The main word 'Analysis' is sandwiched between 'Goals and Problems' and 'Vision Statement', each with arrow pointing to the middle. Make sure the practice’s mission statement reflects answers to the questions below:

    The questions:

    • What does the organization do?
    • How does the organization do it?
    • For whom does the organization do it?
    • What value is the organization bringing?

    “A mission statement illustrates the purpose of the organization, what it does, and what it intends on achieving. Its main function is to provide direction to the organization and highlight what it needs to do to achieve its vision.” (Joel Klein, BizTank (in Hull, “Answer 4 questions to get a great mission statement.”))

    Sample mission statements

    To enhance the lives of our end users through our products so that our brand becomes synonymous with user-centricity.

    To enable innovative services that are seamless and enjoyable to our customers so that together we can inspire change.

    Apple’s mission statement: “To bring the best user experience to its customers through its innovative hardware, software, and services.” (Mission Statement Academy, May 2019.)

    Coca Cola’s mission statement: “To refresh the world in mind, body, and spirit, to inspire moments of optimism and happiness through our brands and actions, and to create value and make a difference.” (Mission Statement Academy, August 2019.)

    Tip: Using the “To … so that” format helps to keep your mission focused on the “why.”

    2.2 Develop your own mission statement

    1 hour

    Input: IT and business strategies, Vision

    Output: Mission statement

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Review the goals and the vision statement generated in the previous activities.
    2. Brainstorm possible mission statements that can apply to your BRM practice. Capture this in your BRM workbook.
    3. Refine your mission statement. Refer to the guidance provided on the previous page – ensure that the mission provides “the why”. Document the refined mission statement in the Executive Buy-In and Communication Template.

    “People don't buy what you do; they buy why you do it and what you do simply proves what you believe.” (Sinek, Transcript of “How Great Leaders Inspire Action.”)

    Download the BRM Workbook

    Download the Executive Buy-In and Communication Template

    Areas that BRMs focus on include:

    Establish how much of these your practice will focus on.

    VALUE HARVESTING
    • Tracks and reviews performance
    • Identifies ways to increase business value
    • Provides insights on the results of business change/initiatives
    Circle bisected at many random points to create areas of different colors with four color-coded circles surrounding it. DEMAND SHAPING
    • Isn’t just demand/intake management
    • Surfaces and shapes business demand
    • Is influenced by knowledge of the overall business and external entities
    SERVICING
    • Coordinates resources
    • Manages expectations
    • Facilitates business strategy, business capability road-mapping, and portfolio and program management
    EXPLORING
    • Identifies and rationalizes demand
    • Reviews new business, technology, and industry insights
    • Identifies business value initiatives

    Establish what success means for your focus areas

    Brainstorm objectives and success areas for your BRM practice.

    Circle bisected at many random points to create areas of different colors with four color-coded circles surrounding it. VALUE HARVESTING
    Success may mean that you:
    • Understand the drivers and what the business needs to attain
    • Demonstrate focus on value in discussions
    • Ensure value is achieved, tracking it during and beyond deployment
    DEMAND SHAPING
    Success may mean that you:
    • Understand the business
    • Are engaged at business meetings (invited to the table)
    • Understand IT; communicate clarity around IT to the business
    • Help IT prioritize needs
    SERVICING
    Success may mean that you:
    • Understand IT services and service levels that are required
    • Provide clarity around services and communicate costs and risks
    EXPLORING
    Success may mean that you:
    • Surface new opportunities based on understanding of pain points and growth needs
    • Research and partner with others to further the business
    • Engage resources with a focus on the value to be delivered

    2.3 Establish BRM goals

    1 hour

    Input: Mission and vision statements

    Output: List of goals

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: CIO, IT management team, BRM team

    1. Use the previous slides as a starting point – review the focus areas and sample associated objectives.
    2. Determine if all apply to your role.
    3. Brainstorm the objectives for your BRM practice.
    4. Discuss and refine the objectives and goals until the team agrees on your starting set.
    5. Leverage the workbook to establish the goals. Capture refined goals in the Executive Buy-In and Communication Template.

    Download the BRM Workbook

    Download the Executive Buy-In and Communication Template

    PLAN

    Assess

    1.1 Define BRM

    1.2 Analyze Satisfaction

    1.3 Assess SWOT

    Situate

    2.1 Create Vision

    2.2 Create the BRM Mission

    2.3 Establish Goals

    Plan

    3.1 Establish Guiding Principles

    3.2 Determine Where BRM Fits

    3.3 Establish BRM Expectations

    3.4 Identify Roles With BRM Responsibilities

    3.5 Align Capabilities

    Implement

    4.1 Brainstorm Sources of Business Value

    4.2 Identify Key Influencers

    4.3 Categorize the Stakeholders

    4.4 Create the Prioritization Map

    4.5 Create Your Engagement Plan

    Reassess & Embed

    5.1 Create Metrics

    5.2 Prioritize Your Projects

    5.3 Create a Portfolio Investment Map

    5.4 Establish Your Annual Plan

    5.5 Build Your Transformation Roadmap

    5.6 Create Your Communication Plan

    Guiding principles help you focus the development of your practice

    Your guiding principles should define a set of loose rules that can be used to design your BRM practice to the specific needs of the organization and work that needs to be done.

    These rules will guide you through the establishment of your BRM practice and help you explain to your stakeholders the rationale behind organizing in a specific way.

    Sample Guiding Principles

    Principle Name

    Principle Statement

    Customer Focus We will prioritize internal and external customer perspectives
    External Trends We will monitor and liaise with external organizations to bring best practices and learnings into our own
    Organizational Span We embed relationship management across all levels of leadership in IT
    Role If the resource does not have a seat at the table, they are not performing the BRM role

    3.1 Establish guiding principles (optional activity)

    Input: Mission and vision statements

    Output: BRM guiding principles

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Think about strengths, weaknesses, opportunities, and threats as well as the overarching goals, mission, and vision.
    2. Identify a set of principles that the BRM practice should have. Guiding principles are shared, long-lasting beliefs that guide the use of business relationship management in your organization.

    Download the BRM Workbook

    Download the Executive Buy-In and Communication Template

    Establish the BRM partner model and alignment

    Having the right model and support is just as important as having the right people.

    Gears with different BRM model terms: 'BRM Capabilities', 'BRM & Other Roles', 'Scope (pilot)', 'Operating Unit', 'BRM Expectations Across the organization', and 'Delivery & Support'.

    Don’t boil the ocean: Start small

    It may be useful to pilot the BRM practice with a small group within the organization – this gives you the opportunity to learn from the pilot and share best practices as you expand your BRM practice.

    You can leverage the pilot business unit’s feedback to help obtain buy-in from additional groups.

    Evaluate the approaches for your pilot:
    Work With an Engaged Business Unit
    Icon of a magnifying glass over a group of people.

    This approach can allow you to find a champion group and establish quick wins.

    Target Underperforming Area(s)
    Icon of an ambulance.

    This approach can allow you to establish significant wins, providing new opportunities for value.

    Target the Area(s) Driving the Most Business Value
    Icon of an arrow in a bullseye.

    Provide the largest positive impact on your portfolio’s ability to drive business value; for large strategic or transformative goals.

    Work Across a Single Business Process
    Icon of a process tree.

    This approach addresses a single business process or operation that exists across business units, departments, or locations. This, again, will allow you to limit the number of stakeholders.

    Leverage BRM goals to determine where the role fits within the organization

    Organization tree with a strategic BRM.

    Strategic BRMs are considered IT leaders, often reporting to the CIO.


    Organization tree with an operational BRM.

    In product-aligned organizations, the product owners will own the strategic business relationship from a product perspective (often across LOB), while BRMs will own the strategic role for the line(s) of businesses (often across products) that they hold a relationship with. The BRM role may be played by a product family leader.


    Organization tree with a BRM in a product-aligned organization.

    BRMs may take on a more operational function when they are embedded within another group, such as the PMO. This manifests in:

    • Accountability for projects and programs
    • BRM conversations around projects and programs rather than overall needs
    • Often, there is less focus on stimulating need, more about managing demand
    • This structure may be useful for smaller organizations or where organizations are piloting the relationship capability

    Use the IT structure and the business structure to determine how to align BRM and business partners. Many organizations ensure that each LOB has a designated BRM, but each BRM may work with multiple LOBs. Ensure your alignment provides an even and manageable distribution of work.

    Don’t be intimidated by those who play a significant role in relationship management

    Layers representing the BRM, BA, and Product Owner. Business Relationship Manager: Portfolio View
    • Ongoing with broader organization-wide objectives
    • A BRM’s strategic perspective is focused across projects and products
    The BRM will look holistically across a portfolio, rather than on specific projects or products. Their focus is ensuring value is delivered that impacts the overall organization. Multiple BRMs may be responsible for lines of businesses and ensure that products and project enable LOBs effectively.
    Business Analyst: Product or Project View
    • Works within a project or product
    • Accomplishes specific objectives within the project/product
    The BA tends to be involved in project work – to that end, they are often brought in a bit before a project begins to better understand the context. They also often remain after the project is complete to ensure project value is delivered. However, their main focus is on delivering the objectives within the project.
    Product Owner: Product View
    • Ongoing and strategic view of entire product, with product-specific objectives
    The Product Owner bridges the gap between the business and delivery to ensure their product continuously delivers value. Their focus is on the product.

    3.2 Establish the BRM’s place in the organizational structure

    Input: BRM goals, IT organizational structure, Business organizational structure

    Output: BRM operating model

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Review the current organizational structure – both IT and overall business.
    2. Think about the maturity of the IT organization and what you and your partners will be able to support at this stage in the relationship or journey. Establish whether it is necessary to start with a pilot.
    3. Consider the reporting relationship that is required to support the desired maturity of your practice – who will your BRM function report into?
    4. Consider the distribution of work from your business partners. Establish which BRM is responsible for which partners.
    5. Document where the BRM fits in the organization in the Executive Buy-In and Communication Template.

    Download the BRM Workbook

    Download the Executive Buy-In and Communication Template

    Align your titles to your business partners and ensure it demonstrates your strategic goals

    Some titles that may reflect alignment with your partners:
    • Business Capability Manager
    • Business Information Officer
    • Business Relationship Manager
    • Director, Technology Partner
    • IT Business Relationship Manager
    • People Relationship Manager
    • Relationship and Strategy Officer
    • Strategic Partnership Director
    • Technology Partner/People Partner/Finance Partner/etc.
    • Value Management Officer

    Support BRM team members might have “analyst” or “coordinator” as part of their titles.

    Caution when using these titles:
    • Account Manager (do you see your stakeholders as accounts or as partners?)
    • Customer Relationship Manager (do you see your stakeholders as customers or as partners?)
    • People Partner (differentiate your role from HR)

    Determine the expectations for your BRM role(s)

    Below are standard expectations from BRM job descriptions. Establish whether there are changes required for your organization.

    Act as a Relationship Manager
    • Build strong, collaborative relationships with business clients
    • Build strong, collaborative relationships with IT service owners
    • Track client satisfaction with services provided
    • Continuously improve, based on feedback from clients
    Communicate With Business Stakeholders
    • Ensure that effective communication occurs related to service delivery and project delivery (e.g. planned downtime, changes, open tickets)
    • Manage expectations of multiple business stakeholders
    • Provide a clear point of contact within IT for each business stakeholder
    • Act as a bridge between IT and the business
    Service Delivery

    Service delivery breaks out into three activities: service status, changes, and service desk tickets

    • Understand at a high level the services and technologies in use
    • Work with clients to plan and make sure they understand the relevance and impact of IT changes to their operations
    • Define, agree to, and report on key service metrics
    • Act as an escalation point for major issues with any aspect of service delivery
    • Work with service owners to develop and monitor service improvement plans
    Project/Product Delivery
    • Ensure that the project teams provide regular reports regarding project status, issues, and changes
    • Work with project managers and clients to ensure project requirements are well understood and documented and approved by all stakeholders
    • Ensure that the project teams provide key project metrics on a regular basis to all relevant stakeholders

    Determine role expectations (slide 2 of 3)

    Knowledge of the Business

    Understand the main business activities for each department:

    • Understand which IT services are required to complete each business activity
    • Understand business processes and associated business activities for each user group within a department
    Advocate for Your Business Clients
    • Act as an advocate for the client – be invested in client success
    • Understand the strategies and plans of the clients and help develop an IT strategic plan/roadmap that maps to business strategies
    • Help the business understand project governance processes
    • Help clients to develop proposals and advance them through the project intake and assessment process
    Influence Business and IT Stakeholders
    • Influence business and IT stakeholders at multiple levels of the organization to help clients achieve their business objectives
    • Leverage existing relationships to convince decision makers to move forward with business and IT initiatives that will benefit the department and the organization as a whole
    • Understand and solve issues and challenges such as differing agendas, political considerations, and resistance to change
    Knowledge of the Market
    • Understand the industry – trends, competition, future direction
    • Leverage what others are doing to bring innovative ideas to the organization
    • Understand what end customers expect with regards to IT services and bring this intelligence to business leaders and decision makers

    Determine role expectations (slide 3 of 3)

    Value Creator
    • Understand how services currently offered by IT can be put to best use and create value for the business
    • Work collaboratively with clients to define and prioritize technology initiatives (new or enhanced services) that will bring the most business benefit
    • Lead initiatives that help the business achieve or exceed business goals and objectives
    • Lead initiatives that create business value (increased revenue, lower costs, increased efficiency) for the organization
    Innovator
    • Lead initiatives that result in new and better ways of doing business
    • Identify opportunities for using IT in new and innovative ways to bring value to the business and drive the business forward
    • Leverage knowledge of the business, knowledge of the industry, and knowledge of leading-edge technological solutions to transform the way the business operates and provides services to its customers

    3.3 Establish BRM expectations

    Input: BRM goals

    Output: BRM expectations

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Review the BRM expectations on the previous slides.
    2. Customize them – are they the appropriate set of expectations needed for your organization? What needs to be edited in or out?
    3. Add relevant expectations – what are the things that need to be done in the BRM practice at your organization?
    4. Leverage the workbook to brainstorm BRM expectations. Make sure you update them in the BRM Role Expectation Spreadsheet.

    Download the BRM Workbook

    Download the Executive Buy-In and Communication Template

    Various roles and levels within your organization may have a part of the BRM pie

    Where the BRM sits will impact what they are able to get done.

    The BRM role is a strategic one, but other roles in the organization have a part to play in impacting IT-partner relationship.

    Some roles may have a more strategic focus, while others may have a more tactical or operational focus.

    3.4 Identify roles with BRM responsibilities

    Input: BRM goals

    Output: BRM-aligned roles

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Various roles can play a part in the BRM practice, managing business relationships. Which ones make sense in your organization, given the BRM goals?
    2. Identify the roles and capture in the BRM Role Expectation Spreadsheet. Use the Role Expectation Alignment tab, row 1.


    Download the Role Expectations Worksheet

    Determine the focus for each role that may manage business relationships

    Icon of a telescope. STRATEGIC Sets Direction: Focus of the activities is at the holistic, enterprise business level “relating to the identification of long-term or overall aims and interests and the means of achieving them” e.g. builds overarching relationships to enable and support the organization’s strategy; has strategic conversations
    Icon of a house in a location marker. TACTICAL Figures Out the How: Focuses on the tactics required to achieve the strategic focus “skillful in devising means to ends” e.g. builds relationships specific to tactics (projects, products, etc.)
    Icon of a gear cog with a checkmark. OPERATIONAL Executes on the Direction: Day-to-day operations; how things get done “relating to the routine functioning and activities of a business or organization” e.g. builds and leverages relationships to accomplish specific goals (within a project or product)

    3.5 Align BRM capabilities to roles

    Input: Current-state model, Business value matrix, Objectives and goals

    Output: BRM-aligned roles

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Review each group of role expectations – Act as a Relationship Manager, Communicate with Business Stakeholders, etc. For each group, determine the focus each role can apply to it – strategic, tactical, or operational. Refer to the previous slide for examples.
    2. Capture on the spreadsheet:
      • S – This role is required to have a strategic view of the capabilities. They are accountable and set direction for this aspect of relationship management.
      • T – Indicate if the role is required to have a tactical view of the capabilities. This would include whether the role is required to figure out how the capabilities will be done; for example, is the role responsible for carrying out service management or are they just involved to ensure that that set of expectations are being performed?
      • O – Indicate if the role will have an operational view – are they the ones responsible for doing the work?
      • Note: In some organizations, a role may have more than one of these.
    3. The spreadsheet will highlight the cells in green if the role plays more of the strategic role, yellow for tactical, and brown for operational. This provides an overall visual of each role’s part in relationship management.
    4. (Optional) Review each detailed expectation within the group. Evaluate whether specific roles will have a different focus on the unique role expectations.

    Leverage the Role Expectations Worksheet

    Sample role expectation alignment

    Sample of a role expectation alignment table with expectation names and descriptions on the left and a matrix of which roles should have a Strategic (S), Tactical (T), or Operational (O) view of the capabilities.

    IMPLEMENT

    Assess

    1.1 Define BRM

    1.2 Analyze Satisfaction

    1.3 Assess SWOT

    Situate

    2.1 Create Vision

    2.2 Create the BRM Mission

    2.3 Establish Goals

    Plan

    3.1 Establish Guiding Principles

    3.2 Determine Where BRM Fits

    3.3 Establish BRM Expectations

    3.4 Identify Roles With BRM Responsibilities

    3.5 Align Capabilities

    Implement

    4.1 Brainstorm Sources of Business Value

    4.2 Identify Key Influencers

    4.3 Categorize the Stakeholders

    4.4 Create the Prioritization Map

    4.5 Create Your Engagement Plan

    Reassess & Embed

    5.1 Create Metrics

    5.2 Prioritize Your Projects

    5.3 Create a Portfolio Investment Map

    5.4 Establish Your Annual Plan

    5.5 Build Your Transformation Roadmap

    5.6 Create Your Communication Plan

    Speak the same language as your partners: Business Value

    Business value represents the desired outcome from achieving business priorities.

    Value is not only about revenue or reduced expenses. Use this internal-external and capability-financial business value matrix to more holistically consider what is valuable to stakeholders.

    Improved Capabilities
    Enhance Services
    Products and services that enable business capabilities and improve an organization’s ability to perform its internal operations.
    Increase Customer Satisfaction
    Products and services that enable and improve the interaction with customers or produce practical market information and insights.
    Inward Outward
    Save Money
    Products and services that reduce overhead. They typically are less related to broad strategic vision or goals and more simply limit expenses that would occur had the product or service not put in place.
    Make money
    (Return on Investment)
    Products and services that are specifically related to the impact on an organization’s ability to create a return on investment.
    Financial Benefits

    Business Value Matrix Axes:

    Financial Benefits vs. Improved Capabilities
    • Improved capabilities refers to the enhancement of business capabilities and skill sets.
    • Financial Benefits refers to the degree in which the value source can be measured through monetary metrics and is often highly tangible.
    Inward vs. Outward Orientation
    • Inward refers to value sources that have an internal impact an organization’s effectiveness and efficiency in performing its operations.
    • Outward refers to value sources that come from interactions with external factors, such as the market or your customers.

    4.1 Activity: Brainstorm sources of business value

    Input: Product and service knowledge, Business process knowledge

    Output: Understanding of different sources of business value

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Identify your key stakeholders. These individuals are the critical business strategic partners in the organization’s governing bodies.
    2. Brainstorm the different types of business value that the BRM practice can produce.
    3. Is the item more focused on improving capabilities or generating financial benefits?
    4. Is the item focused on the customers you serve or the IT team?
    5. Enter your value item into a cell on the Business Value Matrix based on where it falls on these axes.
    6. Start to think about metrics you can use to measure how effective the product or service is at generating the value source.
    Simplified version of the Business Value Matrix on the previous slide.

    Use the BRM Workbook to capture sources of business value

    Brainstorm the different sources of business value (continued)

    See appendix for more information on value drivers:
    Example:
    Enhance Services
    • Dashboards/IT Situational Awareness
    • Improve measurement of services for data-driven analytics that can improve services
    • Collaborate to support Enterprise Architecture
    • Approval for and support of new applications per customer demand
    • Provide consultation for IT issues
    Axis arrow with 'Improved Capabilities'.
    Axis arrow with 'Financial Benefits'.
    Reach Customers
    • Provide technology roadmaps for IT services and devices
    • Improved "PR" presence: websites, service catalog, etc.
    • Enhance customer experience
    • Faster Time-to-market delivering innovative technologies and current services
    Axis arrow with 'Inward'.Axis arrow with 'Outward'.
    Reduce Costs
    • Achieve better pricing through enterprise agreements for IT services that are duplicated across several orgs
    • Prioritization/ development of roadmap
    • Portfolio management / reduce duplication of services
    • Evolve resourcing strategies to integrate teams (e.g. do more with less)
    Return on Investment
    • Customer -focused dashboards
    • Encourage use of centralized services through external collaboration capabilities that fit multiple use cases
    • Devise strategies for measured/supported migration from older IT systems/software

    Implications of ineffective stakeholder management

    A stakeholder is any group or individual who is impacted by (or impacts) your objectives.

    Challenges with stakeholder management can result from a self-focused point of view. Avoid these challenges by taking on the other’s perspectives – what’s in it for them.

    The key objectives of stakeholder management are to improve outcomes, increase confidence, and enhance trust in IT.

    • Obtain commitment of executive management for IT-related objectives.
    • Enhance alignment between IT and the business.
    • Improve understanding of business requirements.
    • Improve implementation of technology to support business processes.
    • Enhance transparency of IT costs, risks, and benefits.

    Challenges

    • Stakeholders are missed or new stakeholders are identified too late.
    • IT has a tendency to only look for direct stakeholders. Indirect and hidden stakeholders are not considered.
    • Stakeholders may have conflicting priorities, different visions, and different needs. Keeping every stakeholder happy is impossible.
    • IT has a lack of business understanding and uses jargon and technical language that is not understood by stakeholders.

    Implications

    • Unanticipated stakeholders and negative changes in stakeholder sentiment can derail initiatives.
    • Direct stakeholders are identified, but unidentified indirect or hidden stakeholders cause a major impact to the initiative.
    • The CIO attempts to trade off competing agendas and ends up caught in the middle and pleasing no one.
    • There is a failure in understanding and communications, leading stakeholders to become disenchanted with IT.

    Cheat Sheet: Identify stakeholders

    Ask stakeholders “who else should I be talking to?” to discover additional stakeholders and ensure you don’t miss anyone.

    List the people who are identified through the following questions: Take a 360-degree view of potential internal and external stakeholders who might be impacted by the initiative.
    • Who will be adversely affected by potential environmental and social impacts in areas of influence that are affected by what you are doing?
    • At which stage will stakeholders be most affected (e.g. procurement, implementation, operations, decommissioning)?
    • Will other stakeholders emerge as the phases are started and completed?
    • Who is sponsoring the initiative?
    • Who benefits from the initiative?
    • Who loses from the initiative?
    • Who can make approvals?
    • Who controls resources?
    • Who has specialist skills?
    • Who implements the changes?
    • Who are the owners, governors, customers, and suppliers to impacted capabilities or functions?

    Executives

    Peers

    Direct reports

    Partners

    Customers

    Stock image of a world.

    Subcontractors

    Suppliers

    Contractors

    Lobby groups

    Regulatory agencies

    Establish your stakeholder network “map”

    Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

    Your stakeholder map defines the influence landscape your BRM team operates in. It is every bit as important as the teams who enhance, support, and operate your products directly.

    Notes on the network map

    • Pay special attention to influencers who have many arrows; they are called “connectors,” and due to their diverse reach of influence, should themselves be treated as significant stakeholders.
    • Don’t forget to consider the through-lines from one influencer through intermediate stakeholders or influencers to the final stakeholder – a single influencer may have additional influence via multiple, possibly indirect paths to a single stakeholder.

    Legend for the example stakeholder network map below. 'Black arrows indicate the direction of professional influence'. 'Dashed green arrows indicate bidirectional, informal influence relationships'

    Example stakeholder network map visualizing relationships between different stakeholders.

    4.2 Visualize interrelationships among stakeholders to identify key influencers

    Input: List of stakeholders

    Output: Relationships among stakeholders and influencers

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. List direct stakeholders for your area. Ensure it includes stakeholders across the organization (both IT and business units).
    2. Determine the stakeholders of your stakeholders. Consider adding each of them to the stakeholder list: assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
    3. Create a stakeholder network map to visualize relationships.
      • (Optional) Use black arrows to indicate the direction of professional influence.
      • (Optional) Use dashed green arrows to indicate bidirectional, informal influence relationships.
    4. Capture the list or diagram of your stakeholders in your workbook.

    Use the BRM Workbook to capture stakeholders

    Categorize your stakeholders with a stakeholder prioritization map

    A stakeholder prioritization map help teams categorize their stakeholders by their level or influence and ownership.

    There are four areas in the map and the stakeholders within each area should be treated differently.

    • Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical and a lack of support can cause significant impediment to the objectives.
    • Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.
    • Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.
    • Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.

    Stakeholder prioritization map with axes 'Influence' and 'Ownership/Interest' splitting the map into four quadrants: 'Spectators Low/Low', 'Noisemakers Low/High', 'Mediators High/Low', and 'Players High/High'.

    4.3 Group your stakeholders into categories

    Input: Stakeholder Map

    Output: Categorization of stakeholders and influencers

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Identify your stakeholder’s interest in and influence on your BRM program.
    2. Map your results to the quadrant in your workbook to determine each stakeholder’s category.

    Stakeholder prioritization map with example 'Stakeholders' placed in or across the four quadrants.

    Level of Influence

    • Power: Ability of a stakeholder to effect change.
    • Urgency: Degree of immediacy demanded.
    • Legitimacy: Perceived validity of stakeholder’s claim.
    • Volume: How loud their “voice” is or could become.
    • Contribution: What they have that is of value to you.

    Level of Interest

    How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?

    Use the BRM Workbook to map your stakeholders

    Define strategies for engaging stakeholders by type

    Each group of stakeholders draws attention and resources away from critical tasks.

    By properly identifying your stakeholder groups, you can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers while ensuring the needs of the Mediators and Players are met.

    Type Quadrant Actions
    Players High influence; high interest Actively Engage
    Keep them engaged through continuous involvement. Maintain their interest by demonstrating their value to its success.
    Mediators High influence; low interest Keep Satisfied
    They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust, and include them in important decision-making steps. In turn, they can help you influence other stakeholders.
    Noisemakers Low influence; high interest Keep Informed
    Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.
    Spectators Low influence; low interest Monitor
    They are followers. Keep them in the loop by providing clarity on objectives and status updates.

    Prioritize your stakeholders

    There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

    Apply a third dimension for stakeholder prioritization: support.

    Support, in addition to interest and influence, is used to prioritize which stakeholders are should receive the focus of your attention. This table indicates how stakeholders are ranked:

    Table with 'Stakeholder Categories' and their 'Level of Support' for prioritizing. Support levels are 'Supporter', 'Evangelist', 'Neutral', and 'Blocker'.

    Support can be determined by rating the following question: how likely is it that your stakeholder would recommend IT at your organization/your group? Our four categories of support:

    • Blocker – beware of the blocker. These stakeholders do not support your cause and have the necessary drive to impede the achievement of your objectives.
    • Semi-Supporter – while these stakeholders are committed to your objectives, they are somewhat apathetic to advocate on your behalf. They will support you so long as it does not require much effort from them to do so.
    • Neutral – neutrals do not have much commitment to your objectives and are not willing to expend much energy to either support or detract from them.
    • Supporter – these stakeholders are committed to your initiative and are willing to whole-heartedly provide you with support.

    4.4 Update your stakeholder quadrant to include the three dimensions

    Input: Stakeholder Map

    Output: Categorization of stakeholders and influencers

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Identify the level of support of each stakeholder by answering the following question: how likely is it that your stakeholder would support your initiative/endeavor?
    2. Map your results to the model in your workbook to determine each stakeholder’s category.
    Stakeholder prioritization map with example 'Persons' placed in or across the four quadrants. with The third dimension, 'Level of Support', is color-coded.

    Use the BRM Workbook to map your stakeholders

    Leverage your map to think about how to engage with your stakeholders

    Not all stakeholders are equal, nor can they all be treated the same. Your stakeholder quadrant highlights areas where you may need to engage differently.

    Blockers

    Pay attention to your “blockers,” especially those that appear in the high influence and high interest part of the quadrant. Consider how your engagement with them varies from supporters in this quadrant. Consider what is valuable to these stakeholders and focus your conversations on “what’s in this for them.”

    Neutral & Evangelists

    Stakeholders that are neutral or evangelists do not require as much attention as blockers and supporters, but they still can’t be ignored – especially those who are players (high influence and engagement). Focus on what’s in it for them to move them to become supporters.

    Supporters

    Do not neglect supporters – continue to engage with them to ensure that they remain supporters. Focus on the supporters that are influential and impacted, rather than the “spectators.”

    4.5 Create your engagement plan

    Input: Stakeholder Map/list of stakeholders

    Output: Categorization of stakeholders and influencers

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Leverage the BRM Stakeholder Engagement Plan spreadsheet. List your key stakeholders.
    2. Consider: how do you show value at your current maturity level so that you can gain trust and your relationship can mature? Establish where your relationship lacks maturity, and consider whether you need to engage with them on a more strategic, tactical, or even operational manner.
      • At lower levels of maturity (Table Stakes), focus on service delivery, project delivery, and communication.
      • At mid-level maturity (Influencer/Advocate), focus on business pain points and a deeper knowledge of the business.
      • At higher maturity levels (Value Creator/Innovator), focus on creating value by leading innovative initiatives that drive the business forward.
    3. Review the stakeholder quadrant. Update the frequency of your communication accordingly.
    4. Capture the agenda for your engagements with them.

    Download and use the BRM Stakeholder Engagement Plan

    Your agenda should vary with the maturity of your relationship

    Agenda
    Stakeholder Information Type Meeting Frequency Lower Maturity Mid-Level Maturity Higher Maturity
    VP Strategic Quarterly
    • Summary of current and upcoming projects and initiatives
    • Business pain points for the department
    • Proposed solutions to address business pain points
    • Innovative solutions to improve business processes and drive value for the department and the organization
    Director Strategic, Tactical Monthly
    • Summary of recent and upcoming changes
    • Summary of current and upcoming projects and initiatives
    • Business pain points for the department
    • Proposed business process improvements
    • Current and upcoming project proposals to address business pain points
    • Innovative solutions to help the department achieve its business goals and objectives
    Manager Tactical Monthly
    • Summary of service desk tickets
    • Summary of recent and upcoming changes
    • Summary of current and upcoming projects and initiatives
    • Business pain points for the team
    • Proposed business activity improvements
    • Current and upcoming projects to address business pain points
    • Innovative solutions to help business users perform their daily business activities more effectively and efficiently

    Lower Maturity – Focus on service delivery, project delivery, and communication

    Mid-Level Maturity – Focus on business pain points and a deeper knowledge of the business

    Higher Maturity – Focus on creating value by leading innovative initiatives that drive the business forward

    Stakeholder – Include both IT and business stakeholders at appropriate levels

    Agenda – Manage stakeholders expectations, and clarify how your agenda will progress as the partnership matures

    REASSESS & EMBED

    Assess

    1.1 Define BRM

    1.2 Analyze Satisfaction

    1.3 Assess SWOT

    Situate

    2.1 Create Vision

    2.2 Create the BRM Mission

    2.3 Establish Goals

    Plan

    3.1 Establish Guiding Principles

    3.2 Determine Where BRM Fits

    3.3 Establish BRM Expectations

    3.4 Identify Roles With BRM Responsibilities

    3.5 Align Capabilities

    Implement

    4.1 Brainstorm Sources of Business Value

    4.2 Identify Key Influencers

    4.3 Categorize the Stakeholders

    4.4 Create the Prioritization Map

    4.5 Create Your Engagement Plan

    Reassess & Embed

    5.1 Create Metrics

    5.2 Prioritize Your Projects

    5.3 Create a Portfolio Investment Map

    5.4 Establish Your Annual Plan

    5.5 Build Your Transformation Roadmap

    5.6 Create Your Communication Plan

    Measure your BRM practice success

    • Metrics are powerful because they drive behavior.
    • Metrics are also dangerous because they often lead to unintended negative outcomes.
    • Metrics should be chosen carefully to avoid getting “what you asked for” instead of “what you intended.”

    Stock image of multiple business people running off the end of a pointed finger like lemmings.

    Questions to ask Are your metrics achievable?
    1. What are the leading indicators of BRM effectively supporting the business’ strategic direction?
    2. How are success metrics aligned with the objectives of other functional groups?

    S pecific

    M easurable

    A chievable

    R ealistic

    T ime-bound

    Embedding the BRM practice within your organization must be grounded in achievable outcomes.

    Ensure that the metrics your practice is measured against reflect realistic and tangible business expectations. Overpromising the impact the practice will have can lead to long-term implementation challenges.

    Determine whether your business is satisfied with IT

    Measuring tape.

    1

    Survey your stakeholders to measure improvements in customer satisfaction.

    Leverage the CIO Business Vision on a regular interval – most find that annual assessments drive success.

    Evaluate whether the addition or increased maturity of your BRM practice has improved satisfaction with IT.

    Business satisfaction survey

    • Audience: Business leaders
    • Frequency: Annual
    • Metrics:
      • Overall Satisfaction score
      • Overall Value score
      • Relationship Satisfaction:
        • Understand needs
        • Meet needs
        • Communication
    Two small tables showing example 'Value' and 'Satisfaction' scores.
    Table with a breakdown of the example 'Satisfaction' score, with individual scores for 'Needs', 'Execution', and 'Communication'.

    Check if you’ve met the BRM goals you set out to achieve

    Measuring tape.

    2

    Measure BRM success against the goals for the practice.

    Evaluate whether the BRM practice has helped IT to meet the goals that you’ve established.

    For each of your goals, create metrics to establish how you will know if you’ve been successful. This might be how many or what type of interactions you have with your stakeholders, and/or it could be new connections with internal or external partners.

    Ensure you have established metrics to measure success at your goals.

    Dart board with five darts, each representing a goal, 'Demand Shaping', 'Value Realization', 'Servicing', 'Exploring', and 'Other Goal(s)'.

    5.1 Create metrics

    Input: Goals, The attributes which can align to goal success

    Output: Measurements of success

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Start with a consideration of your goals and objectives.
    2. Identify key aspects that can support confirming if the goal was successful.
    3. For each aspect, develop a method to measure success with a specific measurement.
    4. When creating the KPI consider:
      • How you know if you are achieving your objective (performance)?
      • How frequently will you be measuring this?
      • Are you looking for an increase, decrease, or maintenance of the metric?
    Table with columns 'BRM Goals', 'Measurement', 'KPI', and 'Frequency'.

    Use the BRM Workbook

    Don’t wait all year to find out if you’re on track

    Leverage the below questions to quickly poll your business partners on a more frequent basis.

    Partner instructions:

    Please indicate how much you agree with each of the following statements. Use a scale of 1-5, where 1 is low agreement and 5 indicates strong agreement:

    Demand Shaping: My BRM is at the table and seeks to understand my business. They help me understand IT and helps IT prioritize my needs.

    Exploring: My BRM surfaces new opportunities based on their understanding of my pain points and growth needs. They engage resources with a focus on the value to be delivered.

    Servicing: The BRM obtains an understanding of the services and service levels that are required, clarifies them, and communicates costs and risks.

    Value Harvesting: Focus on value is evident in discussions – the BRM supports IT in ensuring value realization is achieved and tracks value during and beyond deployment.

    Embedding the BRM practice also includes acknowledging the BRM’s part in balancing the IT portfolio

    IT needs to juggle “keeping the lights on” initiatives with those required to add value to the organization.

    Partner with the appropriate resources (Project Management Office, Product Owners, System Owners, and/or others as appropriate within your organization) to ensure that all initiatives focus on value.

    Info-Tech Insight

    Not every organization will balance their portfolio in the same way. Some organizations have higher risk tolerance and so their higher priority goals may require that they accept more risk to potentially reap more returns.

    Stock image of a man juggling business symbols.

    80% of organizations feel their portfolios are dominated by low-value initiatives that do not deliver value to the business. (Source: Stage-Gate International and Product Development Institute, March/April 2009)

    All new requests are not the same; establish a process for intake and manage expectations and IT’s capacity to deliver value.

    Ensure you communicate your process to support new ideas with your stakeholders. They’ll be clear on the steps to bring new initiatives into IT and will understand and be engaged in the process to demonstrate value.

    Flowchart for an example intake process.

    For support creating your intake process, go to Optimize Project Intake, Approval and Prioritization Sample of Info-Tech's Optimize Project Intake, Approval and Prioritization.

    Use value as your criteria to evaluate initiatives

    Work with project managers to ensure that all projects are executed in a way that meets business expectations.

    Sample of Info-Tech’s Project Value Scorecard Development Tool.

    Download Info-Tech’s Project Value Scorecard Development Tool.

    Enter risk/compliance criteria under operational alignment: projects must be aligned with the operational goals of the business and IT.

    Business value matrix.

    Enter these criteria under strategic alignment: projects must be aligned with the strategic goals of the business, customer, and IT.
    Enter financial criteria under financial: projects must realize monetary benefits, in increased revenue or decreased costs, while posing as little risk of cost overrun as possible.
    And don’t forget about feasibility: practical considerations for projects must be taken into account in selecting projects.

    5.2 Prioritize your investments/ projects (optional activity)

    Input: Value criteria

    Output: Prioritized project listing

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Review and edit (if necessary) the criteria on tab 2 the Project Value Scorecard Development Tool.
      Screenshot from tab 2 of Info-Tech’s Project Value Scorecard Development Tool.
    2. Score initiatives and investments on tab 3 using your criteria.
      Screenshot from tab 3 of Info-Tech’s Project Value Scorecard Development Tool.
    Download Info-Tech’s Project Value Scorecard Development Tool.

    Visualize where investments add value through an initiative portfolio map

    An initiative portfolio map is a graphic visualization of strategic initiatives overlaid on a business capability map.

    Leverage the initiative portfolio map to communicate the value of what IT is working on to your stakeholders.

    Info-Tech Insight

    Projects will often impact one or more capabilities. As such, your portfolio map will help you identify cross-dependencies when scaling up or scaling down initiatives.

    Example initiative portfolio map


    Example initiative portfolio map with initiatives in categories like 'Marketing Strategy' and 'Brand Mgmt.'. Certain groups of initiatives have labels detailing when they achieve collectively.

    5.3 Create a portfolio investment map (optional activity)

    Input: Business capability map

    Output: Portfolio investment map

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Build a capability map, outlining the value streams that support your organization’s goals and the high-level capabilities (level 1) that support the value stream (and goals).
      For more support in establishing the capability map, see Document Your Business Architecture.
      Example table for outlining 'Value Streams' and 'Level 1 Capabilities' through 'Goals'.
    2. Identify high-value capabilities for the organization.
    3. What are the projects and initiatives that will address the critical capabilities? Add these under the high-value capabilities.
    4. This process will help you demonstrate how projects align to business goals. Enter your capabilities and projects in Info-Tech’s Initiative Portfolio Map Template.
    Download Info-Tech’s Initiative Portfolio Map Template.

    Establish your annual BRM plan

    To support the BRM capability at your organization, you’ll want to communicate your plan. This will include:
    • Business Feedback and Engagement
      • Engaging with your partners includes meeting with them on a regular basis. Establish this frequency and capture it in your plan. This engagement must include an understanding of their goals and challenges.
      • As Bill Gates said, “We all need people who will give us feedback. That’s how we improve” (Inc.com, 2013). There are various points in the year which will provide you with the opportunity to understand your business partners’ views of IT or the BRM role. List the opportunities to reflect on this feedback in your plan.
    • Business-IT Alignment
      • Bring together the views and perspectives of IT and the business.
      • List the activities that will be required to reflect business goals in IT. These include IT goals, budget, and planning.
    • BRM Improvement
      • The practices put in place to support the BRM practice need to continuously evolve to support a maturing organization. The feedback from stakeholders throughout the organization will provide input into this. Ensure there are activities and time put aside to evaluate the improvements required.
    Stock image of someone discovering a calendar in a jungle with a magnifying glass.

    5.4 Establish your year-in-the-life plan

    Input: Engagement plan, BRM goals

    Output: Annual BRM plan

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Start with your business planning activities – what will you as a BRM be doing as your business establishes their plans and strategies? These could include:
      • Listening and feedback sessions
      • Third-party explorations
    2. Then look at your activities required to integrate within IT – what activities are required to align business directives within your IT groups? Examples can include:
      • Business strategy review
      • Capability map creation
      • Input into the Business-aligned IT strategy
      • IT budget input
    3. What activities are required to continuously improve the BRM role? This may consist of:
      • Feedback discussions with business partners
      • Roadshow with colleagues to communicate and refine the practice
    4. Map these on your annual calendar that can be shared with your colleagues.
    Capture in the BRM Workbook

    Communicate using the Executive Buy-In and Communication Template

    Sample of a slide titled 'BRM Annual Cycle'.

    Sample BRM annual cycle

    Sample BRM annual cycle with row headers 'Business Feedback and Engagement', 'Business-IT Alignment', and 'BRM Improvement' mapped across a Q1 to Q4 timeline with individual tasks in each category.

    5.5 Build your transformation roadmap

    Input: SWOT analysis

    Output: Transformation roadmap

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. Brainstorm and discuss the key enablers that are needed to help promote and ease your BRM program.
    2. Brainstorm and discuss the key blockers (or risks) that may interrupt or derail your BRM program.
    3. Brainstorm mitigation activities for each blocker.
    4. Enablers and mitigation activities can be listed on your transformation roadmap.

    Example:

    Enablers

    • High business engagement and buy-in
    • Supportive BRM leadership
    • Organizational acceptance for change
    • Development process awareness by development teams
    • Collaborative culture
    • Existing tools can be customized for BRM

    Blockers

    • Pockets of management resistance
    • Significant time is required to implement BRM and train resources
    • Geographically distributed resources
    • Difficulty injecting customers in demos

    Mitigation

    • BRM workshop training with all teams and stakeholders to level set expectations
    • Limit the scope for pilot project to allow time to learn
    • Temporarily collocate all resources and acquire virtual communication technology

    Capture in the BRM Workbook

    5.5 Build your transformation roadmap (cont’d)

    1. Roadmap Elements:
      • List the artifacts, changes, or actions needed to implement the new BRM program.
      • For each item, identify how long it will take to implement or change by moving it into the appropriate swim lane. Use timing that makes sense for your organization: Quick Wins, Short Term, and Long Term; Now, Next, and Later; or Q1, Q2, Q3, and Q4.

    Example transformation roadmap with BRM programs arranged in columns 'Now', 'Next (3-6 months)', 'Later (6+ months)', and 'Deferred'.

    Communicate the BRM changes to set your practice up for success

    Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

    The change message should:

    • Explain why the change is needed.
    • Summarize what will stay the same.
    • Highlight what will be left behind.
    • Emphasize what is being changed.
    • Explain how change will be implemented.
    • Address how change will affect various roles in the organization.
    • Discuss the staff’s role in making the change successful.
    Five elements of communicating change
    Diagram titled 'COMMUNICATING THE CHANGE' surrounded by useful questions: 'What is the change?', 'What will the role be for each department and individual?', 'Why are we doing it?', 'How long will it take us to do it?', and 'How are we going to go about it?'.
    (Source: The Qualities of Leadership: Leading Change)

    Apply the following communication principles to make your BRM changes relevant to stakeholders

    “We tend to use a lot of jargon in our discussions, and that is a sure fire way to turn people away. We realized the message wasn’t getting out because the audience wasn’t speaking the same language. You have to take it down to the next level and help them understand where the needs are.” (Jeremy Clement, Director of Finance, College of Charleston, Info-Tech Interview, 2018)

    Be Relevant

    • Talk about what matters to the stakeholder. Think: “what’s in it for them?
    • Tailor the details of the message to each stakeholder’s specific concerns.
    • Often we think in processes but stakeholders only care about results: talk in terms of results.

    Be Clear

    • Don’t use jargon.
    • Choice of language is important: “Do you think this is a good idea? I think we could really benefit from your insights and experience here.” Or do you mean: “I think we should do this. I need you to do this to make it happen.”

    Be Concise

    • Keep communication short and to the point so key messages are not lost in the noise.
    • There is a risk of diluting your key message if you include too many other details.

    Be Consistent

    • The core message must be consistent regardless of audience, channel, or medium. A lack of consistency can be interpreted as an attempt at deception. This can hurt credibility and trust.
    • Test your communication with your team or colleagues to obtain feedback before delivering to a broader audience.

    5.6 Create a communications plan tailored to each of your stakeholders

    Input: Prioritized list of stakeholders

    Output: Communication Plan

    Materials: Whiteboard/flip charts (physical or electronic)

    Participants: Team

    1. List stakeholders in order of importance in the first column.
    2. Identify the frequency with which you will communicate to each group.
    3. Determine the scope of the communication:
      • What key information needs to be included in the message to ensure they are informed and on board?
      • Which medium(s) will you use to communicate to that specific group?
    4. Develop a concrete timeline that will be followed to ensure that support is maintained from the key stakeholders.

    Audience

    All BRM Staff

    Purpose

    • Introduce and explain operating model
    • Communicate structural changes

    Communication Type

    • Team Meeting

    Communicator

    CIO

    Timing

    • Sept 1 – Introduce new structure
    • Sept 15 – TBD
    • Sept 29 – TBD

    Related Blueprints

    Business Value
    Service Catalog
    Intake Management
    Sample of Info-Tech's 'Document Your Business Architecture' blueprint.
    Sample of Info-Tech's 'Design and Build a User-Facing Service Catalog' blueprint.
    Sample of Info-Tech's 'Manage Stakeholder Relations' blueprint.
    Sample of Info-Tech's 'Document Business Goals and Capabilities for Your IT Strategy' blueprint.
    Sample of Info-Tech's 'Fix Your IT Culture' blueprint.

    Selected Bibliography

    “Apple Mission and Vision Analysis.” Mission Statement Academy, 23 May 2019. Accessed 5 November 2020.

    Barnes, Aaron. “Business Relationship Manager and Plan Build Run.” BRM Institute, 8 April 2014.

    Barnes, Aaron. “Starting a BRM Team - Business Relationship Management Institute.” BRM Institute, 5 June 2013. Web.

    BRM Institute. “Business Partner Maturity Model.” Member Templates and Examples, Online Campus, n.d. Accessed 3 December 2021.

    BRM Institute. “BRM Assessment Templates and Examples.” Member Templates and Examples, Online Campus, n.d. Accessed 24 November 2021.

    Brusnahan, Jim, et al. “A Perfect Union: BRM and Agile Development and Delivery.” BRM Institute, 8 December 2020. Web.

    Business Relationship Management: The BRMP Guide to the BRM Body of Knowledge. Second printing ed., BRM Institute, 2014.

    Chapman, Chuck. “Building a Culture of Trust - Remote Leadership Institute.” Remote Leadership Institute, 10 August 2021. Accessed 27 January 2022.

    “Coca Cola Mission and Vision Analysis.” Mission Statement Academy, 4 August 2019. Accessed 5 November 2020.

    Colville, Alan. “Shared Vision.” UX Magazine, 31 October 2011. Web.

    Cooper, Robert, G. “Effective Gating: Make product innovation more productive by using gates with teeth.” Stage-Gate International and Product Development Institute, March/April 2009. Web.

    Heller, Martha. “How CIOs Can Make Business Relationship Management (BRM) Work.” CIO, 1 November 2016. Accessed 27 January 2022.

    “How Many Business Relationship Managers Should You Have.” BRM Institute, 20 March 2013. Web.

    Hull, Patrick. “Answer 4 Questions to Get a Great Mission Statement.” Forbes, 10 January 2013. Web.

    Kasperkevic, Jana. “Bill Gates: Good Feedback Is the Key to Improvement.” Inc.com, 17 May 2013. Web.

    Merlyn, Vaughan. “Relationships That Matter to the BRM.” BRM Institute, 19 October 2016. Web.

    “Modernizing IT’s Business Relationship Manager Role.” The Hackett Group, 22 November 2019. Web.

    Monroe, Aaron. “BRMs in a SAFe World...That Is, a Scaled Agile Framework Model.” BRM Institute, 5 January 2021. Web.

    Selected Bibliography

    “Operational, adj." OED Online, Oxford University Press, December 2021. Accessed 29 January 2022.

    Sinek, Simon. “Transcript of ‘How Great Leaders Inspire Action.’” TEDxPuget Sound, September 2009. Accessed 7 November 2020.

    “Strategic, Adj. and n.” OED Online, Oxford University Press, December 2016. Accessed 27 January 2022.

    “Tactical, Adj.” OED Online, Oxford University Press, September 2018. Accessed 27 January 2022.

    “The Qualities of Leadership: Leading Change.” Cornelius & Associates, 23 September 2013. Web.

    “Twice the Business Value in Half the Time: When Agile Methods Meet the Business Relationship Management Role.” BRM Institute, 10 April 2015. Web.

    “Value Streams.” Scaled Agile Framework, 30 June 2020. Web.

    Ward, John. “Delivering Value from Information Systems and Technology Investments: Learning from Success.” Information Systems Research Centre, August 2006. Web.

    Appendix

    • Business Value Drivers
    • Service Blueprint
    • Stakeholder Communications
    • Job Descriptions

    Understand business value drivers for ROI and cost

    Make Money

    This value driver is specifically related to the impact a product or service has on your organization’s ability to show value for the investments. This is usually linked to the value for money for an organization.

    Return on Investment can be derived from:

    • Sustaining or increasing funding.
    • Enabling data monetization.
    • Improving the revenue generation of an existing service.
    • Preventing the loss of a funding stream.

    Be aware of the difference among your products and services that enable a revenue source and those which facilitate the flow of funding.

    Save Money

    This value driver relates to the impact of a product or service on cost and budgetary constraints.

    Reduce costs value can be derived from:

    • Reducing the cost to provide an existing product or service.
    • Replacing a costly product or service with a less costly alternative.
    • Bundling and reusing products or services to reduce overhead.
    • Expanding the use of shared services to generate more value for the cost of existing investment.
    • Reducing costs through improved effectiveness and reduction of waste.

    Budgetary pressures tied to critical strategic priorities may defer or delay implementation of initiatives and revision of existing products and services.

    Understand Business Value Drivers that Enhance Your Services

    Operations

    Some products and services are in place to facilitate and support the structure of the organization. These vary depending on what is important to your organization, but should be assessed in relation to the organizational culture and structure you have identified.

    • Adds or improves effectiveness for a particular service or the process and technology enabling its success.

    Risk and Compliance

    A product or service may be required in order to meet a regulatory requirement. In these cases, you need to be aware of the organizational risk of NOT implementing or maintaining a service in relation to those risks.

    In this case, the product or service is required in order to:

    • Prevent fines.
    • Allow the organization to operate within a specific jurisdiction.
    • Remediate audit gaps.
    • Provide information required to validate compliance.

    Internal Information

    Understanding internal operations is also critical for many organizations. Data captured through your operations provides critical insights that support efficiency, productivity, and many other strategic goals.

    Internal information value can be derived by:

    • Identifying areas of improvement in the development of core offerings.
    • Monitoring and tracking employee behavior and productivity.
    • Monitoring resource levels.
    • Monitoring inventory levels.

    Collaboration and Knowledge Transfer

    Communication is integral and products and services can be the link that ties your organization together.

    In this case, the value generated from products and services can be to:

    • Align different departments and multiple locations.
    • Enable collaboration.
    • Capture trade secrets and facilitate organizational learning.

    Understand Business Value Drivers that Connect the Business to Your Customers

    Policy

    Products and services can also be assessed in relation to whether they enable and support the required policies of the organization. Policies identify and reinforce required processes, organizational culture, and core values.

    Policy value can be derived from:

    • The service or initiative will produce outcomes in line with our core organizational values.
    • It will enable or improve adherence and/or compliance to policies within the organization.

    Customer Relations

    Products and services are often designed to facilitate goals of customer relations; specifically, improve satisfaction, retention, loyalty, etc. This value type is most closely linked to brand management and how a product or service can help execute brand strategy. Customers, in this sense, can also include any stakeholders who consume core offerings.

    Customer satisfaction value can be derived from:

    • Improving the customer experience.
    • Resolving a customer issue or identified pain point.
    • Providing a competitive advantage for your customers.
    • Helping to retain customers or prevent them from leaving.

    Market Information

    Understanding demand and market trends is a core driver for all organizations. Data provided through understanding the ways, times, and reasons that consumers use your services is a key driver for growth and stability.

    Market information value can be achieved when an app:

    • Addresses strategic opportunities or threats identified through analyzing trends.
    • Prevents failures due to lack of capacity to meet demand.
    • Connects resources to external sources to enable learning and growth within the organization.

    Market Share

    Market share represents the percentage of a market or market segment that your business controls. In essence, market share can be viewed as the potential for more or new revenue sources.

    Assess the impact on market share. Does the product or service:

    • Increase your market share?
    • Open access to a new market?
    • Help you maintain your market share?

    Service Blueprint

    Service design involves an examination of the people, process and technology involved in delivering a service to your customers.

    Service blueprinting provides a visual of how these are connected together. It enables you to identify and collaborate on improvements to an existing service.

    The main components of a service blueprint are:

    Customer actions – this anchors the service in the experiences of the customer

    Front-stage – this shows the parts of the service that are visible to the customer

    Back-stage – this is the behind-the-scenes actions necessary to deliver the experience to the customer

    Support processes – this is what’s necessary to deliver the back-stage (and front-stage/customer experience), but is not aligned from a timing perspective (e.g. it doesn’t matter if the fridge is stocked when the order is put in, as long as the supplies are available for the chef to use)

    Example service blueprint with the main components listed above as row headers.

    Physical Evidence and Time are blueprint components can be added in to provide additional context & support

    Example service blueprint with the main components plus added components 'Physical Evidence' and 'Time'.

    Stakeholder Communications

    Personalize
    • “What’s in it for me” & Persona development – understanding what the concerns are from the community that you will want to communicate about
    • Get to know the cultures of each persona to identify how they communicate. For the faculty, Teams might not be the answer, but faculty meetings might be, or sending messages via email. Each persona group may have unique/different needs
    • Meet them “where they are”: Be prepared to provide 5-minute updates (with “what’s in it for me” and personas in mind) at department meetings in cases where other communications (Teams etc.) aren’t reaching the community
    • Review the business vision diagnostic report to understand what’s important to each community group and what their concerns are with IT. Definitely review the comments that users have written.
    Show Proof
    • Share success stories tailored to users needs – e.g. if they have a concern with security, and IT implemented a new secure system to better meet their needs, then telling them about the success is helpful – shows that you’re listening and have responded to meet their concerns. Demonstrates how interacting with IT has led to positive results. People can more easily relate to stories

    Reference
    • Consider establishing a repository (private/unlisted YouTube channel, Teams, etc.) so that the community can search to view the tip/trick they need
    • Short videos are great to provide a snippet of the information you want to share
    Responses
    • Engage in 2-way communications – it’s about the messages IT wants to convey AND the messages you want them to convey to you. This helps to ensure that your messages aren’t just heard but are understood/resonate.
    • Let people know how they should communicate with IT – whether it’s engaging through Teams, via email to a particular address, or through in person sessions
    Test & Learn
    • Be prepared to experiment with the content and mediums, and use analytics to assess the results. For example if videos are posted on a site like SharePoint that already has analytics functionality, you can capture the number of views to determine how much they are viewed
    Multiple Mediums
    • Use a combination of one-on-one interviews/meetings and focus groups to obtain feedback. You may want to start with some of the respondents who provided comments on surveys/diagnostics

    BRM Job Descriptions

    Download the Job Descriptions:

    Tactics to Retain IT Talent

    • Buy Link or Shortcode: {j2store}549|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
    • Many organizations focus on increasing engagement to improve retention, but this approach doesn’t address the entire problem.

    Our Advice

    Critical Insight

    • Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Impact and Result

    • Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
    • Target employee segments and work with management to develop solutions to retain top talent.

    Tactics to Retain IT Talent Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tactics to Retain IT Talent Storyboard – Use this storyboard to develop a targeted talent retention plan to retain top and core talent in the organization.

    Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.

    • Tactics to Retain IT Talent Storyboard

    2. Retention Plan Workbook – Capture key information in one place as you work through the process to assess and prioritize solutions.

    Use this tool to document and analyze turnover data to find suitable retention solutions.

    • Retention Plan Workbook

    3. Stay Interview Guide – Managers will use this guide to conduct regular stay interviews with employees to anticipate and address turnover triggers.

    The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.

    • Stay Interview Guide

    4. IT Retention Solutions Catalog – Use this catalog to select and prioritize retention solutions across the employee lifecycle.

    Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.

    • IT Retention Solutions Catalog
    [infographic]

    Workshop: Tactics to Retain IT Talent

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Reasons for Regrettable Turnover

    The Purpose

    Identify the main drivers of turnover at the organization.

    Key Benefits Achieved

    Find out what to explore during focus groups.

    Activities

    1.1 Review data to determine why employees join, stay, and leave.

    1.2 Identify common themes.

    1.3 Prepare for focus groups.

    Outputs

    List of common themes/pain points recorded in the Retention Plan Workbook.

    2 Conduct Focus Groups

    The Purpose

    Conduct focus groups to explore retention drivers.

    Key Benefits Achieved

    Explore identified themes.

    Activities

    2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.

    2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

    Outputs

    Focus group feedback.

    Focus group feedback analyzed and organized by themes.

    3 Identify Needs and Retention Initiatives

    The Purpose

    Home in on employee needs that are a priority.

    Key Benefits Achieved

    A list of initiatives to address the identified needs

    Activities

    3.1 Create an empathy map to identify needs.

    3.2 Shortlist retention initiatives.

    Outputs

    Employee needs and shortlist of initiatives to address them.

    4 Prepare to Communicate and Launch

    The Purpose

    Prepare to launch your retention initiatives.

    Key Benefits Achieved

    A clear action plan for implementing your retention initiatives.

    Activities

    4.1 Select retention initiatives.

    4.2 Determine goals and metrics.

    4.3 Plan stakeholder communication.

    4.4 Build a high-level action plan.

    Outputs

    Finalized list of retention initiatives.

    Goals and associated metrics recorded in the Retention Plan Workbook.

    Further reading

    Tactics to Retain IT Talent

    Keep talent from walking out the door by discovering and addressing moments that matter and turnover triggers.

    Executive Summary

    Your Challenge

    Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.

    Common Obstacles

    Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.

    Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.

    Info-Tech's Approach

    Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.

    Target employee segments and work with management to develop solutions to retain top talent.

    Info-Tech Insight

    Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    This research addresses regrettable turnover

    This is an image of a flow chart with three levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable: The loss of employees that the organization did not wish to keep, e.g. low performers, and Regrettable:  The loss of employees that the organization wishes it could have kept.

    Low unemployment and rising voluntary turnover makes it critical to focus on retention

    As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

    This image contains a graph of the US Employment rate between 2020 - 2022 from the US Bureau of Economic Analysis and Bureau of Labor Statistics (BLS), 2022, the percentage of individuals who change jobs every one to five years from 2022 Job Seeker Nation Study, Jobvite, 2022, and voluntary turnover rates from BLS, 2022

    With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.

    Retention is a challenge for many organizations

    The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).

    65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.

    Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.

    • 87% of HR professionals cited retention/turnover as a critical and high priority for the next few years (TINYpulse, 2020).
    • $630B The cost of voluntary turnover in the US (Work Institute, 2020).
    • 66% of organizations consider employee retention to be important or very important to an organization (PayScale, 2019).

    Improving retention leads to broad-reaching organizational benefits

    Cost savings: the price of turnover as a percentage of salary

    • 33% Improving retention can result in significant cost savings. A recent study found turnover costs, on average, to be around a third of an employee's annual salary (SHRM, 2019).
    • 37.9% of employees leave their organization within the first year. Employees who leave within the first 90 days of being hired offer very little or no return on the investment made to hire them (Work Institute, 2020).

    Improved performance

    Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).

    Prevents a ripple effect

    Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.

    Transfer of knowledge

    Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.

    Info-Tech Insight

    Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).

    However, the traditional engagement-focused approach to retention is not enough

    Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Average employee Net Promoter Score (eNPS)

    This image contains a graph of the Average employee Net Promoter Score (eNPS)

    Individual employee Net Promoter Scores (eNPS)

    This image contains a graph of the Individual employee Net Promoter Scores (eNPS)

    However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.

    This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.

    This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.

    Turnover triggers and moments that matter also have an impact on retention

    Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:

    1. Employee engagement – areas of low engagement.
    2. Turnover triggers that can quickly lead to departures.
    3. Moments that matter in the employee experience (EX).

    Employee engagement

    Engagement drivers are strong predictors of turnover.

    Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Turnover triggers

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).

    Moments that matter

    Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.

    Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).

    While managers do not directly impact turnover, they do influence the three main paths to turnover

    Research shows managers do not appear as one of the common reasons for employee turnover.

    Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).

    Turnover factorsRank
    Opportunities for career advancement1
    Satisfaction with my role and responsibilities2
    Base pay3
    Opportunities for career-related skill development4
    The degree to which my skills were used in my job5

    However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:

    Employee engagement

    Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).

    Turnover triggers

    Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.

    Moments that matter

    Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.

    Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

    Addressing engagement, turnover triggers, and moments that matter is the key to retention

    This is an image of a flow chart with four levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable, and Regrettable.  The fourth level has three boxes under Regrettable, labeled Employee Engagement, Turnover triggers, and Moments that matter

    Info-Tech Insight

    HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Follow Info-Tech's two-step process to create a retention plan

    1. Identify Reasons for Regrettable Turnover

    2. Select Solutions and Create an Action Plan

    Step 1

    Identify Reasons for Regrettable Turnover

    After completing this step you will have:

    • Analyzed and documented why employees join, stay, and leave your organization.
    • Identified common themes and employee needs.
    • Conducted employee focus groups and prioritized employee needs.

    Step 1 focuses on analyzing existing data and validating it through focus groups

    Employee engagement

    Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups.

    Engagement drivers such as compensation or working environment are strong predictors of turnover.
    Moments that matter
    Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization.
    Turnover triggers
    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers

    This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention.

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Info-Tech Insight

    IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

    Gather data to better understand why employees join, stay, and leave

    Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.

    Look for these icons throughout step 2.

    Join

    Why do candidates join your organization?

    Stay

    Why do employees stay with your organization?

    Leave

    Why do employees leave your organization?

    For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

    Employee feedback data to look at includes:

    Gather insights through:

    • Focus groups
    • Verbatim comments
    • Exit interviews
    • Using the employee value proposition (EVP) as a filter (does it resonate with the lived experience of employees?)

    Prepare to draw themes and trends from employee data throughout step 1.

    Uncover employee needs and reasons for turnover by analyzing employee feedback data.

    • Look for trends (e.g. new hires join for career opportunities and leave for the same reason, or most departments have strong work-life balance scores in engagement data).
    • Review if there are recurring issues being raised that may impact turnover.
    • Group feedback to highlight themes (e.g. lack of understanding of EVP).
    • Identify which key employee needs merit further investigation or information.

    This is an image showing how you can draw out themes and trends using employee data throughout step 1.

    Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.

    Info-Tech Insight

    The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

    Examine new hire data and begin to document emerging themes

    Join

    While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:

    Issues or pain points that occurred during the hiring process.

    Reasons why employees joined your organization.

    The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.

    Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.

    1. Start by isolating the top reasons employees joined your organization. Ask:
      • Do the reasons align with the benefits you associate with working at your organization?
      • How might this impact your EVP?
      • If you use a new hire survey, look at the results for the following questions:
      • For which of the following reasons did you apply to this organization?
      • For what reasons did you accept the job offer with this organization?
    2. then, examine other potential problem areas that may not be covered by your new hire survey, such as onboarding or the candidate experience during the hiring process.
      • If you conduct a new hire survey, look at the results in the following sections:
        • Candidate Experience
        • Acclimatization
        • Training and Development
        • Defining Performance Expectations

      Analyze engagement data to identify areas of strength that drive retention

      Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

      1. Look at the highest-performing drivers in your organization's employee engagement survey and drivers that fall into the "leverage" and "maintain" quadrants of the priority matrix.
        • These drivers provide insight into what prompts broader groups of employees to stay.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      1. Look into what efforts have been made to maintain programs, policies, and practices related to these drivers and ensure they are consistent across the entire organization.
      2. Document trends and themes related to engagement strengths in tab 2 of the Retention Plan Workbook.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Identify areas of weakness that drive turnover in your engagement data

      1. Look at the lowest-performing drivers in your organization's employee engagement survey and drivers that fall into the "improve" and "evaluate" quadrants of the priority matrix.
        • These drivers provide insight into what pushes employees to leave the organization.
      2. Delve into organizational efforts that have been made to address issues with the programs, policies, and practices related to these drivers. Are there any projects underway to improve them? What are the barriers preventing improvements?
      3. Document trends and themes related to engagement weaknesses in tab 2 of the Retention Plan Workbook.

      If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Mine exit surveys to develop an integrated, holistic understanding of why employees leave

      Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:

      • What are the trends and quantitative data about why employees leave your organization that may illuminate employee needs or issues at specific points throughout the employee lifecycle?
      • What are insights around your key segments? Data on key segments is easily sliced from exit survey results and can be used as a starting point for digging deeper into retention issues for specific groups.
      • Exit surveys are an excellent starting point. However, it is valuable to validate the data gathered from an exit survey using exit interviews.
      1. Isolate results for key segments of employees to target with retention initiatives (e.g. by age group or by department).
      2. Identify data trends or patterns over time; for example, that compensation factors have been increasing in importance.
      3. Document trends and themes taken from the exit survey results in tab 2 of the Retention Plan Workbook.

      If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.

      Compare new hire data with exit data to identify patterns and insights

      Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.

      1. Look at your new hire data for the top reasons employees joined your organization.
        • McLean & Company's New Hire Survey database shows that the top three reasons candidates accept job offers on average are:
          1. Career opportunities
          2. Nature of the job
          3. Development opportunities
      2. Next, look at your exit data and the top reasons employees left your organization.
        1. McLean & Company's Exit Survey database shows that the top three reasons employees leave on average are:
          1. Opportunities for career advancement
          2. Base pay
          3. Satisfaction with my role and responsibilities
      3. Examine the results and ask:
        • Is there a link between why employees join and leave the organization?
        • Did they cite the same reasons for joining and for leaving?
        • What do the results say about what your employees do and do not value about working at your organization?
      4. Document the resulting insights in tab 2 of the Retention Plan Workbook.

      Example:

      A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.

      Revisit your employee value proposition to uncover misalignment

      Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.

      If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.

      Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).

      1. Use the EVP as a filter through which you look at all your employee feedback data. It will help identify misalignment between the promised and the lived experience.
      2. If you have EVP documentation, start there. If not, go to your careers page and put yourself in the shoes of a candidate. Ask what the four elements of an EVP look like for candidates:
        • Compensation and benefits
        • Day-to-day job elements
        • Working conditions
        • Organizational elements
      3. Next, compare this to your own day-to-day experiences. Does it differ drastically? Are there any contradictions with the lived experience at your organization? Are there misleading statements or promises?
      4. Document any insights or patterns you uncover in tab 2 of the Retention Plan Workbook.

      Conduct focus groups to examine themes

      Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.

      Identify employee groups who will participate in focus groups:

      • Incorporate diverse perspectives (e.g. employees, managers, supervisors).
      • Include employees from departments and demographics with strong and weak engagement for a full picture of how engagement impacts your employees.
      • Invite boomerang employees to learn why an individual might return to your organization after leaving.

      image contains two screenshots Mclean & Company's Standard Focus Group Guide.

      Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.

      The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.

      Focus questions on the employees' personal experience from their perspective.

      Key things to remember:

      • It is vital for facilitators to be objective.
      • Keep an open mind; no feelings are wrong.
      • Beware of your own biases.
      • Be open and share the reason for conducting the focus groups.

      Info-Tech Insight

      Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.

      Empathize with employees to identify moments that matter

      Look for discrepancies between what employees are saying and doing.

      1. Say

      "What words or quotes did the employee use?"

      3.Think

      "What might the employee be thinking?"

      Record feelings and thoughts discussed, body language observed, tone of voice, and words used.

      Look for areas of negative emotion to determine the moments that matter that drive retention.

      2. Do

      "What actions or behavior did the employee demonstrate?"

      4. Feel

      "What might the employee be feeling?"

      Record them in tab 3 of the Retention Plan Workbook.

      5. Identify Needs

      "Needs are verbs (activities or desires), not nouns (solutions)"

      Synthesize focus group findings using Info-Tech's Empathy Map Template.

      6. Identify Insights

      "Ask yourself, why?"

      (Based on Stanford d.school Empathy Map Method)

      Distill employee needs into priority issues to address first

      Take employee needs revealed by your data and focus groups and prioritize three to five needs.

      Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.

      Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.

      Ask yourself the following questions to determine your priority employee needs:

      • Which needs will have the greatest impact on turnover?
      • Which needs have the potential to be an easy fix or quick win?
      • Which themes or trends came up repeatedly in different data sources?
      • Which needs evoked particularly strong or negative emotions in the focus groups?

      This image contains screenshots of two table templates found in tab 5 of the Retention Plan Workbook

      In the Retention Plan Workbook, distill employee needs on tab 2 into three to five priorities on tab 5.

      Step 2

      Select Solutions and Create an Action Plan

      After completing this step, you will have:

      • Selected and prioritized solutions to address employee needs.
      • Created a plan to launch stay interviews.
      • Built an action plan to implement solutions.

      Select IT-owned solutions and implement people leader–driven initiatives

      Solutions

      First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.

      • Brainstorm solutions using the Retention Solutions Catalog as a starting point. Select a longlist of solutions to address your priority needs.
      • Prioritize the longlist of solutions into a manageable number to act on.

      People leaders

      Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.

      • Clarify the importance of harnessing the influence of people leaders in improving retention.
      • Discover what might cause individual employees to leave through stay interviews.
      • Increase trust in managers through training.

      Action plan

      Finally, create an action plan and present to senior leadership for approval.

      Look for these icons in the top right of slides in this step.

      Select solutions to employee needs, starting with the Retention Solutions Catalog

      Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.

      Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

      This image contains three screenshots from Info-Tech's Retention Solutions Catalog.

      Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.

      Info-Tech Insight

      Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.

      Prioritize solutions to be implemented

      Target efforts accordingly

      Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.

      Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.

      Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.

      Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.

      When assessing the impact of potential solutions, consider:

      • How many critical segments or employees will this solution affect?
      • Is the employee need it addresses critical, or did the solution encompass several themes in the data you analyzed?
      • Will the success of this solution help build a case for further action?
      • Will the solution address multiple employee needs?

      Info-Tech Insight

      It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.

      Solutions

      Low ImpactMedium ImpactLarge Impact
      Large EffortThis is an image of the used to help you prioritize solutions to be implemented.
      Medium Effort
      Low Effort

      Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.

      Harness the influence of people leaders to improve employee retention

      Leaders at all levels have a huge impact on employees.

      Effective people leaders:

      • Manage work distribution.
      • Create a motivating work environment.
      • Provide development opportunities.
      • Ensure work is stimulating and challenging, but not overwhelming.
      • Provide clear, actionable feedback.
      • Recognize team member contributions.
      • Develop positive relationships with their teams.
      • Create a line of sight between what the employee is doing and what the organization's objectives are.

      Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.

      For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.

      For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.

      "HR can't fix turnover. But leaders on the front line can."
      – Richard P. Finnegan, CEO, C-Suite Analytics

      Equip managers to conduct regular stay interviews to address turnover triggers

      Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.

      Examples of common turnover triggers and potential manager responses:

      • Moving, creating a long commute to the office.
        • Through stay interviews, a manager can learn that a long commute is an issue and can help find workarounds such as flexible/remote work options.
      • Not receiving an expected promotion.
        • A trusted manager can anticipate issues stemming from this, discuss why the decision was made, and plan development opportunities for future openings.

      Stay interview best practices

      1. Conducted by an employee's direct manager.
      2. Happen regularly as a part of an ongoing process.
      3. Based on the stay interview, managers produce a turnover forecast for each direct report.
        1. The method used by stay interview expert Richard P. Finnegan is simple: red for high risk, yellow for medium, and green for low.
      4. Provide managers with training and a rough script or list of questions to follow.
        1. Use and customize Info-Tech's Stay Interview Guide to provide a guide for managers on how to conduct a stay interview.
      5. Managers use the results to create an individualized retention action plan made up of concrete actions the manager and employee will take.

      Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM

      Build an action plan to implement the retention plan

      For each initiative identified, map out timelines and actions that need to be taken.

      When building actions and timelines:

      • Refer to the priority needs you identified in tab 4 of the Retention Plan Workbook and ensure they are addressed first.
      • Engage internal stakeholders who will be key to the development of the initiatives to ensure they have sufficient time to complete their deliverables.
        • For example, if you conduct manager training, Learning & Development needs to be involved in the development and launch of the program.
      • Include a date to revisit your baseline retention and engagement data in your project milestones.
      • Designate process owners for new processes such as stay interviews.

      Plan for stay interviews by determining:

      • Whether stay interviews will be a requirement for all employees.
      • How much flexibility managers will have with the process.
      • How you will communicate the stay interview approach to managers.
      • If manager training is required.
      • How managers should record stay interview data and how you will collect this data from them as a way to monitor retention issues.
        • For example, managers can share their turnover forecasts and action plans for each employee.

      Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.

      Track project success to iterate and improve your solutions

      Analyze measurements

      • Regularly remeasure your engagement and retention levels to identify themes and trends that provide insights into program improvements.
      • For example, look at the difference in manager relationship score to see if training has had an impact, or look at changes in critical segment turnover to calculate cost savings.

      Revisit employee and manager feedback

      • After three to six months, conduct additional surveys or focus groups to determine the success of your initiatives and opportunities for improvement. Tweak the program, including stay interviews, based on manager and employee feedback.

      Iterate frequently

      • Revisit your initiatives every two or three years to determine if a refresh is necessary to meet changing organizational and employee needs and to update your goals and targets.

      Key insights

      Insight 1Insight 2Insight 3

      Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover.

      Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

      Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization.

      Insight 4Insight 5Insight 6

      HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

      Successful retention plans must be owned by both IT leaders and HR.

      IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews help managers anticipate potential retention issues on their teams.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Info-Tech AnalystsPre-workPost-work
      Client Data Gathering and PlanningImplementation Supported Through Analyst Calls

      1.1 Discuss participants, logistics, overview of workshop activities

      1.2 Provide support to client for below activities through calls.

      2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs.
      Client

      1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback.

      2.Gather and analyze turnover data.

      3.Identify key employee segment(s) and identify and organize participants for focus groups.

      4.Complete cost of turnover analysis.

      5.Review turnover data and prioritize list of employee segments.

      1.Obtain senior leader approval to proceed with retention plan.

      2.Finalize and implement retention solutions.

      3.Prepare managers to conduct stay interviews.

      4.Communicate next steps to stakeholders.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      ActivitiesDay 1Day 2Day 3Day 4
      Assess Current StateConduct Focus GroupsIdentify Needs and Retention InitiativesPrepare to Communicate and Launch

      1.1 Review data to determine why employees join, stay, and leave.

      1.2 Identify common themes.

      1.3 Prepare for focus groups.

      2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities..

      2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

      3.1 Create an empathy map to identify needs

      3.2 Shortlist retention initiatives

      4.1 Select retention initiatives

      4.2 Determine goals and metrics

      4.3 Plan stakeholder communication4.4 Build a high-level action plan

      Deliverables

      1.List of common themes/pain points recorded in the Retention Plan Workbook

      2.Plan for focus groups documented in the Focus Group Guide

      1.Focus group feedback

      2.Focus group feedback analyzed and organized by themes

      1.Employee needs and shortlist of initiatives to address them1.Finalized list of retention initiatives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Research Contributors and Experts

      Jeff Bonnell
      VP HR
      Info-Tech Research Group

      Phillip Kotanidis
      CHRO
      Michael Garron Hospital

      Michael McGuire
      Director, Organizational Development
      William Osler Health System

      Dr. Iris Ware
      Chief Learning Officer
      City of Detroit

      Richard P. Finnegan
      CEO
      C-Suite Analytics

      Dr. Thomas Lee
      Professor of Management
      University of Washington

      Jane Moughon
      Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies

      Lisa Kaste
      Former HR Director
      Citco

      Piyush Mathur
      Head of Workforce Analytics
      Johnson & Johnson

      Gregory P. Smith
      CEO
      Chart Your Course

      Works Cited

      "17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
      "2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
      "2020 Recruiter Nation Survey." Jobvite, 2020. Web.
      "2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
      "25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
      Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
      "Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
      Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
      "Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
      Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
      Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
      Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
      "Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
      "The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
      Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
      "What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.

      Embrace Business-Managed Applications

      • Buy Link or Shortcode: {j2store}179|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $64,999 Average $ Saved
      • member rating average days saved: 18 Average Days Saved
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • The traditional model of managing applications does not address the demands of today’s rapidly changing market and digitally minded business, putting stress on scarce IT resources. The business is fed up with slow IT responses and overbearing desktop and system controls.
      • The business wants more control over the tools they use. Software as a service (SaaS), business process management (BPM), robotic process automation (RPA), artificial intelligence (AI), and low-code development platforms are all on their radar.
      • However, your current governance and management structures do not accommodate the risks and shifts in responsibilities to business-managed applications.

      Our Advice

      Critical Insight

      • IT is a business partner, not just an operator. Effective business operations hinge on high-quality, valuable, fit-for-purpose applications. IT provides the critical insights, guidance, and assistance to ensure applications are implemented and leveraged in a way that maximizes return on investment, whether it is being managed by end users or lines of business (LOBs). This can only happen if the organization views IT as a critical asset, not just a supporting player.
      • All applications should be business owned. You have applications because LOBs need them to meet the objectives and key performance indicators defined in the business strategy. Without LOBs, there would be no need for business applications. LOBs define what the application should be and do for it to be successful, so LOBs should own them.
      • Everything boils down to trust. The business is empowered to make their own decisions on how they want to implement and use their applications and, thus, be accountable for the resulting outcomes. Guardrails, role-based access, application monitoring, and other controls can help curb some risk factors, but it should not come at the expense of business innovation and time-sensitive opportunities. IT must trust the business will make rational application decisions, and the business must trust IT to support them in good times and bad.

      Impact and Result

      • Focus on the business units that matter. BMA can provide significant value to LOBs if teams and stakeholders are encouraged and motivated to adopt organizational and operational changes.
      • Reimagine the role of IT. IT is no longer the gatekeeper that blocks application adoption. Rather, IT enables the business to adopt the tools they need to be productive and they guide the business on successful BMA practices.
      • Instill business accountability. With great power comes great responsibility. If the business wants more control of their applications, they must be willing to take ownership of the outcomes of their decisions.

      Embrace Business-Managed Applications Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should embrace business-managed applications, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Embrace Business-Managed Applications – Phases 1-3
      • Business-Managed Applications Communication Template

      1. State your objectives

      Level-set the expectations for your business-managed applications.

      • Embrace Business- Managed Applications – Phase 1: State Your Objectives

      2. Design your framework and governance

      Identify and define your application managers and owners and build a fit-for-purpose governance model.

      • Embrace Business-Managed Applications – Phase 2: Design Your Framework & Governance

      3. Build your roadmap

      Build a roadmap that illustrates the key initiatives to implement your BMA and governance models.

      • Embrace Business-Managed Applications – Phase 3: Build Your Roadmap

      [infographic]

      Workshop: Embrace Business-Managed Applications

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 State Your Objectives

      The Purpose

      Define business-managed applications in your context.

      Identify your business-managed application objectives.

      State the value opportunities with business-managed applications.

      Key Benefits Achieved

      A consensus definition and list of business-managed applications goals

      Understanding of the business value business-managed applications can deliver

      Activities

      1.1 Define business-managed applications.

      1.2 List your objectives and metrics.

      1.3 State the value opportunities.

      Outputs

      Grounded definition of a business-managed application

      Goals and objectives of your business-managed applications

      Business value opportunity with business-managed applications

      2 Design Your Framework & Governance

      The Purpose

      Develop your application management framework.

      Tailor your application delivery and ownership structure to fit business-managed applications.

      Discuss the value of an applications committee.

      Discuss technologies to enable business-managed applications.

      Key Benefits Achieved

      Fit-for-purpose and repeatable application management selection framework

      Enhanced application governance model

      Applications committee design that meets your organization’s needs

      Shortlist of solutions to enable business-managed applications

      Activities

      2.1 Develop your management framework.

      2.2 Tune your delivery and ownership accountabilities.

      2.3 Design your applications committee.

      2.4 Uncover your solution needs.

      Outputs

      Tailored application management selection framework

      Roles definitions of application owners and managers

      Applications committee design

      List of business-managed application solution features and services

      3 Build Your Roadmap

      The Purpose

      Build your roadmap to implement busines-managed applications and build the foundations of your optimized governance model.

      Key Benefits Achieved

      Implementation initiatives

      Adoption roadmap

      Activities

      3.1 Build your roadmap.

      Outputs

      Business-managed application adoption roadmap

       

      Generative AI: Market Primer

      • Buy Link or Shortcode: {j2store}349|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Much of the organization remains in the dark for understanding what Gen AI is, complicated by ambiguous branding from vendors claiming to provide Gen AI solutions.
      • Searching the market for a Gen AI platform is nearly impossible, owing to the sheer number of vendors.
      • The evaluative criteria for selecting a Gen AI platform are unclear.

      Our Advice

      Critical Insight

      • You cannot rush Gen AI selection and implementation. Organizations with (1) FTEs devoted to making Gen AI work (including developers and business intelligence analysts), (2) trustworthy and regularly updated data, and (3) AI governance are just now reaching PoC testing.
      • Gen AI is not a software category – it is an umbrella concept. Gen AI platforms will be built on different foundational models, be trained in different ways, and provide varying modalities. Do not expect Gen AI platforms to be compared against the same parameters in a vendor quadrant.
      • Bad data is the tip of the iceberg for Gen AI risks. While Gen AI success will be heavily reliant on the quality of data it is fine-tuned on, there are independent risks organizations must prepare for, from Gen AI hallucinations and output reliability to infrastructure feasibility and handling high-volume events.
      • Prepare for ongoing instability in the Gen AI market. If your organization is unsure about where to start with Gen AI, the secure route is to examine what your enterprise providers are offering. Use this as a learning platform to confidently navigate which specialized Gen AI provider will be viable for meeting your use cases.

      Impact and Result

      • Consensus on Gen AI scope and key Gen AI capabilities
      • Identification of your readiness to leverage Gen AI applications
      • Agreement on Gen AI evaluative criteria
      • Knowledge of vendor viability

      Generative AI: Market Primer Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Generative AI: Market Primer – Contextualize the marketspace and prepare for generative AI selection.

      Use Info-Tech’s best practices for setting out a selection roadmap and evaluative criteria for narrowing down vendors – both enterprise and specialized providers.

      • Generative AI: Market Primer Storyboard
      • Data Governance Policy
      • AI Governance Storyboard
      • AI Architecture Assessment and Project Planning Tool
      • AI Architecture Assessment and Project Planning Tool – Sample
      • AI Architecture Templates
      [infographic]

      Further reading

      Generative AI: Market Primer

      Cut through Gen AI buzzwords to achieve market clarity.

      Analyst Perspective

      The generative AI (Gen AI) marketspace is complex, nascent, and unstable.

      Organizations need to get clear on what Gen AI is, its infrastructural components, and the governance required for successful platform selection.

      Thomas Randall

      The urge to be fast-moving to leverage the potential benefits of Gen AI is understandable. There are plenty of opportunities for Gen AI to enrich an organization’s use cases – from commercial to R&D to entertainment. However, there are requisites an organization needs to get right before Gen AI can be effectively applied. Part of this is ensuring data and AI governance is well established and mature within the organization. The other part is contextualizing Gen AI to know what components of this market the organization needs to invest in.

      Owing to its popularity surge, OpenAI’s ChatGPT has become near synonymous with Gen AI. However, Gen AI is an umbrella concept that encompasses a variety of infrastructural architecture. Organizations need to ask themselves probing questions if they are looking to work with OpenAI: Does ChatGPT rest on the right foundational model for us? Does ChatGPT offer the right modalities to support our organization’s use cases? How much fine-tuning and prompt engineering will we need to perform? Do we require investment in on-premises infrastructure to support significant data processing and high-volume events? And do we require FTEs to enable all this infrastructure?

      Use this market primer to quickly get up to speed on the elements your organization might need to make the most of Gen AI.

      Thomas Randall

      Advisory Director, Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Much of the organization remains in the dark for understanding what Gen AI is, complicated by ambiguous branding from vendors claiming to provide Gen AI solutions.
      • Searching the market for a Gen AI platform is near impossible, owing to the sheer number of vendors.
      • The evaluative criteria for selecting a Gen AI platform is unclear.

      Common Obstacles

      • Data governance is immature within the organization. There is no source of truth or regularly updated organizational process assets.
      • AI functionality is not well understood within the organization; there is little AI governance for monitoring and controlling its use.
      • The extent of effort and resources required to make Gen AI a success remains murky.

      Info-Tech's Solution

      This market primer for Gen AI will help you:

      1. Contextualize the Gen AI market: Learn what components of Gen AI an organization should consider to make Gen AI a success.
      2. Prepare for Gen AI selection: Use Info-Tech’s best practices for setting out a selection roadmap and evaluative criteria for narrowing down vendors – both enterprise and specialized providers.

      “We are entering the era of generative AI.
      This is a unique time in our history where the benefits of AI are easily accessible and becoming pervasive with co-pilots emerging in the major business tools we use today. The disruptive capabilities that can potentially drive dramatic benefits also introduces risks that need to be planned for.”

      Bill Wong, Principal Research Director – Data and BI, Info-Tech Research Group

      Who benefits from this project?

      This research is designed for:

      • Senior IT, developers, data staff, and project managers who:
        • Have received a mandate from their executives to begin researching the Gen AI market.
        • Need to quickly get up to speed on the state of the Gen AI market, given no deep prior knowledge of the space.
        • Require an overview of the different components to Gen AI to contextualize how vendor comparisons and selections can be made.
        • Want to gain an understanding of key trends, risks, and evaluative criteria to consider in their selection process.

      This research will help you:

      • Articulate the potential business value of Gen AI to your organization.
      • Establish which high-value use cases could be enriched by Gen AI functionality.
      • Assess vendor viability for enterprise and specialized software providers in the Gen AI marketspace.
      • Collect information on the prerequisites for implementing Gen AI functionality.
      • Develop relevant evaluative criteria to assist differentiating between shortlisted contenders.

      This research will also assist:

      • Executives, business analysts, and procurement teams who are stakeholders in:
        • Contextualizing the landscape for learning opportunities.
        • Gathering and documenting requirements.
        • Building deliverables for software selection projects.
        • Managing vendors, especially managing the relationships with incumbent enterprise software providers.

      This research will help you:

      • Identify examples of how Gen AI applications could be leveraged for your organization’s core use cases.
      • Verify the extent of Gen AI functionality an incumbent enterprise provider has.
      • Validate accuracy of Gen AI language and architecture referenced in project deliverables.

      Insight Summary

      You cannot speedrun Gen AI selection and implementation.

      Organizations with (1) FTEs devoted to making Gen AI work (including developers and business intelligence analysts), (2) trustworthy and regularly updated data, and (3) AI governance are just now reaching PoC testing.

      Gen AI is not a software category – it is an umbrella concept.

      Gen AI platforms will be built on different foundational models, be trained in different ways, and provide varying modalities. Do not expect to compare Gen AI platforms to the same parameters in a vendor quadrant.

      Bad data is the tip of the iceberg for Gen AI risks.

      While Gen AI success will be heavily reliant on the quality of data it is fine-tuned on, there are independent risks organizations must prepare for: from Gen AI hallucinations and output reliability to infrastructure feasibility to handle high-volume events.

      Gen AI use may require changes to sales incentives.

      If you plan to use Gen AI in a commercial setting, review your sales team’s KPIs. They are rewarded for sales velocity; if they are the human-in-the-loop to check for hallucinations, you must change incentives to ensure quality management.

      Prepare for ongoing instability in the Gen AI market.

      If your organization is unsure about where to start with Gen AI, the secure route is to examine what your enterprise providers are offering. Use this as a learning platform to confidently navigate which specialized Gen AI provider will be viable for meeting your use cases.

      Brace for a potential return of on-premises infrastructure to power Gen AI.

      The market trend has been for organizations to move to cloud-based products. Yet, for Gen AI, effective data processing and fine-tuning may call for organizations to invest in on-premises infrastructure (such as more GPUs) to enable their Gen AI to function effectively.

      Info-Tech’s methodology for understanding the Gen AI marketspace

      Phase Steps

      1. Contextualize the Gen AI marketplace

      1. Define Gen AI and its components.
      2. Explore Gen AI trends.
      3. Begin deriving Gen AI initiatives that align with business capabilities.

      2. Prepare for and understand Gen AI platform offerings

      1. Review Gen AI selection best practices and requisites for effective procurement.
      2. Determine evaluative criteria for Gen AI solutions.
      3. Explore Gen AI offerings with enterprise and specialized providers.
      Phase Outcomes
      1. Achieve consensus on Gen AI scope and key Gen AI capabilities.
      2. Identify your readiness to leverage Gen AI applications.
      3. Hand off to Build Your Generative AI Roadmap to complete pre-requisites for selection.
      1. Determine whether deeper data and AI governance is required; if so, hand off to Create an Architecture for AI.
      2. Gain consensus on Gen AI evaluative criteria.
      3. Understand vendor viability.

      Guided Implementation

      Phase 1

      Phase 2

      • Call #1: Discover if Gen AI is right for your organization. Understand what a Gen AI platform is and discover the art of the possible.
      • Call #2: To take advantage of Gen AI, perform a business capabilities analysis to begin deriving Gen AI initiatives.
      • Call #3: Explore whether Gen AI initiatives can be achieved either with incumbent enterprise players or via procurement of specialized solutions.
      • Call #4: Evaluate vendors and perform final due diligence.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      The Gen AI market evaluation process should be broken into segments:

      1. Gen AI market education with this primer
      2. Structured approach to selection
      3. Evaluation and final due diligence

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful"

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Software selection engagement

      Five advisory calls over a five-week period to accelerate your selection process

      • Receive expert analyst guidance over five weeks (on average) to select and negotiate software.
      • Save money, align stakeholders, speed up the process, and make better decisions.
      • Use a repeatable, formal methodology to improve your application selection process.
      • Get better, faster results guaranteed, included in membership.
      Software selection process timeline. Week 1: Awareness - 1 hour call, Week 2: Education & Discovery - 1 hour call, Week 3: Evaluation - 1 hour call, Week 4: Selection - 1 hour call, Week 5: Negotiation & Configuration - 1 hour call.

      Click here to book your selection engagement.

      Software selection workshops

      40 hours of advisory assistance delivered online.

      Select better software, faster.

      • 40 hours of expert analyst guidance
      • Project and stakeholder management assistance
      • Save money, align stakeholders, speed up the process, and make better decisions
      • Better, faster results guaranteed; 25K standard engagement fee
      Software selection process timeline. Week 1: Awareness - 5 hours of Assistance, Week 2: Education & Discovery - 10 hours of assistance, Week 3: Evaluation - 10 hours of assistance, Week 4: Selection - 10 hours of assistance, Week 5: Negotiation & Configuration - 10 hours of assistance.

      Click here to book your workshop engagement.

      Why learn from Tymans Group?

      The TY classes contain in-depth learning material based on over 30 years of experience in IT Operations and Resilience.

      You receive the techniques, tips, tricks, and "professional secrets" you need to succeed in your resilience journey.

      Why would I share "secrets?"

      Because over time, you will find that "secrets" are just manifested experiences.

      What do I mean by that? Gordon Ramsay, who was born in 1966 like me, decided to focus on his culinary education at age 19. According to his Wikipedia page, that was a complete accident. (His Wikipedia page is a hoot to read, by the way.) And he has nothing to prove anymore. His experience in his field speaks for itself.

      I kept studying in my original direction for just one year longer, but by 21, I founded my first company in Belgium in 1987, in the publishing industry. This was extended by IT experiences in various sectors, like international publishing and hospitality, culminating in IT for high-velocity international financial markets and insurance.

      See, "secrets" are a great way to get you to sign up for some "guru" program that will "tell all!" Don't fall for it, especially if the person is too young to have significant experience.

      There are no "secrets." There is only experience and 'wisdom." And that last one only comes with age.

      If I were in my 20s, 30s, or 40s, there is no chance I would share my core experiences with anyone who could become my competitor. At that moment, I'm building my own credibility and my own career. I like helping people, but not to the extent that it will hurt my prospects. 

      And that is my second lesson: be always honest about your intentions. Yes, always. 

      At the current point in my career, "hurting my prospects" is less important. Yes, I still need to make a living, and in another post, I will explain more about that. Here, I feel it is important to share my knowledge and experience with the next people who will take my place in the day-to-day operations of medium and large corporations. And that is worth something. Hence, "sharing my secrets."

      Gert

      Why learn about resilience from us?

      This is a great opportunity to learn from my 30+ years of resilience experience. TY's Gert experienced 9/11 in New York, and he was part of the Lehman Disaster Recovery team that brought the company back within one (one!) week of the terrorist attack.

      He also went through the London Bombings of 2005 and the 2008 financial crisis, which required fast incident responses, the Covid 2020 issues, and all that entailed. Not to mention that Gert was part of the Tokyo office disaster response team as early as 1998, ensuring that Salomon was protected from earthquakes and floods in Japan.

      Gert was part of the solution (for his clients) to several further global events, like the admittedly technical log4J event in 2021, the 2024 Crowdstrike event, and many other local IT incidents, to ensure that clients could continue using the services they needed at that time.

      Beyond the large corporate world, we helped several small local businesses improve their IT resilience with better cloud storage and security solutions. 

      These solutions and ways of thinking work for any business, large or small.

      The TY team

      Explore our resilience solutions.

      Business Continuity

      • Buy Link or Shortcode: {j2store}36|cart{/j2store}
      • Related Products: {j2store}36|crosssells{/j2store}
      • member rating overall impact: 9.2/10
      • member rating average dollars saved: $30,547
      • member rating average days saved: 37
      • Parent Category Name: Security and Risk
      • Parent Category Link: /security-and-risk

      The challenge

      • Recent crises have put business continuity firmly on the radar with executives. The pressures mount to have a proper BCP in place.

      • You may be required to show regulators and oversight bodies proof of having your business continuity processes under control.
      • Your customers want to know that you can continue to function under adverse circumstances and may require proof of your business continuity practices and plans.
      • While your company may put the BCM function in facility management or within the business, it typically falls upon IT leaders to join the core team to set up the business continuity plans.

      Our advice

      Insight

      • Business continuity plans require the cooperation and input from all departments with often conflicting objectives.
      • For most medium-sized companies, BCP activities do not require a full-time position. 
      • While the set up of a BCP is an epic or project, embed the maintenance and exercises in its regular activities.
      • As an IT leader in your company, you have the skillset and organizational overview to lead a BCP set up. It is the business that must own the plans. They know their processes and know where to prioritize.
      • The traditional approach to creating a BCP is a considerable undertaking. Most companies will hire one or more consultants to guide them. If you want to do this in-house, then carve up the work into discrete tasks to make it more manageable. Our blueprint explains to you how to do that.

      Impact and results 

      • You have a structured and straightforward process that you can apply to one business unit or department at a time.
      • Start with a pilot, and use the results to fine-tune your approach, fill the gaps while at the same time slowly reducing your business continuity exposure. Repeat the process for each department or team.
      • Enable the business to own the plans. Develop templates that they can use.
      • Leverage the BCP project's outcome and refine your disaster recovery plans to ensure alignment with the overall BCP.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started

      Our concise executive brief shows you why you should develop a sound business continuity practice in your company. We'll show you our methodology and the ways we can help you in completing this.

      Identify your current maturity and document process dependencies.

      Choose a medium-sized department and build a team. Identify that department's processes, dependencies, and alternatives.

      • BCP Maturity Scorecard (xls)
      • BCP Pilot Project Charter Template (doc)
      • BCP Business Process Workflows Example (Visio)
      • BCP Business Process Workflows Example (PDF)

      Conduct a business impact analysis to determine what needs to recover first and how much (if any) data you can afford to lose in a disaster.

      Define an objective impact scoring scale for your company. Have the business estimate the impact of downtime and set your recovery targets.

      • BCP Business Impact Analysis Tool (xls)

      Document the recovery workflow entirely.

      The need for clarity is critical. In times when you need the plans, people will be under much higher stress. Build the workflow for the steps necessary to rebuild. Identify gaps and brainstorm on how to close them. Prioritize solutions that mitigate the remaining risks.

      • BCP Tabletop Planning Template (Visio)
      • BCP Tabletop Planning Template (PDF)
      • BCP Project Roadmap Tool
      • BCP Relocation Checklists

      Report the results of the pilot BCP and implement governance.

      Present the results of the pilot and propose the next steps. Assign BCM teams or people within each department. Update and maintain the overall BCMS documentation.

      • BCP Pilot Results Presentation (ppt)
      • BCP Summary (doc)
      • Business Continuity Teams and Roles Tool (xls)

      Additional business continuity tools and templates

      These can help with the creation of your BCP.

      • BCP Recovery Workflow Example (Visio)
      • BCP Recovery Workflow Example (PDF)
      • BCP Notification, Assessment, and Disaster Declaration Plan (doc)
      • BCP Business Process Workarounds and Recovery Checklists (doc)
      • Business Continuity Management Policy (doc)
      • Business Unit BCP Prioritization Tool (xls)
      • Industry-Specific BIA Guidelines (zip)
      • BCP-DRP Maintenance Checklist (xls)
      • Develop a COVID-19 Pandemic Response Plan Storyboard (ppt)

       

      Recruit and Retain People of Color in IT

      • Buy Link or Shortcode: {j2store}546|cart{/j2store}
      • member rating overall impact: 9.7/10 Overall Impact
      • member rating average dollars saved: $19,184 Average $ Saved
      • member rating average days saved: 21 Average Days Saved
      • Parent Category Name: Engage
      • Parent Category Link: /engage
      • Organizations have been trying to promote equality for many years. Diversity and inclusion strategies and a myriad of programs have been implemented in companies across the world. Despite the attempts, many organizations still struggle to ensure that their workforce is representative of the populations they support or want to support.
      • IT brings another twist. Many IT companies and departments are based on the culture of white males, and underrepresented ethnic communities find it more of a challenge to fit in.
      • This sometimes means that talented minorities are less incentivized to join or stay in technology.

      Our Advice

      Critical Insight

      • Diversity and inclusion cannot be a one-time campaign or a one-off initiative.
      • For real change to happen, every leader needs to internalize the value of creating and retaining diverse teams.

      Impact and Result

      • To stay competitive, IT leaders need to be more involved and commit to a plan to recruit and retain people of color in their departments and organizations. A diverse team is an answer to innovation that can differentiate your company.
      • Treat recruiting and retaining a diverse team as a business challenge that requires full engagement. Info-Tech offers a targeted solution that will help IT leaders build a plan to attract, recruit, engage, and retain people of color.

      Recruit and Retain People of Color in IT Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should recruit and retain people of color in your IT department or organization, review Info-Tech’s methodology, and understand the ways we can support you in this endeavor.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Recruit people of color in IT

      Diverse teams are necessary to foster creativity and guide business strategies. Overcome limitations by recruiting people of color and creating a diverse workforce.

      • Recruit and Retain People of Color in IT – Phase 1: Recruit People of Color in IT
      • Support Plan
      • IT Behavioral Interview Question Library

      2. Retain people of color in IT

      Underrepresented employees benefit from an expansive culture. Create an inclusive environment and retain people of color and promote value within your organization.

      • Recruit and Retain People of Color in IT – Phase 2: Retain People of Color in IT

      Infographic

      Workshop: Recruit and Retain People of Color in IT

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Setting the Stage

      The Purpose

      Introduce challenges and concerns around recruiting and retaining people of color.

      Key Benefits Achieved

      Gain a sense of direction.

      Activities

      1.1 Introduction to diversity conversations.

      1.2 Assess areas to focus on and determine what is right, wrong, missing, and confusing.

      1.3 Obtain feedback from your team about the benefits of working at your organization.

      1.4 Establish your employee value proposition (EVP).

      1.5 Discuss and establish your recruitment goals.

      Outputs

      Current State Analysis

      Right, Wrong, Missing, Confusing Quadrant

      Draft EVP

      Recruitment Goals

      2 Refine Your Recruitment Process

      The Purpose

      Identify areas in your current recruitment process that are preventing you from hiring people of color.

      Establish a plan to make improvements.

      Key Benefits Achieved

      Optimized recruitment process

      Activities

      2.1 Brainstorm and research community partners.

      2.2 Review current job descriptions and equity statement.

      2.3 Update job description template and equity statement.

      2.4 Set team structure for interview and assessment.

      2.5 Identify decision-making structure.

      Outputs

      List of community partners

      Updated job description template

      Updated equity statement

      Interview and assessment structure

      Behavioral Question Library

      3 Culture and Management

      The Purpose

      Create a plan for an inclusive culture where your managers are supported.

      Key Benefits Achieved

      Awareness of how to better support employees of color.

      Activities

      3.1 Discuss engagement and belonging.

      3.2 Augment your onboarding materials.

      3.3 Create an inclusive culture plan.

      3.4 Determine how to support your management team.

      Outputs

      List of onboarding content

      Inclusive culture plan

      Management support plan

      4 Close the Loop

      The Purpose

      Establish mechanisms to gain feedback from your employees and act on them.

      Key Benefits Achieved

      Finalize the plan to create your diverse and inclusive workforce.

      Activities

      4.1 Ask and listen: determine what to ask your employees.

      4.2 Create your roadmap.

      4.3 Wrap-up and next steps.

      Outputs

      List of survey questions

      Roadmap

      Completed support plan

      Build a Security Compliance Program

      • Buy Link or Shortcode: {j2store}257|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $23,879 Average $ Saved
      • member rating average days saved: 15 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Most organizations spend between 25 and 40 percent of their security budget on compliance-related activities.
      • Despite this growing investment in compliance, only 28% of organizations believe that government regulations help them improve cybersecurity.
      • The cost of complying with cybersecurity and data protection requirements has risen to the point where 58% of companies see compliance costs as barriers to entering new markets.
      • However, recent reports suggest that while the costs of complying are higher, the costs of non-compliance are almost three times greater.

      Our Advice

      Critical Insight

      • Test once, attest many. Having a control framework allows you to satisfy multiple compliance requirements by testing a single control.
      • Choose your own conformance adventure. Conformance levels allow your organization to make informed business decisions on how compliance resources will be allocated.
      • Put the horse before the cart. Take charge of your audit costs by preparing test scripts and evidence repositories in advance.

      Impact and Result

      • Reduce complexity within the control environment by using a single framework to align multiple compliance regimes.
      • Provide senior management with a structured framework for making business decisions on allocating costs and efforts related to cybersecurity and data protection compliance obligations.
      • Reduces costs and efforts related to managing IT audits through planning and preparation.
      • This blueprint can help you comply with NIST, ISO, CMMC, SOC2, PCI, CIS, and other cybersecurity and data protection requirements.

      Build a Security Compliance Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should manage your security compliance obligations, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Infographic

      Workshop: Build a Security Compliance Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the Program

      The Purpose

      Establish the security compliance management program.

      Key Benefits Achieved

      Reviewing and adopting an information security control framework.

      Understanding and establishing roles and responsibilities for security compliance management.

      Identifying and scoping operational environments for applicable compliance obligations.

      Activities

      1.1 Review the business context.

      1.2 Review the Info-Tech security control framework.

      1.3 Establish roles and responsibilities.

      1.4 Define operational environments.

      Outputs

      RACI matrix

      Environments list and definitions

      2 Identify Obligations

      The Purpose

      Identify security and data protection compliance obligations.

      Key Benefits Achieved

      Identifying the security compliance obligations that apply to your organization.

      Documenting obligations and obtaining direction from management on conformance levels.

      Mapping compliance obligation requirements into your control framework.

      Activities

      2.1 Identify relevant security and data protection compliance obligations.

      2.2 Develop conformance level recommendations.

      2.3 Map compliance obligations into control framework.

      2.4 Develop process for operationalizing identification activities.

      Outputs

      List of compliance obligations

      Completed Conformance Level Approval forms

      (Optional) Mapped compliance obligation

      (Optional) Identification process diagram

      3 Implement Compliance Strategy

      The Purpose

      Understand how to build a compliance strategy.

      Key Benefits Achieved

      Updating security policies and other control design documents to reflect required controls.

      Aligning your compliance obligations with your information security strategy.

      Activities

      3.1 Review state of information security policies.

      3.2 Recommend updates to policies to address control requirements.

      3.3 Review information security strategy.

      3.4 Identify alignment points between compliance obligations and information security strategy.

      3.5 Develop compliance exception process and forms.

      Outputs

      Recommendations and plan for updates to information security policies

      Compliance exception forms

      4 Track and Report

      The Purpose

      Track the status of your compliance program.

      Key Benefits Achieved

      Tracking the status of your compliance obligations.

      Managing exceptions to compliance requirements.

      Reporting on the compliance management program to senior stakeholders.

      Activities

      4.1 Define process and forms for self-attestation.

      4.2 Develop audit test scripts for selected controls.

      4.3 Review process and entity control types.

      4.4 Develop self-assessment process.

      4.5 Integrate compliance management with risk register.

      4.6 Develop metrics and reporting process.

      Outputs

      Self-attestation forms

      Completed test scripts for selected controls

      Self-assessment process

      Reporting process

      Recommended metrics

      Design a Coordinated Vulnerability Disclosure Program

      • Buy Link or Shortcode: {j2store}322|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $10,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Businesses prioritize speed to market over secure coding and testing practices in the development lifecycle. As a result, vulnerabilities exist naturally in software.
      • To improve overall system security, organizations are leveraging external security researchers to identify and remedy vulnerabilities, so as to mitigate the overall security risk.
      • A primary challenge to developing a coordinated vulnerability disclosure (CVD) program is designing repeatable procedures and scoping the program to the organization’s technical capacity.

      Our Advice

      Critical Insight

      • Having a coordinated vulnerability disclosure program is likely to be tomorrow’s law. With pressures from federal government agencies and recommendations from best-practice frameworks, it is likely that a CVD will be mandated in the future to encourage organizations to be equipped and prepared to respond to externally disclosed vulnerabilities.
      • CVD programs such as bug bounty and vulnerability disclosure programs (VDPs) may reward differently, but they have the same underlying goals. As a result, you don't need dramatically different process documentation.

      Impact and Result

      • Design a coordinated vulnerability disclosure program that reflects business, customer, and regulatory obligations.
      • Develop a program that aligns your resources with the scale of the coordinated vulnerability disclosure program.
      • Follow Info-Tech’s vulnerability disclosure methodology by leveraging our policy, procedure, and workflow templates to get you started.

      Design a Coordinated Vulnerability Disclosure Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should design a coordinated vulnerability disclosure program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess goals

      Define the business, customer, and compliance alignment for the coordinated vulnerability disclosure program.

      • Design a Coordinated Vulnerability Disclosure Program – Phase 1: Assess Goals
      • Information Security Requirements Gathering Tool

      2. Formalize the program

      Equip your organization for coordinated vulnerability disclosure with formal documentation of policies and processes.

      • Design a Coordinated Vulnerability Disclosure Program – Phase 2: Formalize the Program
      • Coordinated Vulnerability Disclosure Policy
      • Coordinated Vulnerability Disclosure Plan
      • Coordinated Vulnerability Disclosure Workflow (Visio)
      • Coordinated Vulnerability Disclosure Workflow (PDF)
      [infographic]

      Develop an Availability and Capacity Management Plan

      • Buy Link or Shortcode: {j2store}500|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: $2,840 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Availability & Capacity Management
      • Parent Category Link: /availability-and-capacity-management
      • It is crucial for capacity managers to provide capacity in advance of need to maximize availability.
      • In an effort to ensure maximum uptime, organizations are overprovisioning (an average of 59% for compute, and 48% for storage). With budget pressure mounting (especially on the capital side), the cost of this approach can’t be ignored.
      • Half of organizations have experienced capacity-related downtime, and almost 60% wait more than three months for additional capacity.

      Our Advice

      Critical Insight

      • All too often capacity management is left as an afterthought. The best capacity managers bake capacity management into their organization’s business processes, becoming drivers of value.
      • Communication is key. Build bridges between your organization’s silos, and involve business stakeholders in a dialog about capacity requirements.

      Impact and Result

      • Map business metrics to infrastructure component usage, and use your organization’s own data to forecast demand.
      • Project future needs in line with your hardware lifecycle. Never suffer availability issues as a result of a lack of capacity again.
      • Establish infrastructure as a driver of business value, not a “black hole” cost center.

      Develop an Availability and Capacity Management Plan Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a capacity management plan, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Develop an Availability and Capacity Management Plan – Phases 1-4

      1. Conduct a business impact analysis

      Determine the most critical business services to ensure availability.

      • Develop an Availability and Capacity Management Plan – Phase 1: Conduct a Business Impact Analysis
      • Business Impact Analysis Tool

      2. Establish visibility into core systems

      Craft a monitoring strategy to gather usage data.

      • Develop an Availability and Capacity Management Plan – Phase 2: Establish Visibility into Core Systems
      • Capacity Snapshot Tool

      3. Solicit and incorporate business needs

      Integrate business stakeholders into the capacity management process.

      • Develop an Availability and Capacity Management Plan – Phase 3: Solicit and Incorporate Business Needs
      • Capacity Plan Template

      4. Identify and mitigate risks

      Identify and mitigate risks to your capacity and availability.

      • Develop an Availability and Capacity Management Plan – Phase 4: Identify and Mitigate Risks

      [infographic]

      Workshop: Develop an Availability and Capacity Management Plan

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Conduct a Business Impact Analysis

      The Purpose

      Determine the most important IT services for the business.

      Key Benefits Achieved

      Understand which services to prioritize for ensuring availability.

      Activities

      1.1 Create a scale to measure different levels of impact.

      1.2 Evaluate each service by its potential impact.

      1.3 Assign a criticality rating based on the costs of downtime.

      Outputs

      RTOs/RPOs

      List of gold systems

      Criticality matrix

      2 Establish Visibility Into Core Systems

      The Purpose

      Monitor and measure usage metrics of key systems.

      Key Benefits Achieved

      Capture and correlate data on business activity with infrastructure capacity usage.

      Activities

      2.1 Define your monitoring strategy.

      2.2 Implement your monitoring tool/aggregator.

      Outputs

      RACI chart

      Capacity/availability monitoring strategy

      3 Develop a Plan to Project Future Needs

      The Purpose

      Determine how to project future capacity usage needs for your organization.

      Key Benefits Achieved

      Data-based, systematic projection of future capacity usage needs.

      Activities

      3.1 Analyze historical usage trends.

      3.2 Interface with the business to determine needs.

      3.3 Develop a plan to combine these two sources of truth.

      Outputs

      Plan for soliciting future needs

      Future needs

      4 Identify and Mitigate Risks

      The Purpose

      Identify potential risks to capacity and availability.

      Develop strategies to ameliorate potential risks.

      Key Benefits Achieved

      Proactive approach to capacity that addresses potential risks before they impact availability.

      Activities

      4.1 Identify capacity and availability risks.

      4.2 Determine strategies to address risks.

      4.3 Populate and review completed capacity plan.

      Outputs

      List of risks

      List of strategies to address risks

      Completed capacity plan

      Further reading

      Develop an Availability and Capacity Management Plan

      Manage capacity to increase uptime and reduce costs.

      ANALYST PERSPECTIVE

      The cloud changes the capacity manager’s job, but it doesn’t eliminate it.

      "Nobody doubts the cloud’s transformative power. But will its ascent render “capacity manager” an archaic term to be carved into the walls of datacenters everywhere for future archaeologists to puzzle over? No. While it is true that the cloud has fundamentally changed how capacity managers do their jobs , the process is more important than ever. Managing capacity – and, by extent, availability – means minimizing costs while maximizing uptime. The cloud era is the era of unlimited capacity – and of infinite potential costs. If you put the infinity symbol on a purchase order… well, it’s probably not a good idea. Manage demand. Manage your capacity. Manage your availability. And, most importantly, keep your stakeholders happy. You won’t regret it."

      Jeremy Roberts,

      Consulting Analyst, Infrastructure Practice

      Info-Tech Research Group

      Availability and capacity management transcend IT

      This Research Is Designed For:

      ✓ CIOs who want to increase uptime and reduce costs

      ✓ Infrastructure managers who want to deliver increased value to the business

      ✓ Enterprise architects who want to ensure stability of core IT services

      ✓ Dedicated capacity managers

      This Research Will Help You:

      ✓ Develop a list of core services

      ✓ Establish visibility into your system

      ✓ Solicit business needs

      ✓ Project future demand

      ✓ Set SLAs

      ✓ Increase uptime

      ✓ Optimize spend

      This Research Will Also Assist:

      ✓ Project managers

      ✓ Service desk staff

      This Research Will Help Them:

      ✓ Plan IT projects

      ✓ Better manage availability incidents caused by lack of capacity

      Executive summary

      Situation

      • IT infrastructure leaders are responsible for ensuring that the business has access to the technology needed to keep the organization humming along. This requires managing capacity and availability.
      • Dependencies go undocumented. Services are provided on an ad hoc basis, and capacity/availability are managed reactively.

      Complication

      • Organizations are overprovisioning an average of 59% for compute, and 48% for storage. This is expensive. With budget pressure mounting, the cost of this approach can’t be ignored.
      • Lead time to respond to demand is long. Half of organizations have experienced capacity-related downtime, and almost 60% wait 3+ months for additional capacity. (451 Research, 3)

      Resolution

      • Conduct a business impact analysis to determine which of your services are most critical, and require active capacity management that will reap more in benefits than it produces in costs.
      • Establish visibility into your system. You can’t track what you can’t see, and you can’t see when you don’t have proper monitoring tools in place.
      • Develop an understanding of business needs. Use a combination of historical trend analyses and consultation with line of business and project managers to separate wants from needs. Overprovisioning used to be necessary, but is no longer required.
      • Project future needs in line with your hardware lifecycle. Never suffer availability issues as a result of a lack of capacity again.

      Info-Tech Insight

      1. Components are critical. The business doesn’t care about components. You, however, are not so lucky…
      2. Ask what the business is working on, not what they need. If you ask them what they need, they’ll tell you – and it won’t be cheap. Find out what they’re going to do, and use your expertise to service those needs.
      3. Cloud shmoud. The role of the capacity manager is changing with the cloud, but capacity management is as important as ever.

      Save money and drive efficiency with an effective availability and capacity management plan

      Overprovisioning happens because of the old style of infrastructure provisioning (hardware refresh cycles) and because capacity managers don’t know how much they need (either as a result of inaccurate or nonexistent information).

      According to 451 Research, 59% of enterprises have had to wait 3+ months for new capacity. It is little wonder, then, that so many opt to overprovision. Capacity management is about ensuring that IT services are available, and with lead times like that, overprovisioning can be more attractive than the alternative. Fortunately there is hope. An effective availability and capacity management plan can help you:

      • Identify your gold systems
      • Establish visibility into them
      • Project your future capacity needs

      Balancing overprovisioning and spending is the capacity manager’s struggle.

      Availability and capacity management go together like boots and feet

      Availability and capacity are not the same, but they are related and can be effectively managed together as part of a single process.

      If an IT department is unable to meet demand due to insufficient capacity, users will experience downtime or a degradation in service. To be clear, capacity is not the only factor in availability – reliability, serviceability, etc. are significant as well. But no organization can effectively manage availability without paying sufficient attention to capacity.

      "Availability Management is concerned with the design, implementation, measurement and management of IT services to ensure that the stated business requirements for availability are consistently met."

      – OGC, Best Practice for Service Delivery, 12

      "Capacity management aims to balance supply and demand [of IT storage and computing services] cost-effectively…"

      – OGC, Business Perspective, 90

      Integrate the three levels of capacity management

      Successful capacity management involves a holistic approach that incorporates all three levels.

      Business The highest level of capacity management, business capacity management, involves predicting changes in the business’ needs and developing requirements in order to make it possible for IT to adapt to those needs. Influx of new clients from a failed competitor.
      Service Service capacity management focuses on ensuring that IT services are monitored to determine if they are meeting pre-determined SLAs. The data gathered here can be used for incident and problem management. Increased website traffic.
      Component Component capacity management involves tracking the functionality of specific components (servers, hard drives, etc.), and effectively tracking their utilization and performance, and making predictions about future concerns. Insufficient web server compute.

      The C-suite cares about business capacity as part of the organization’s strategic planning. Service leads care about their assigned services. IT infrastructure is concerned with components, but not for their own sake. Components mean services that are ultimately designed to facilitate business.

      A healthcare organization practiced poor capacity management and suffered availability issues as a result

      CASE STUDY

      Industry: Healthcare

      Source: Interview

      New functionalities require new infrastructure

      There was a project to implement an elastic search feature. This had to correlate all the organization’s member data from an Oracle data source and their own data warehouse, and pool them all into an elastic search index so that it could be used by the provider portal search function. In estimating the amount of space needed, the infrastructure team assumed that all the data would be shared in a single place. They didn’t account for the architecture of elastic search in which indexes are shared across multiple nodes and shards are often split up separately.

      Beware underestimating demand and hardware sourcing lead times

      As a result, they vastly underestimated the amount of space that was needed and ended up short by a terabyte. The infrastructure team frantically sourced more hardware, but the rush hardware order arrived physically damaged and had to be returned to the vendor.

      Sufficient budget won’t ensure success without capacity planning

      The project’s budget had been more than sufficient to pay for the extra necessary capacity, but because a lack of understanding of the infrastructure impact resulted in improper forecasting, the project ended up stuck in a standstill.

      Manage availability and keep your stakeholders happy

      If you run out of capacity, you will inevitably encounter availability issues like downtime and performance degradation . End users do not like downtime, and neither do their managers.

      There are three variables that are monitored, measured, and analyzed as part of availability management more generally (Valentic).

        1. Uptime:

      The availability of a system is the percentage of time the system is “up,” (and not degraded) which can be calculated using the following formula: uptime/(uptime + downtime) x 100%. The more components there are in a system, the lower the availability, as a rule.

        1. Reliability:

      The length of time a component/service can go before there is an outage that brings it down, typically measured in hours.

        1. Maintainability:

      The amount of time it takes for a component/service to be restored in the event of an outage, also typically measured in hours.

      Enter the cloud: changes in the capacity manager role

      There can be no doubt – the rise of the public cloud has fundamentally changed the nature of capacity management.

      Features of the public cloudImplications for capacity management
      Instant, or near-instant, instantiation Lead times drop; capacity management is less about ensuring equipment arrives on time.
      Pay-as-you go services Capacity no longer needs to be purchased in bulk. Pay only for what you use and shut down instances that are no longer necessary.
      Essentially unlimited scalability Potential capacity is infinite, but so are potential costs.
      Offsite hosting Redundancy, but at the price of the increasing importance of your internet connection.

      Vendors will sell you the cloud as a solution to your capacity/availability problems

      The image contains two graphs. The first graph on the left is titled: Reactive Management, and shows the struggling relationship between capacity and demand. The second graph on the right is titled: Cloud future (ideal), which demonstrates a manageable relationship between capacity and demand over time.

      Traditionally, increases in capacity have come in bursts as a reaction to availability issues. This model inevitably results in overprovisioning, driving up costs. Access to the cloud changes the equation. On-demand capacity means that, ideally, nobody should pay for unused capacity.

      Reality check: even in the cloud era, capacity management is necessary

      You will likely find vendors to nurture the growth of a gap between your expectations and reality. That can be damaging.

      The cloud reality does not look like the cloud ideal. Even with the ostensibly elastic cloud, vendors like the consistency that longer-term contracts offer. Enter reserved instances: in exchange for lower hourly rates, vendors offer the option to pay a fee for a reserved instance. Usage beyond the reserved will be billed at a higher hourly rate. In order to determine where that line should be drawn, you should engage in detailed capacity planning. Unfortunately, even when done right, this process will result in some overprovisioning, though it does provide convenience from an accounting perspective. The key is to use spot instances where demand is exceptional and bounded. Example: A university registration server that experiences exceptional demand at the start of term but at no other time.

      The image contains an example of cloud reality not matching with the cloud ideal in the form of a graph. The graph is split horizontally, the top half is red, and there is a dotted line splitting it from the lower half. The line is labelled: Reserved instance ceiling. In the bottom half, it is the colour green and has a curving line.

      Use best practices to optimize your cloud resources

      The image contains two graphs. The graph on the left is labelled: Ineffective reserve capacity. At the top of the graph is a dotted line labelled: Reserved Instance ceiling. The graph is measuring capacity requirements over time. There is a curved line on the graph that suddenly spikes and comes back down. The spike is labelled unused capacity. The graph on the right is labelled: Effective reserve capacity. The reserved instance ceiling is about halfway down this graph, and it is comparing capacity requirements over time. This graph has a curved line on it, also has a spike and is labelled: spot instance.

      Even in the era of elasticity, capacity planning is crucial. Spot instances – the spikes in the graph above – are more expensive, but if your capacity needs vary substantially, reserving instances for all of the space you need can cost even more money. Efficiently planning capacity will help you draw this line.

      Evaluate business impact; not all systems are created equal

      Limited resources are a reality. Detailed visibility into every single system is often not feasible and could be too much information.

      Simple and effective. Sometimes a simple display can convey all of the information necessary to manage critical systems. In cars it is important to know your speed, how much fuel is in the tank, and whether or not you need to change your oil/check your engine.

      Where to begin?! Specialized information is sometimes necessary, but it can be difficult to navigate.

      Take advantage of a business impact analysis to define and understand your critical services

      Ideally, downtime would be minimal. In reality, though, downtime is a part of IT life. It is important to have realistic expectations about its nature and likelihood.

      STEP 1

      STEP 2

      STEP 3

      STEP 4

      STEP 5

      Record applications and dependencies

      Utilize your asset management records and document the applications and systems that IT is responsible for managing and recovering during a disaster.

      Define impact scoring scale

      Ensure an objective analysis of application criticality by establishing a business impact scale that applies to all applications.

      Estimate impact of downtime

      Leverage the scoring criteria from the previous step and establish an estimated impact of downtime for each application.

      Identify desired RTO and RPO

      Define what the RTOs/RPOs should be based on the impact of a business interruption and the tolerance for downtime and data loss.

      Determine current RTO/RPO

      Conduct tabletop planning and create a flowchart of your current capabilities. Compare your current state to the desired state from the previous step.

      Info-Tech Insight

      According to end users, every system is critical and downtime is intolerable. Of course, once they see how much totally eliminating downtime can cost, they might change their tune. It is important to have this discussion to separate the critical from the less critical – but still important – services.

      Establish visibility into critical systems

      You may have seen “If you can’t measure it, you can’t manage it” or a variation thereof floating around the internet. This adage is consumable and makes sense…doesn’t it?

      "It is wrong to suppose that if you can’t measure it, you can’t manage it – a costly myth."

      – W. Edwards Deming, statistician and management consultant, author of The New Economics

      While it is true that total monitoring is not absolutely necessary for management, when it comes to availability and capacity – objectively quantifiable service characteristics – a monitoring strategy is unavoidable. Capturing fluctuations in demand, and adjusting for those fluctuations, is among the most important functions of a capacity manager, even if hovering over employees with a stopwatch is poor management.

      Solicit needs from line of business managers

      Unless you head the world’s most involved IT department (kudos if you do) you’re going to have to determine your needs from the business.

      Do

      Do not

      ✓ Develop a positive relationship with business leaders responsible for making decisions.

      ✓ Make yourself aware of ongoing and upcoming projects.

      ✓ Develop expertise in organization-specific technology.

      ✓ Make the business aware of your expenses through chargebacks or showbacks.

      ✓ Use your understanding of business projects to predict business needs; do not rely on business leaders’ technical requests alone.

      X Be reactive.

      X Accept capacity/availability demands uncritically.

      X Ask line of business managers for specific computing requirements unless they have the technical expertise to make informed judgments.

      X Treat IT as an opaque entity where requests go in and services come out (this can lead to irresponsible requests).

      Demand: manage or be managed

      You might think you can get away with uncritically accepting your users’ demands, but this is not best practice. If you provide it, they will use it.

      The company meeting

      “I don’t need this much RAM,” the application developer said, implausibly. Titters wafted above the assembled crowd as her IT colleagues muttered their surprise. Heads shook, eyes widened. In fact, as she sat pondering her utterance, the developer wasn’t so sure she believed it herself. Noticing her consternation, the infrastructure manager cut in and offered the RAM anyway, forestalling the inevitable crisis that occurs when seismic internal shifts rock fragile self-conceptions. Until next time, he thought.

      "Work expands as to fill the resources available for its completion…"

      – C. Northcote Parkinson, quoted in Klimek et al.

      Combine historical data with the needs you’ve solicited to holistically project your future needs

      Predicting the future is difficult, but when it comes to capacity management, foresight is necessary.

      Critical inputs

      In order to project your future needs, the following inputs are necessary.

      1. Usage trends: While it is true that past performance is no indication of future demand, trends are still a good way to validate requests from the business.
      2. Line of business requests: An understanding of the projects the business has in the pipes is important for projecting future demand.
      3. Institutional knowledge: Read between the lines. As experts on information technology, the IT department is well-equipped to translate needs into requirements.
      The image contains a graph that is labelled: Projected demand, and graphs demand over time. There is a curved line that passes through a vertical line labelled present. There is a box on top of the graph that contains the text: Note: confidence in demand estimates will very by service and by stakeholder.

      Follow best practice guidelines to maximize the efficiency of your availability and capacity management process

      The image contains Info-Tech's IT Management & Governance Framework. The framework displays many of Info-Tech's research to help optimize and improve core IT processes. The name of this blueprint is under the Infrastructure & Operations section, and has been circled to point out where it is in the framework.

      Understand how the key frameworks relate and interact

      The image contains a picture of the COBIT 5 logo.

      BA104: Manage availability and capacity

      • Current state assessment
      • Forecasting based on business requirements
      • Risk assessment of planning and implementation of requirements
      The image contains a picture of the ITIL logo

      Availability management

      • Determine business requirements
      • Match requirements to capabilities
      • Address any mismatch between requirements and capabilities in a cost-effective manner

      Capacity management

      • Monitoring services and components
      • Tuning for efficiency
      • Forecasting future requirements
      • Influencing demand
      • Producing a capacity plan
      The image contains a picture of Info-Tech Research Group logo.

      Availability and capacity management

      • Conduct a business impact analysis
      • Establish visibility into critical systems
      • Solicit and incorporate business needs
      • Identify and mitigate risks

      Disaster recovery and business continuity planning are forms of availability management

      The scope of this project is managing day-to-day availability, largely but not exclusively, in the context of capacity. For additional important information on availability, see the following Info-Tech projects.

        • Develop a Business Continuity Plan

      If your focus is on ensuring process continuity in the event of a disaster.

        • Establish a Program to Enable Effective Performance Monitoring

      If your focus is on flow mapping and transaction monitoring as part of a plan to engage APM vendors.

        • Create a Right-Sized Disaster Recovery Plan

      If your focus is on hardening your IT systems against major events.

      Info-Tech’s approach to availability and capacity management is stakeholder-centered and cloud ready

      Phase 1:

      Conduct a business impact analysis

      Phase 2:

      Establish visibility into core systems

      Phase 3:

      Solicit and incorporate business needs

      Phase 4:

      Identify and mitigate risks

      1.1 Conduct a business impact analysis

      1.2 Assign criticality ratings to services

      2.1 Define your monitoring strategy

      2.2 Implement monitoring tool/aggregator

      3.1 Solicit business needs

      3.2 Analyze data and project future needs

      4.1 Identify and mitigate risks

      Deliverables

      • Business impact analysis
      • Gold systems
      • Monitoring strategy
      • List of stakeholders
      • Business needs
      • Projected capacity needs
      • Risks and mitigations
      • Capacity management summary cards

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Availability & capacity management – project overview

       

      Conduct a business impact analysis

      Establish visibility into core systems

      Solicit and incorporate business needs

      Identify and
      mitigate risks

      Best-Practice Toolkit

      1.1 Create a scale to measure different levels of impact

      1.2 Assign criticality ratings to services

      2.1 Define your monitoring strategy

      2.2 Implement your monitoring tool/aggregator

      3.1 Solicit business needs and gather data

      3.2 Analyze data and project future needs

      4.1 Identify and mitigate risks

      Guided Implementations

      Call 1: Conduct a business impact analysis Call 1: Discuss your monitoring strategy

      Call 1: Develop a plan to gather historical data; set up plan to solicit business needs

      Call 2: Evaluate data sources

      Call 1: Discuss possible risks and strategies for risk mitigation

      Call 2: Review your capacity management plan

      Onsite Workshop

      Module 1:

      Conduct a business impact analysis

      Module 2:

      Establish visibility into core systems

      Module 3:

      Develop a plan to project future needs

      Module 4:

      Identify and mitigate risks

       

      Phase 1 Results:

      • RTOs/RPOs
      • List of gold systems
      • Criticality matrix

      Phase 2 Results:

      • Capacity/availability monitoring strategy

      Phase 3 Results:

      • Plan for soliciting future needs
      • Future needs

      Phase 4 Results:

      • Strategies for reducing risks
      • Capacity management plan

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

       

      Workshop Day 1

      Workshop Day 2

      Workshop Day 3

      Workshop Day 4

       

      Conduct a business
      impact analysis

      Establish visibility into
      core systems

      Solicit and incorporate business needs

      Identify and mitigate risks

      Activities

      1.1 Conduct a business impact analysis

      1.2 Create a list of critical dependencies

      1.3 Identify critical sub-components

      1.4 Develop best practices to negotiate SLAs

      2.1 Determine indicators for sub-components

      2.2 Establish visibility into components

      2.3 Develop strategies to ameliorate visibility issues

      3.1 Gather relevant business-level data

      3.2 Gather relevant service-level data

      3.3 Analyze historical trends

      3.4 Build a list of business stakeholders

      3.5 Directly solicit requirements from the business

      3.6 Map business needs to technical requirements

      3.7 Identify inefficiencies and compare historical data

      • 4.1 Brainstorm potential causes of availability and capacity risk
      • 4.2 Identify and mitigate capacity risks
      • 4.3 Identify and mitigate availability risks

      Deliverables

      1. Business impact analysis
      2. List of gold systems
      3. SLA best practices
      1. Sub-component metrics
      2. Strategy to establish visibility into critical sub-components
      1. List of stakeholders
      2. Business requirements
      3. Technical requirements
      4. Inefficiencies
      1. Strategies for mitigating risks
      2. Completed capacity management plan template

      PHASE 1

      Conduct a Business Impact Analysis

      Step 1.1: Conduct a business impact analysis

      This step will walk you through the following activities:

      • Record applications and dependencies in the Business Impact Analysis Tool.
      • Define a scale to estimate the impact of various applications’ downtime.
      • Estimate the impact of applications’ downtime.

      This involves the following participants:

      • Capacity manager
      • Infrastructure team

      Outcomes of this step

      • Estimated impact of downtime for various applications

      Execute a business impact analysis (BIA) as part of a broader availability plan

      1.1a Business Impact Analysis Tool

      Business impact analyses are an invaluable part of a broader IT strategy. Conducting a BIA benefits a variety of processes, including disaster recovery, business continuity, and availability and capacity management

      STEP 1

      STEP 2

      STEP 3

      STEP 4

      STEP 5

      Record applications and dependencies

      Utilize your asset management records and document the applications and systems that IT is responsible for managing and recovering during a disaster.

      Define impact scoring scale

      Ensure an objective analysis of application criticality by establishing a business impact scale that applies to all applications.

      Estimate impact of downtime

      Leverage the scoring criteria from the previous step and establish an estimated impact of downtime for each application.

      Identify desired RTO and RPO

      Define what the RTOs/RPOs should be based on the impact of a business interruption and the tolerance for downtime and data loss.

      Determine current RTO/RPO

      Conduct tabletop planning and create a flowchart of your current capabilities. Compare your current state to the desired state from the previous step.

      Info-Tech Insight

      Engaging in detailed capacity planning for an insignificant service draws time and resources away from more critical capacity planning exercises. Time spent tracking and planning use of the ancient fax machine in the basement is time you’ll never get back.

      Control the scope of your availability and capacity management planning project with a business impact analysis

      Don’t avoid conducting a BIA because of a perception that it’s too onerous or not necessary. If properly managed, as described in this blueprint, the BIA does not need to be onerous and the benefits are tangible.

      A BIA enables you to identify appropriate spend levels, continue to drive executive support, and prioritize disaster recovery planning for a more successful outcome. For example, an Info-Tech survey found that a BIA has a significant impact on setting appropriate recovery time objectives (RTOs) and appropriate spending.

      The image contains a graph that is labelled: BIA Impact on Appropriate RTOS. With no BIA, there is 59% RTOs are appropriate. With BIA, there is 93% RTOS being appropriate. The image contains a graph that is labelled: BIA Impact on Appropriate Spending. No BIA has 59% indication that BCP is cost effective. With a BIA there is 86% indication that BCP is cost effective.

      Terms

      No BIA: lack of a BIA, or a BIA bases solely on the perceived importance of IT services.

      BIA: based on a detailed evaluation or estimated dollar impact of downtime.

      Source: Info-Tech Research Group; N=70

      Select the services you wish to evaluate with the Business Impact Analysis Tool

      1.1b 1 hour

      In large organizations especially, collating an exhaustive list of applications and services is going to be onerous. For the purposes of this project, a subset should suffice.

      Instructions

      1. Gather a diverse group of IT staff and end users in a room with a whiteboard.
      2. Solicit feedback from the group. Questions to ask:
      • What services do you regularly use? What do you see others using? (End users)
      • Which service inspires the greatest number of service calls? (IT)
      • What services are you most excited about? (Management)
      • What services are the most critical for business operations? (Everybody)
    • Record these applications in the Business Impact Analysis Tool.
    • Input

      • Applications/services

      Output

      • Candidate applications for the business impact analysis

      Materials

      • Whiteboard
      • Markers

      Participants

      • Infrastructure manager
      • Enterprise architect
      • Application owners
      • End users

      Info-Tech Insight

      Include a variety of services in your analysis. While it might be tempting to jump ahead and preselect important applications, don’t. The process is inherently valuable, and besides, it might surprise you.

      Record the applications and dependencies in the BIA tool

      1.1c Use tab 1 of the Business Impact Analysis Tool

      1. In the Application/System column, list the applications identified for this pilot as well as the Core Infrastructure category. Also indicate the Impact on the Business and Business Owner.
      2. List the dependencies for each application in the appropriate columns:
      • Hosted On-Premises (In-House) – If the physical equipment is in a facility you own, record it here, even if it is managed by a vendor.
      • Hosted by a Co-Lo/MSP – List any dependencies hosted by a co-lo/MSP vendor.
      • Cloud (includes "as a Service”) – List any dependencies hosted by a cloud vendor.

      Note: If there are no dependencies for a particular category, leave it blank.

    • If you wish to highlight specific dependencies, put an asterisk in front of them (e.g. *SAN). This will cause the dependency to be highlighted in the remaining tabs in this tool.
    • Add comments as needed in the Notes columns. For example, for equipment that you host in-house but is remotely managed by an MSP, specify this in the notes. Similarly, note any DR support services.
    • Example

      The image contains a screenshot of Info-Tech's Business Impact Analysis Tool specifically tab 1.

      ID is optional. It is a sequential number by default.

      In-House, Co-Lo/MSP, and Cloud dependencies; leave blank if not applicable.

      Add notes as applicable – e.g. critical support services.

      Define a scoring scale to estimate different levels of impact

      1.1d Use tab 2 of the Business Impact Analysis Tool

      Modify the Business Impact Scales headings and Overall Criticality Rating terminology to suit your organization. For example, if you don’t have business partners, use that column to measure a different goodwill impact or just ignore that column in this tool (i.e. leave it blank). Estimate the different levels of potential impact (where four is the highest impact and zero is no impact) and record these in the Business Impact Scales columns.

      The image contains a screenshot of Info-Tech's Business Impact Analysis Tool, specifically tab 2.

      Estimate the impact of downtime for each application

      1.1e Use tab 3 of the Business Impact Analysis Tool

      In the BIA tab columns for Direct Costs of Downtime, Impact on Goodwill, and Additional Criticality Factors, use the drop-down menu to assign a score of zero to four based on levels of impact defined in the Scoring Criteria tab. For example, if an organization’s ERP is down, and that affects call center sales operations (e.g. ability to access customer records and process orders), the impact might be as described below:

        • Loss of Revenue might score a two or three depending on the proportion of overall sales lost due to the downtime.
        • The Impact on Customers might be a one or two depending on the extent that existing customers might be using the call center to purchase new products or services, and are frustrated by the inability to process orders.
        • The Legal/Regulatory Compliance and Health or Safety Risk might be a zero.

      On the other hand, if payroll processing is down, this may not impact revenue, but it certainly impacts internal goodwill and productivity.

      Rank service criticality: gold, silver, and bronze

      Gold

      Mission critical services. An outage is catastrophic in terms of cost or public image/goodwill. Example: trading software at a financial institution.

      Silver

      Important to daily operations, but not mission critical. Example: email services at any large organization.

      Bronze

      Loss of these services is an inconvenience more than anything, though they do serve a purpose and will be missed if they are never brought back online. Example: ancient fax machines.

      Info-Tech Best Practice

      Info-Tech recommends gold, silver, and bronze because of this typology’s near universal recognition. If you would prefer a particular designation (it might help with internal comprehension), don’t hesitate to use that one instead.

      Use the results of the business impact analysis to sort systems based on their criticality

      1.1f 1 hour

      Every organization has its own rules about how to categorize service importance. For some (consumer-facing businesses, perhaps) reputational damage may trump immediate costs.

      Instructions

      1. Gather a group of key stakeholders and project the completed Business Impact Analysis Tool onto a screen for them.
      2. Share the definitions of gold, silver, and bronze services with them (if they are not familiar), and begin sorting the services by category,
      • How long would it take to notice if a particular service went out?
      • How important are the non-quantifiable damages that could come with an outage?
    • Sort the services into gold, silver, and bronze on a whiteboard, with sticky notes, or with chart paper.
    • Verify your findings and record them in section 2.1 of the Capacity Plan Template.
    • Input

      • Results of the business impact analysis exercise

      Output

      • List of gold, silver, and bronze systems

      Materials

      • Projector
      • Business Impact Analysis Tool
      • Capacity Plan Template

      Participants

      • Infrastructure manager
      • Enterprise architect

      Leverage the rest of the BIA tool as part of your disaster recovery planning

      Disaster recovery planning is a critical activity, and while it is a sort of availability management, it is beyond this project’s scope. You can complete the business impact analysis (including RTOs and RPOs) for the complete disaster recovery package.

      See Info-Tech’s Create a Right-Sized Disaster Recovery Plan blueprint for instructions on how to complete your business impact analysis.

      Step 1.2: Assign criticality ratings to services

      This step will walk you through the following activities:

      • Create a list of dependencies for your most important applications.
      • Identify important sub-components.
      • Use best practices to develop and negotiate SLAs.

      This involves the following participants:

      • Capacity manager
      • Infrastructure team

      Outcomes of this step

      • List of dependencies of most important applications
      • List of important sub-components
      • SLAs based on best practices

      Determine the base unit of the capacity you’re looking to purchase

      Not every IT organization should approach capacity the same way. Needs scale, and larger organizations will inevitably deal in larger quantities.

      Large cloud provider

      Local traditional business

      • Thousands of servers housed in a number of datacenters around the world.
      • Dedicated capacity manager.
      • Purchases components from OEMs in bulk as part of bespoke contracts that are worth many millions of dollars over time.
      • May deal with components at a massive scale (dozens of servers at once, for example).
      • A small server room that runs non-specialized services (email, for example).
      • Barely even a dedicated IT person, let alone an IT capacity manager.
      • Purchases new components from resellers or even retail stores.
      • Deals with components at a small scale (a single switch here, a server upgrade there).

      "Cloud capacity management is not exactly the same as the ITIL version because ITIL has a focus on the component level. I actually don’t do that, because if I did I’d go crazy. There’s too many components in a cloud environment."

      – Richie Mendoza, IT Consultant, SMITS Inc.

      Consider the relationship between component capacity and service capacity

      End users’ thoughts about IT are based on what they see. They are, in other words, concerned with service availability: does the organization have the ability to provide access to needed services?

      Service

      • Email
      • CRM
      • ERP

      Component

      • Switch
      • SMTP server
      • Archive database
      • Storage

      "You don’t ask the CEO or the guy in charge ‘What kind of response time is your requirement?’ He doesn’t really care. He just wants to make sure that all his customers are happy."

      – Todd Evans, Capacity and Performance Management SME, IBM.

      One telco solved its availability issues by addressing component capacity issues

      CASE STUDY

      Industry: Telecommunications

      Source: Interview

      Coffee and Wi-Fi – a match made in heaven

      In tens of thousands of coffee shops around the world, patrons make ample use of complimentary Wi-Fi. Wi-Fi is an important part of customers’ coffee shop experience, whether they’re online to check their email, do a YouTube, or update their Googles. So when one telco that provided Wi-Fi access for thousands of coffee shops started encountering availability issues, the situation was serious.

      Wi-Fi, whack-a-mole, and web woes

      The team responsible for resolving the issue took an ad hoc approach to resolving complaints, fixing issues as they came up instead of taking a systematic approach.

      Resolution

      Looking at the network as a whole, the capacity manager took a proactive approach by using data to identify and rank the worst service areas, and then directing the team responsible to fix those areas in order of the worst first, then the next worst, and so on. Soon the availability of Wi-Fi service was restored across the network.

      Create a list of dependencies for your most important applications

      1.2a 1.5 hours

      Instructions

      1. Work your way down the list of services outlined in step 1, starting with your gold systems. During the first iteration of this exercise select only 3-5 of your most important systems.
      2. Write the name of each application on a sticky note or at the top of a whiteboard (leaving ample space below for dependency mapping).
      3. In the first tier below the application, include the specific services that the general service provides.
      • This will vary based on the service in question, but an example for email is sending, retrieving, retrieving online, etc.
    • For each of the categories identified in step 3, identify the infrastructure components that are relevant to that system. Be broad and sweeping; if the component is involved in the service, include it here. The goal is to be exhaustive.
    • Leave the final version of the map intact. Photographing or making a digital copy for posterity. It will be useful in later activities.
    • Input

      • List of important applications

      Output

      • List of critical dependencies

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • Infrastructure manager
      • Enterprise architect

      Info-Tech Insight

      Dependency mapping can be difficult. Make sure you don’t waste effort creating detailed dependency maps for relatively unimportant services.

      Dependency mapping can be difficult. Make sure you don’t waste effort creating detailed dependency maps for relatively unimportant services.

      The image contains a sample dependency map on ride sharing. Ride Sharing has been split between two categories: Application and Drivers. Under drivers it branches out to: Availability, Car, and Pay. Under Application, it branches out to: Compute, Network, Edge devices, Q/A maintenance, and Storage. Compute branches out to Cloud Services. Network branches out to Cellular network and Local. Edge Devices branch out to Drivers and Users. Q/A maintenance does not have a following branch. Storage branches out to Storage (Enterprise) and Storage (local).

      Ride sharing cannot work, at least not at maximum effectiveness, without these constituent components. When one or more of these components are absent or degraded, the service will become unavailable. This example illustrates some challenges of capacity management; some of these components are necessary, but beyond the ride-sharing company’s control.

      Leverage a sample dependency tree for a common service

      The image contains a sample dependency tree for the Email service. Email branches out to: Filtering, Archiving, Retrieval, and Send/receive. Filtering branches out to security appliance which then branches out to CPU, Storage, and Network. Archiving branches to Archive server, which branches out to CPU, Storage, and Network. Retrieval branches out to IMAP/PoP which branches out to CPU, Storage, and Network. Send/receive branches out to IMAP/PoP and SMTP. SMTP branches out to CPU, Storage and Network.

      Info-Tech Best Practice

      Email is an example here not because it is necessarily a “gold system,” but because it is common across industries. This is a useful exercise for any service, but it can be quite onerous, so it should be conducted on the most important systems first.

      Separate the wheat from the chaff; identify important sub-components and separate them from unimportant ones

      1.2b 1.5 hours

      Use the bottom layer of the pyramid drawn in step 1.2a for a list of important sub-components.

      Instructions

      1. Record a list of the gold services identified in the previous activity. Leave space next to each service for sub-components.
      2. Go through each relevant sub-component. Highlight those that are critical and could reasonably be expected to cause problems.
      • Has this sub-component caused a problem in the past?
      • Is this sub-component a bottleneck?
      • What could cause this component to fail? Is it such an occurrence feasible?
    • Record the results of the exercise (and the service each sub-component is tied to) in tab 2 (columns B &C) of the Capacity Snapshot Tool.
    • Input

      • List of important applications

      Output

      • List of critical dependencies

      Materials

      • Whiteboard
      • Markers

      Participants

      • Infrastructure manager
      • Enterprise architect

      Understand availability commitments with SLAs

      With the rise of SaaS, cloud computing, and managed services, critical services and their components are increasingly external to IT.

      • IT’s lack of access to the internal working of services does not let them off the hook for performance issues (as much as that might be the dream).
      • Vendor management is availability management. Use the dependency map drawn earlier in this phase to highlight the components of critical services that rely on capacity that cannot be managed internally.
      • For each of these services ensure that an appropriate SLA is in place. When acquiring new services, ensure that the vendor SLA meets business requirements.

      The image contains a large blue circle labelled: Availability. Also in the blue circle is a small red circle labelled: Capacity.

      In terms of service provision, capacity management is a form of availability management. Not all availability issues are capacity issues, but the inverse is true.

      Info-Tech Insight

      Capacity issues will always cause availability issues, but availability issues are not inherently capacity issues. Availability problems can stem from outages unrelated to capacity (e.g. power or vendor outages).

      Use best practices to develop and negotiate SLAs

      1.2c 20 minutes per service

      When signing contracts with vendors, you will be presented with an SLA. Ensure that it meets your requirements.

      1. Use the business impact analysis conducted in this project’s first step to determine your requirements. How much downtime can you tolerate for your critical services?
      2. Once you have been presented with an SLA, be sure to scour it for tricks. Remember, just because a vendor offers “five nines” of availability doesn’t mean that you’ll actually get that much uptime. It could be that the vendor is comfortable eating the cost of downtime or that the contract includes provisions for planned maintenance. Whether or not the vendor anticipated your outage does little to mitigate the damage an outage can cause to your business, so be careful of these provisions.
      3. Ensure that the person ultimately responsible for the SLA (the approver) understands the limitations of the agreement and the implications for availability.

      Input

      • List of external component dependencies

      Output

      • SLA requirements

      Materials

      • Whiteboard
      • Markers

      Participants

      • Infrastructure manager
      • Enterprise architect

      Info-Tech Insight

      Vendors are sometimes willing to eat the cost of violating SLAs if they think it will get them a contract. Be careful with negotiation. Just because the vendor says they can do something doesn’t make it true.

      Negotiate internal SLAs using Info-Tech’s rigorous process

      Talking past each other can drive misalignment between IT and the business, inconveniencing all involved. Quantify your needs through an internal SLA as part of a comprehensive availability management plan.

      See Info-Tech’s Improve IT-Business Alignment Through an Internal SLA blueprint for instructions on why you should develop internal SLAs and the potential benefits they bring.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

      The image contains a picture of an Info-Tech analyst.

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.2

      The image contains a screenshot of activity 1.2 as previously described above.

      Create a list of dependencies for your most important applications

      Using the results of the business impact analysis, the analyst will guide workshop participants through a dependency mapping exercise that will eventually populate the Capacity Plan Template.

      Phase 1 Guided Implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Conduct a business impact analysis

      Proposed Time to Completion: 1 week

      Step 1.1: Create a scale to measure different levels of impact

      Review your findings with an analyst

      Discuss how you arrived at the rating of your critical systems and their dependencies. Consider whether your external SLAs are appropriate.

      Then complete these activities…

      • Use the results of the business impact analysis to sort systems based on their criticality

      With these tools & templates:

      Business Impact Analysis Tool

      Step 1.2: Assign criticality ratings to services

      Review your findings with an analyst

      Discuss how you arrived at the rating of your critical systems and their dependencies. Consider whether your external SLAs are appropriate.

      Then complete these activities…

      • Create a list of dependencies for your most important applications
      • Identify important sub-components
      • Use best practices to develop and negotiate SLAs

      With these tools & templates:

      Capacity Snapshot Tool

      Phase 1 Results & Insights:

      • Engaging in detailed capacity planning for an insignificant service is a waste of resources. Focus on ensuring availability for your most critical systems.
      • Carefully evaluate vendors’ service offerings. Make sure the SLA works for you, and approach pie-in-the-sky promises with skepticism.

      PHASE 2

      Establish Visibility Into Core Systems

      Step 2.1: Define your monitoring strategy

      This step will walk you through the following activities:

      • Determine the indicators you should be tracking for each sub-component.

      This involves the following participants:

      • Capacity manager
      • Infrastructure team

      Outcomes of this step

      • List of indicators to track for each sub-component

      Data has its significance—but also its limitations

      The rise of big data can be a boon for capacity managers, but be warned: not all data is created equal. Bad data can lead to bad decisions – and unemployed capacity managers.

      Your findings are only as good as your data. Remember: garbage in, garbage out. There are three characteristics of good data:*

      1. Accuracy: is the data exact and correct? More detail and confidence is better.
      2. Reliability: is the data consistent? In other words, if you run the same test twice will you get the same results?
      3. Validity: is the information gleaned believable and relevant?

      *National College of Teaching & Leadership, “Reliability and Validity”

      "Data is king. Good data is absolutely essential to [the capacity manager] role."

      – Adrian Blant, Independent Capacity Consultant, IT Capability Solutions

      Info-Tech Best Practice

      Every organization’s data needs are different; your data needs are going to be dictated by your services, delivery model, and business requirements. Make sure you don’t confuse volume with quality, even if others in your organization make that mistake.

      Take advantage of technology to establish visibility into your systems

      Managing your availability and capacity involves important decisions about what to monitor and how thresholds should be set.

      • Use the list of critical applications developed through the business impact analysis and the list of components identified in the dependency mapping exercise to produce a plan for effectively monitoring component availability and capacity.
      • The nature of IT service provision – the multitude of vendors providing hardware and services necessary for even simple IT services to work effectively – means that it is unlikely that capacity management will be visible through a single pane of glass. In other words, “email” and “CRM” don’t have a defined capacity. It always depends.
      • Establishing visibility into systems involves identifying what needs to be tracked for each component.

      Too much monitoring can be as bad as the inverse

      In 2013, a security breach at US retailer Target compromised more than 70 million customers’ data. The company received an alert, but it was thought to be a false positive because the monitoring system produced so many false and redundant alerts. As a result of the daily deluge, staff did not respond to the breach in time.

      Info-Tech Insight

      Don’t confuse monitoring with management. While establishing visibility is a crucial step, it is only part of the battle. Move on to this project’s next phase to explore opportunities to improve your capacity/availability management process.

      Determine the indicators you should be tracking for each sub-component

      2.1a Tab 3 of the Capacity Snapshot Tool

      It is nearly impossible to overstate the importance of data to the process of availability and capacity management. But the wrong data will do you no good.

      Instructions

      1. Open the Capacity Snapshot Tool to tab 2. The tool should have been populated in step 1.2 as part of the component mapping exercise.
      2. For each service, determine which metric(s) would most accurately tell the component’s story. Consider the following questions when completing this activity (you may end up with more than one metric):
      • How would the component’s capacity be measured (storage space, RAM, bandwidth, vCPUs)?
      • Is the metric in question actionable?
    • Record each metric in the Metric column (D) of the Capacity Snapshot Tool. Use the adjacent column for any additional information on metrics.
    • Info-Tech Insight

      Bottlenecks are bad. Use the Capacity Snapshot Tool (or another tool like it) to ensure that when the capacity manager leaves (on vacation, to another role, for good) the knowledge that they have accumulated does not leave as well.

      Understand the limitations of this approach

      Although we’ve striven to make it as easy as possible, this process will inevitably be cumbersome for organizations with a complicated set of software, hardware, and cloud services.

      Tracking every single component in significant detail will produce a lot of noise for each bit of signal. The approach outlined here addresses that concern in two ways:

      • A focus on gold services
      • A focus on sub-components that have a reasonable likelihood of being problematic in the future.

      Despite this effort, however, managing capacity at the component level is a daunting task. Ultimately, tools provided by vendors like SolarWinds and AppDynamics will fill in some of the gaps. Nevertheless, an understanding of the conceptual framework underlying availability and capacity management is valuable.

      Step 2.2: Implement your monitoring tool/aggregator

      This step will walk you through the following activities:

      • Clarify visibility.
      • Determine whether or not you have sufficiently granular visibility.
      • Develop strategies to .any visibility issues.

      This involves the following participants:

      • Capacity manager
      • Infrastructure team
      • Applications personnel

      Outcomes of this step

      • Method for measuring and monitoring critical sub-components

      Companies struggle with performance monitoring because 95% of IT shops don’t have full visibility into their environments

      CASE STUDY

      Industry: Financial Services

      Source: AppDynamics

      Challenge

      • Users are quick to provide feedback when there is downtime or application performance degradation.
      • The challenge for IT teams is that while they can feel the pain, they don’t have visibility into the production environment and thus cannot identify where the pain is coming from.
      • The most common solution that organizations rely on is leveraging the log files for issue diagnosis. However, this method is slow and often unable to pinpoint the problem areas, leading to delays in problem resolution.

      Solution

      • Application and infrastructure teams need to work together to develop infrastructure flow maps and transaction profiles.
      • These diagrams will highlight the path that each transaction travels across your infrastructure.
      • Ideally at this point, teams will also capture latency breakdowns across every tier that the business transaction flows through.
        • This will ultimately kick start the baselining process.

      Results

      • Ninety-five percent of IT departments don’t have full visibility into their production environment. As a result, a slow business transaction will often require a war-room approach where SMEs from across the organization gather to troubleshoot.
      • Having visibility into the production environment through infrastructure flow mapping and transaction profiling will help IT teams pinpoint problems.
        • At the very least, teams will be able to identify common problem areas and expedite the root-cause analysis process.

      Source: “Just how complex can a Login Transaction be? Answer: Very!,” AppDynamics

      Monitor your critical sub-components

      Establishing a monitoring plan for your capacity involves answering two questions: can I see what I need to see, and can I see it with sufficient granularity?

      • Having the right tool for the job is an important step towards effective capacity and availability management.
      • Application performance management tools (APMs) are essential to the process, but they tend to be highly specific and vertically oriented, like using a microscope.
      • Some product families can cover a wider range of capacity monitoring functions (SolarWinds, for example). It is still important, however, to codify your monitoring needs.

      "You don’t use a microscope to monitor an entire ant farm, but you might use many microscopes to monitor specific ants."

      – Fred Chagnon, Research Director, Infrastructure Practice, Info-Tech Research Group

      Monitor your sub-components: clarify visibility

      2.2a Tab 2 of the Capacity Snapshot Tool

      The next step in capacity management is establishing whether or not visibility (in the broad sense) is available into critical sub-components.

      Instructions

      1. Open the Capacity Snapshot Tool and record the list of sub-components identified in the previous step.
      2. For each sub-component answer the following question:
      • Do I have easy access to the information I need to monitor to ensure this component remains available?
    • Select “Yes” or “No” from the drop-down menus as appropriate. In the adjacent column record details about visibility into the component.
      • What tool provides the information? Where can it be found?

      The image contains a screenshot of Info-Tech's Capacity Snapshot Tool, Tab 2.

      Monitor your sub-components; determine whether or not you have sufficient granular visibility

      2.2b Tab 2 of the Capacity Snapshot Tool

      Like ideas and watches, not all types of visibility are created equal. Ensure that you have access to the right information to make capacity decisions.

      Instructions

      1. For each of the sub-components clarify the appropriate level of granularity for the visibility gained to be useful. In the case of storage, for example, is raw usage (in gigabytes) sufficient, or do you need a breakdown of what exactly is taking up the space? The network might be more complicated.
      2. Record the details of this ideation in the adjacent column.
      3. Select “Yes” or “No” from the drop-down menu to track the status of each sub-component.

      The image contains a picture of an iPhone storage screen where it breaks down the storage into the following categories: apps, media, photos, and other.

      For most mobile phone users, this breakdown is sufficient. For some, more granularity might be necessary.

      Info-Tech Insight

      Make note of monitoring tools and strategies. If anything changes, be sure to re-evaluate the visibility status. An outdated spreadsheet can lead to availability issues if management is unaware of looming problems.

      Develop strategies to ameliorate any visibility issues

      2.2c 1 hour

      The Capacity Snapshot Tool color-codes your components by status. Green – visibility and granularity are both sufficient; yellow – visibility exists, though not at sufficient granularity; and red – visibility does not exist at all.

      Instructions

      1. Write each of the yellow and red sub-components on a whiteboard or piece of chart paper.
      2. Brainstorm amelioration strategies for each of the problematic sub-components.
      • Does the current monitoring tool have sufficient functionality?
      • Does it need to be further configured/customized?
      • Do we need a whole new tool?
    • Record these strategies in the Amelioration Strategy column on tab 4 of the tool.
    • Input

      • Sub-components
      • Capacity Snapshot Tool

      Output

      • Amelioration strategies

      Materials

      • Whiteboard
      • Markers
      • Capacity Snapshot Tool

      Participants

      • Infrastructure manager

      Info-Tech Best Practice

      It might be that there is no amelioration strategy. Make note of this difficulty and highlight it as part of the risk section of the Capacity Plan Template.

      See Info-Tech’s projects on storage and network modernization for additional details

      Leverage other products for additional details on how to modernize your network and storage services.

      The process of modernizing the network is fraught with vestigial limitations. Develop a program to gather requirements and plan.

      As part of the blueprint, Modernize Enterprise Storage, the Modernize Enterprise Storage Workbook includes a section on storage capacity planning.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

      The image contains a picture of an Info-Tech analyst.

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.2

      The image contains a screenshot of activity 2.2.

      Develop strategies to ameliorate visibility issues

      The analyst will guide workshop participants in brainstorming potential solutions to visibility issues and record them in the Capacity Snapshot Tool.

      Phase 2 Guided Implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Establish visibility into core systems

      Proposed Time to Completion: 3 weeks

      Step 2.1: Define your monitoring strategy

      Review your findings with an analyst

      Discuss your monitoring strategy and ensure you have sufficient visibility for the needs of your organization.

      Then complete these activities…

      • Determine the indicators you should be tracking for each sub-component

      With these tools & templates:

      • Capacity Snapshot Tool

      Step 2.2: Implement your monitoring tool/aggregator

      Review your findings with an analyst

      Discuss your monitoring strategy and ensure you have sufficient visibility for the needs of your organization.

      Then complete these activities…

      • Clarify visibility
      • Determine whether or not you have sufficiently granular visibility
      • Develop strategies to ameliorate any visibility issues

      With these tools & templates:

      • Capacity Snapshot Tool

      Phase 2 Results & Insights:

      • Every organization’s data needs are different. Adapt data gathering, reporting, and analysis according to your services, delivery model, and business requirements.
      • Don’t confuse monitoring with management. Build a system to turn reported data into useful information that feeds into the capacity management process.

      PHASE 3

      Solicit and Incorporate Business Needs

      Step 3.1: Solicit business needs and gather data

      This step will walk you through the following activities:

      • Build relationships with business stakeholders.
      • Analyze usage data and identify trends.
      • Correlate usage trends with business needs.

      This involves the following participants:

      • Capacity manager
      • Infrastructure team members
      • Business stakeholders

      Outcomes of this step

      • System for involving business stakeholders in the capacity planning process
      • Correlated data on business level, service level, and infrastructure level capacity usage

      Summarize your capacity planning activities in the Capacity Plan Template

      The availability and capacity management summary card pictured here is a handy way to capture the results of the activities undertaken in the following phases. Note its contents carefully, and be sure to record specific outputs where appropriate. One such card should be completed for each of the gold services identified in the project’s first phase. Make note of the results of the activities in the coming phase, and populate the Capacity Snapshot Tool. These will help you populate the tool.

      The image contains a screenshot of Info-Tech's Capacity Plan Template.

      Info-Tech Best Practice

      The Capacity Plan Template is designed to be a part of a broader mapping strategy. It is not a replacement for a dedicated monitoring tool.

      Analyze historical trends as a crucial source of data

      The first place to look for information about your organization is not industry benchmarks or your gut (though those might both prove useful).

      • Where better to look than internally? Use the data you’ve gathered from your APM tool or other sources to understand your historical capacity needs and to highlight any periods of unavailability.
      • Consider monitoring the status of the capacity of each of your crucial components. The nature of this monitoring will vary based on the component in question. It can range from a rough Excel sheet all the way to a dedicated application performance monitoring tool.

      "In all cases the very first thing to do is to look at trending…The old adage is ‘you don’t steer a boat by its wake,’ however it’s also true that if something is growing at, say, three percent a month and it has been growing at three percent a month for the last twelve months, there’s a fairly good possibility that it’s going to carry on going in that direction."

      – Mike Lynch, Consultant, CapacityIQ

      Gather relevant data at the business level

      3.1a 2 hours per service

      A holistic approach to capacity management involves peering beyond the beaded curtain partitioning IT from the rest of the organization and tracking business metrics.

      Instructions

      1. Your service/application owners know how changes in business activities impact their systems. Business level capacity management involves responding to those changes. Ask service/application owners what changes will impact their capacity. Examples include:
      • Business volume (net new customers, number of transactions)
      • Staff changes (new hires, exits, etc.)
    • For each gold service, brainstorm relevant metrics. How can you capture that change in business volume?
    • Record these metrics in the summary card of the Capacity Plan Template.
    • In the notes section of the summary card record whether or not you have access to the required business metric.
    • Input

      • Brainstorming
      • List of gold services

      Output

      • Business level data

      Materials

      • In-house solution or commercial tool

      Participants

      • Capacity manager
      • Application/service owners

      Gather relevant data at the service level

      3.1b 2 hours per service

      One level of abstraction down is the service level. Service level capacity management, recall that service level capacity management is about ensuring that IT is meeting SLAs in its service provision.

      Instructions

      1. There should be internal SLAs for each service IT offers. (If not, that’s a good place to start. See Info-Tech’s research on the subject.) Prod each of your service owners for information on the metrics that are relevant for their SLAs. Consider the following:
      • Peak hours, requests per second, etc.
      • This will usually include some APM data.
    • Record these metrics in the summary card of the Capacity Plan Template.
    • Include any visibility issues in the notes in a similar section of the Capacity Plan Template.
    • Input

      • Brainstorming
      • List of gold services

      Output

      • Service level data

      Materials

      • In-house solution or commercial tool

      Participants

      • Capacity manager
      • Application/service owners

      Leverage the visibility into your infrastructure components and compare all of your data over time

      You established visibility into your components in the second phase of this project. Use this data, and that gathered at the business and service levels, to begin analyzing your demand over time.

      • Different organizations will approach this issue differently. Those with a complicated service catalog and a dedicated capacity manager might employ a tool like TeamQuest. If your operation is small, or you need to get your availability and capacity management activities underway as quickly as possible, you might consider using a simple spreadsheet software like Excel.
      • If you choose the latter option, select a level of granularity (monthly, weekly, etc.) and produce a line graph in Excel.
      • Example: Employee count (business metric)

      Jan

      Feb

      Mar

      Apr

      May

      June

      July

      74

      80

      79

      83

      84

      100

      102

      The image contains a graph using the example of employee count described above.

      Note: the strength of this approach is that it is easy to visualize. Use the same timescale to facilitate simple comparison.

      Manage, don’t just monitor; mountains of data need to be turned into information

      Information lets you make a decision. Understand the questions you don’t need to ask, and ask the right ones.

      "Often what is really being offered by many analytics solutions is just more data or information – not insights."

      – Brent Dykes, Director of Data Strategy, Domo

      Info-Tech Best Practice

      You can have all the data in the world and absolutely nothing valuable to add. Don’t fall for this trap. Use the activities in this phase to structure your data collection operation and ensure that your organization’s availability and capacity management plan is data driven.

      Analyze historical trends and track your services’ status

      3.1c Tab 3 of the Capacity Snapshot Tool

      At-a-glance – it’s how most executives consume all but the most important information. Create a dashboard that tracks the status of your most important systems.

      Instructions

      1. Consult infrastructure leaders for information about lead times for new capacity for relevant sub-components and include that information in the tool.
      • Look to historical lead times. (How long does it traditionally take to get more storage?)
      • If you’re not sure, contact an in-house expert, or speak to your vendor
    • Use tab 3 of the tool to record whether your existing capacity will be exceeded before you can stand more hardware up (red), you have a plan to ameliorate capacity issues but new capacity is not yet in place (yellow), or if you are not slated to run out of capacity any time soon (green).
    • Repeat the activity regularly. Include notes about spikes that might present capacity challenges, and information about when capacity may run out.
    • This tool collates and presents information gathered from other sources. It is not a substitute for a performance monitoring tool.

      Build a list of key business stakeholders

      3.1d 10 minutes

      Stakeholder analysis is crucial. Lines of authority can be diffuse. Understand who needs to be involved in the capacity management process early on.

      Instructions

      1. With the infrastructure team, brainstorm a group of departments, roles, and people who may impact demand on capacity.
      2. Go through the list with your team and identify stakeholders from two groups:
      • Line of business: who in the business makes use of the service?
      • Application owner: who in IT is responsible for ensuring the service is up?
    • Insert the list into section 3 of the Capacity Plan Template, and update as needed.
    • Input

      • Gold systems
      • Personnel Information

      Output

      • List of key business stakeholders

      Materials

      • Whiteboard
      • Markers

      Participants

      • Capacity manager
      • Infrastructure staff

      Info-Tech Best Practice

      Consider which departments are most closely aligned with the business processes that fuel demand. Prioritize those that have the greatest impact. Consider the stakeholders who will make purchasing decisions for increasing infrastructure capacity.

      Organize stakeholder meetings

      3.1e 10 hours

      Establishing a relationship with your stakeholders is a necessary step in managing your capacity and availability.

      Instructions

      1. Gather as many of the stakeholders identified in the previous activity as you can and present information on availability and capacity management
      • If you can’t get everyone in the same room, a virtual meeting or even an email blast could get the job done.
    • Explain the importance of capacity and availability management
      • Consider highlighting the trade-offs between cost and availability.
    • Field any questions the stakeholders might have about the process. Be honest. The goal of this meeting is to build trust. This will come in handy when you’re gathering business requirements.
    • Propose a schedule and seek approval from all present. Include the results in section 3 of the Capacity Plan Template.
    • Input

      • List of business stakeholders
      • Hard work

      Output

      • Working relationship, trust
      • Regular meetings

      Materials

      • Work ethic
      • Executive brief

      Participants

      • Capacity manager
      • Business stakeholders

      Info-Tech Insight

      The best capacity managers develop new business processes that more closely align their role with business stakeholders. Building these relationships takes hard work, and you must first earn the trust of the business.

      Bake stakeholders into the planning process

      3.1f Ongoing

      Convince, don’t coerce. Stakeholders want the same thing you do. Bake them into the planning process as a step towards this goal.

      1. Develop a system to involve stakeholders regularly in the capacity planning process.
      • Your system will vary depending on the structure and culture of your organization.
      • See the case study on the following slide for ideas.
      • It may be as simple as setting a recurring reminder in your own calendar to touch base with stakeholders.
    • Liaise with stakeholders regularly to keep abreast of new developments.
      • Ensure stakeholders have reasonable expectations about IT’s available resources, the costs of providing capacity, and the lead times required to source additional needed capacity.
    • Draw on these stakeholders for the step “Gather information on business requirements” later in this phase.
    • Input

      • List of business stakeholders
      • Ideas

      Output

      • Capacity planning process that involves stakeholders

      Materials

      • Meeting rooms

      Participants

      • Capacity manager
      • Business stakeholders
      • Infrastructure team

      A capacity manager in financial services wrangled stakeholders and produced results

      CASE STUDY

      Industry: Financial Services

      Source: Interview

      In financial services, availability is king

      In the world of financial services, availability is absolutely crucial. High-value trades occur at all hours, and any institution that suffers outages runs the risk of losing tens of thousands of dollars, not to mention reputational damage.

      People know what they want, but sometimes they have to be herded

      While line of business managers and application owners understand the value of capacity management, it can be difficult to establish the working relationship necessary for a fruitful partnership.

      Proactively building relationships keeps services available

      He built relationships with all the department heads on the business side, and all the application owners.

      • He met with department heads quarterly.
      • He met with application owners and business liaisons monthly.

      He established a steering committee for capacity.

      He invited stakeholders to regular capacity planning meetings.

      • The first half of each meeting was high-level outlook, such as business volume and IT capacity utilization, and included stakeholders from other departments.
      • The second half of the meeting was more technical, serving the purpose for the infrastructure team.

      He scheduled lunch and learn sessions with business analysts and project managers.

      • These are the gatekeepers of information, and should know that IT needs to be involved when things come down the pipeline.

      Step 3.2: Analyze data and project future needs

      This step will walk you through the following activities:

      • Solicit needs from the business.
      • Map business needs to technical requirements, and technical requirements to infrastructure requirements.
      • Identify inefficiencies in order to remedy them.
      • Compare the data across business, component, and service levels, and project your capacity needs.

      This involves the following participants:

      • Capacity manager
      • Infrastructure team members
      • Business stakeholders

      Outcomes of this step

      • Model of how business processes relate to technical requirements and their demand on infrastructure
      • Method for projecting future demand for your organization’s infrastructure
      • Comparison of current capacity usage to projected demand

      “Nobody tells me anything!” – the capacity manager’s lament

      Sometimes “need to know” doesn’t register with sales or marketing. Nearly every infrastructure manager can share a story about a time when someone has made a decision that has critically impacted IT infrastructure without letting anyone in IT in on the “secret.”

      In brief

      The image contains a picture of a man appearing to be overwhelmed.

      Imagine working for a media company as an infrastructure capacity manager. Now imagine that the powers that be have decided to launch a content-focused web service. Seems like something they would do, right? Now imagine you find out about it the same way the company’s subscribers do. This actually happened – and it shouldn’t have. But a similar lack of alignment makes this a real possibility for any organization. If you don’t establish a systematic plan for soliciting and incorporating business requirements, prepare to lose a chunk of your free time. The business should never be able to say, in response to “nobody tells me anything,” “nobody asked.”

      Pictured: an artist’s rendering of the capacity manager in question.

      Directly solicit requirements from the business

      3.2a 30 minutes per stakeholder

      Once you’ve established, firmly, that everyone’s on the same team, meet individually with the stakeholders to assess capacity.

      Instructions

      1. Schedule a one-on-one meeting with each line of business manager (stakeholders identified in 3.1). Ideally this will be recurring.
      • Experienced capacity managers suggest doing this monthly.
    • In the meeting address the following questions:
      • What are some upcoming major initiatives?
      • Is the department going to expand or contract in a noticeable way?
      • Have customers taken to a particular product more than others?
    • Include the schedule in the Capacity Plan Template, and consider including details of the discussion in the notes section in tab 3 of the Capacity Snapshot Tool.
    • Input

      • Stakeholder opinions

      Output

      • Business requirements

      Materials

      • Whiteboard
      • Markers

      Participants

      • Capacity manager
      • Infrastructure staff

      Info-Tech Insight

      Sometimes line of business managers will evade or ignore you when you come knocking. They do this because they don’t know and they don’t want to give you the wrong information. Explain that a best guess is all you can ask for and allay their fears.

      Below, you will find more details about what to look for when soliciting information from the line of business manager you’ve roped into your scheme.

      1. Consider the following:
      • Projected sales pipeline
      • Business growth
      • Seasonal cycles
      • Marketing campaigns
      • New applications and features
      • New products and services
    • Encourage business stakeholders to give you their best guess for elements such as projected sales or business growth.
    • Estimate variance and provide a range. What can you expect at the low end? The high end? Record your historical projections for an idea of how accurate you are.
    • Consider carefully the infrastructure impact of new features (and record this in the notes section of the Capacity Snapshot Tool).
    • Directly solicit requirements from the business (optional)

      3.2a 1 hour

      IT staff and line of business staff come with different skillsets. This can lead to confusion, but it doesn’t have to. Develop effective information solicitation techniques.

      Instructions

      1. Gather your IT staff in a room with a whiteboard. As a group, select a gold service/line of business manager you would like to use as a “practice dummy.”
      2. Have everyone write down a question they would ask of the line of business representative in a hypothetical business/service capacity discussion.
      3. As a group discuss the merits of the questions posed:
      • Are they likely to yield productive information?
      • Are they too vague or specific?
      • Is the person in question likely to know the answer?
      • Is the information requested a guarded trade secret?
    • Discuss the findings and include any notes in section 3 of the Capacity Plan Template.
    • Input

      • Workshop participants’ ideas

      Output

      • Interview skills

      Materials

      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • Capacity manager
      • Infrastructure staff

      Map business needs to technical requirements, and technical requirements to infrastructure requirements

      3.2b 5 hours

      When it comes to mapping technical requirements, IT alone has the ability to effectively translate business needs.

      Instructions

      1. Use your notes from stakeholder meetings to assess the impact of any changes on gold systems.
      2. For each system brainstorm with infrastructure staff (and any technical experts as necessary) about what the information gleaned from stakeholder discussions. Consider the following discussion points:
      • How has demand for the service been trending? Does it match what the business is telling us?
      • Have we had availability issues in the past?
      • Has the business been right with their estimates in the past?
    • Estimate what a change in business/service metrics means for capacity.
      • E.g. how much RAM does a new email user require?
    • Record the output in the summary card of the Capacity Plan Template.
    • Input

      • Business needs

      Output

      • Technical and infrastructure requirements

      Materials

      • Whiteboard
      • Markers

      Participants

      • Capacity manager
      • Infrastructure staff

      Info-Tech Insight

      Adapt the analysis to the needs of your organization. One capacity manager called the one-to-one mapping of business process to infrastructure demand the Holy Grail of capacity management. If this level of precision isn’t attainable, develop your own working estimates using the higher-level data

      Avoid putting too much faith in the cloud as a solution to your problem

      Has the rise of on-demand, functionally unlimited services eliminated the need for capacity and availability management?

      Capacity management

      The role of the capacity manager is changing, but it still has a purpose. Consider this:

      • Not everything can move to the cloud. For security/functionality reasons, on-premises infrastructure will continue to exist.
      • Cost management is more relevant than ever in the cloud age. Manage your instances.
      • While a cloud migration might render some component capacity management functions irrelevant, it could increase the relevance of others (the network, perhaps).

      Availability management

      Ensuring services are available is still IT’s wheelhouse, even if that means a shift to a brokerage model:

      • Business availability requirements (as part of the business impact analysis, potentially) are important; internal SLAs and contracts with vendors need to be managed.
      • Even in the cloud environment, availability is not guaranteed. Cloud providers have outages (unplanned, maintenance related, etc.) and someone will have to understand the limitations of cloud services and the impact on availability.

      Info-Tech Insight

      The cloud comes at the cost of detailed performance data. Sourcing a service through an SLA with a third party increases the need to perform your own performance testing of gold level applications. See performance monitoring.

      Beware Parkinson’s law

      A consequence of our infinite capacity for creativity, people have the enviable skill of making work. In 1955, C. Northcote Parkinson pointed out this fact in The Economist . What are the implications for capacity management?

      "It is a commonplace observation that work expands so as to fill the time available for its completion. Thus, an elderly lady of leisure can spend the entire day in writing and despatching a postcard to her niece at Bognor Regis. An hour will be spent in finding the postcard, another in hunting for spectacles, half-an-hour in a search for the address, an hour and a quarter in composition, and twenty minutes in deciding whether or not to take an umbrella when going to the pillar-box in the next street."

      C. Northcote Parkinson, The Economist, 1955

      Info-Tech Insight

      If you give people lots of capacity, they will use it. Most shops are overprovisioned, and in some cases that’s throwing perfectly good money away. Don’t be afraid to prod if someone requests something that doesn’t seem right.

      Optimally align demand and capacity

      When it comes to managing your capacity, look for any additional efficiencies.

      Questions to ask:

      • Are there any infrastructure services that are not being used to their full potential, sitting idle, or allocated to non-critical or zombie functions?
        • Are you managing your virtual servers? If, for example, you experience a seasonal spike in demand, are you leaving virtual machines running after the fact?
      • Do your organization’s policies and your infrastructure setup allow for the use of development resources for production during periods of peak demand?
      • Can you make organizational or process changes in order to satisfy demand more efficiently?

      In brief

      Who isn’t a sports fan? Big games mean big stakes for pool participants and armchair quarterbacks—along with pressure on the network as fans stream games from their work computers. One organization suffered from this problem, and, instead of taking a hardline and banning all streams, opted to stream the game on a large screen in a conference room where those interested could work for its duration. This alleviated strain on the network and kept staff happy.

      Shutting off an idle cloud to cut costs

      CASE STUDY

      Industry:Professional Services

      Source:Interview

      24/7 AWS = round-the-clock costs

      A senior developer realized that his development team had been leaving AWS instances running without any specific reason.

      Why?

      The development team appreciated the convenience of an always-on instance and, because the people spinning them up did not handle costs, the problem wasn’t immediately apparent.

      Resolution

      In his spare time over the course of a month, the senior developer wrote a program to manage the servers, including shutting them down during times when they were not in use and providing remote-access start-up when required. His team alone saved $30,000 in costs over the next six months, and his team lead reported that it would have been more than worth paying the team to implement such a project on company time.

      Identify inefficiencies in order to remediate them

      3.2c 20 minutes per service

      Instructions

      1. Gather the infrastructure team together and discuss existing capacity and demand. Use the inputs from your data analysis and stakeholder meetings to set the stage for your discussion.
      2. Solicit ideas about potential inefficiencies from your participants:
      • Are VMs effectively allocated? If you need 7 VMs to address a spike, are those VMs being reallocated post-spike?
      • Are developers leaving instances running in the cloud?
      • Are particular services massively overprovisioned?
      • What are the biggest infrastructure line items? Are there obvious opportunities for cost reduction there?
    • Record any potential opportunities in the summary of the Capacity Plan Template.
    • Input

      • Gold systems
      • Data inputs

      Output

      • Inefficiencies

      Materials

      • Whiteboard
      • Markers

      Participants

      • Capacity manager
      • Infrastructure staff

      Info-Tech Insight

      The most effective capacity management takes a holistic approach and looks at the big picture in order to find ways to eliminate unnecessary infrastructure usage, or to find alternate or more efficient sources of required capacity.

      Dodging the toll troll by rerouting traffic

      CASE STUDY

      Industry:Telecommunications

      Source: Interview

      High-cost lines

      The capacity manager at a telecommunications provider mapped out his firm’s network traffic and discovered they were using a number of VP circuits (inter building cross connects) that were very expensive on the scale of their network.

      Paying the toll troll

      These VP circuits were supplying needed network services to the telecom provider’s clients, so there was no way to reduce this demand.

      Resolution

      The capacity manager analyzed where the traffic was going and compared this to the cost of the lines they were using. After performing the analysis, he found he could re-route much of the traffic away from the VP circuits and save on costs while delivering the same level of service to their users.

      Compare the data across business, component, and service levels, and project your capacity needs

      3.2d 2 hour session/meeting

      Make informed decisions about capacity. Remember: retain all documentation. It might come in handy for the justification of purchases.

      Instructions

      1. Using either a dedicated tool or generic spreadsheet software like Excel or Sheets, evaluate capacity trends. Ask the following questions:
      • Are there times when application performance degraded, and the service level was disrupted?
      • Are there times when certain components or systems neared, reached, or exceeded available capacity?
      • Are there seasonal variations in demand?
      • Are there clear trends, such as ongoing growth of business activity or the usage of certain applications?
      • What are the ramifications of trends or patterns in relation to infrastructure capacity?
    • Use the insight gathered from stakeholders during the stakeholder meetings, project required capacity for the critical components of each gold service.
    • Record the results of this activity in the summary card of the Capacity Plan Template.
    • Compare current capacity to your projections

      3.2e Section 5 of the Capacity Plan Template

      Capacity management (and, by extension, availability management) is a combination of two balancing acts: cost against capacity and supply and demand.*

      Instructions

      1. Compare your projections with your reality. You already know whether or not you have enough capacity given your lead times. But do you have too much? Compare your sub-component capacity projections to your current state.
      2. Highlight any outliers. Is there a particular service that is massively overprovisioned?
      3. Evaluate the reasons for the overprovisioning.
      • Is the component critically important?
      • Did you get a great deal on hardware?
      • Is it an oversight?
    • Record the results in the notes section of the summary card of the Capacity Plan Template.
    • *Office of Government Commerce 2001, 119.

      In brief

      The fractured nature of the capacity management space means that every organization is going to have a slightly different tooling strategy. No vendor has dominated, and every solution requires some level of customization. One capacity manager (a cloud provider, no less!) relayed a tale about a capacity management Excel sheet programmed with 5,000+ lines of code. As much work as that is, a bespoke solution is probably unavoidable.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

      The image contains a picture of an Info-Tech analyst.

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.2

      The image contains a screenshot of activity 3.2.

      Map business needs to technical requirements and technical requirements to infrastructure requirements

      The analyst will guide workshop participants in using their organization’s data to map out the relationships between applications, technical requirements, and the underlying infrastructure usage.

      Phase 3 Guided Implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Solicit and incorporate business needs

      Proposed Time to Completion: 2 weeks

      Step 3.1: Solicit business needs and gather data

      Review your findings with an analyst

      Discuss the effectiveness of your strategies to involve business stakeholders in the planning process and your methods of data collection and analysis.

      Then complete these activities…

      • Analyze historical trends and track your services’ status
      • Build a list of key business stakeholders
      • Bake stakeholders into the planning process

      With these tools & templates:

      Capacity Plan Template

      Step 3.2: Analyze data and project future needs

      Review your findings with an analyst

      Discuss the effectiveness of your strategies to involve business stakeholders in the planning process and your methods of data collection and analysis.

      Then complete these activities…

      • Map business needs to technical requirements and technical requirements to infrastructure requirements
      • Compare the data across business, component, and service levels, and project your capacity needs
      • Compare current capacity to your projections

      With these tools & templates:

      Capacity Snapshot Tool

      Capacity Plan Template

      Phase 3 Results & Insights:

      • Develop new business processes that more closely align your role with business stakeholders. Building these relationships takes hard work, and won’t happen overnight.
      • Take a holistic approach to eliminate unnecessary infrastructure usage or source capacity more efficiently.

      PHASE 4

      Identify and Mitigate Risks

      Step 4.1: Identify and mitigate risks

      This step will walk you through the following activities:

      • Identify potential risks.
      • Determine strategies to mitigate risks.
      • Complete your capacity management plan.

      This involves the following participants:

      • Capacity manager
      • Infrastructure team members
      • Business stakeholders

      Outcomes of this step

      • Strategies for reducing risks
      • Capacity management plan

      Understand what happens when capacity/availability management fails

      1. Services become unavailable. If availability and capacity management are not constantly practiced, an inevitable consequence is downtime or a reduction in the quality of that service. Critical sub-component failures can knock out important systems on their own.
      2. Money is wasted. In response to fears about availability, it’s entirely possible to massively overprovision or switch entirely to a pay-as-you-go model. This, unfortunately, brings with it a whole host of other problems, including overspending. Remember: infinite capacity means infinite potential cost.
      3. IT remains reactive and is unable to contribute more meaningfully to the organization. If IT is constantly putting out capacity/availability-related fires, there is no room for optimization and activities to increase organizational maturity. Effective availability and capacity management will allow IT to focus on other work.

      Mitigate availability and capacity risks

      Availability: how often a service is usable (that is to say up and not too degraded to be effective). Consequences of reduced availability can include financial losses, impacted customer goodwill, and reduced faith in IT more generally.

      Causes of availability issues:

      • Poor capacity management – a service becomes unavailable when there is insufficient supply to meet demand. This is the result of poor capacity management.
      • Scheduled maintenance – services go down for maintenance with some regularity. This needs to be baked into service-level negotiations with vendors.
      • Vendor outages – sometimes vendors experience unplanned outages. There is typically a contract provision that covers unplanned outages, but that doesn’t change the fact that your service will be interrupted.

      Capacity: a particular component’s/service’s/business’ wiggle room. In other words, its usage ceiling.

      Causes of capacity issues:

      • Poor demand management – allowing users to run amok without any regard for how capacity is sourced and paid for.
      • Massive changes in legitimate demand – more usage means more demand.
      • Poor capacity planning – predictable changes in demand that go unaddressed can lead to capacity issues.

      Add additional potential causes of availability and capacity risks as needed

      4.1a 30 minutes

      Availability and capacity issues can stem from a number of different causes. Include a list in your availability and capacity management plan.

      Instructions

      1. Gather the group together. Go around the room and have participants provide examples of incidents and problems that have been the result of availability and capacity issues.
      2. Pose questions to the group about the source of those availability and capacity issues.
      • What could have been done differently to avoid these issues?
      • Was the availability/capacity issue a result of a faulty internal/external SLA?
    • Record the results of the exercise in sections 4.1 and 4.2 of the Capacity Plan Template.
    • Input

      • Capacity Snapshot Tool results

      Output

      • Additional sources of availability and capacity risks

      Materials

      • Capacity Plan Template

      Participants

      • Capacity manager
      • Infrastructure staff

      Info-Tech Insight

      Availability and capacity problems result in incidents, critical incidents, and problems. These are addressed in a separate project (incident and problem management), but information about common causes can streamline that process.

      Identify capacity risks and mitigate them

      4.1b 30 minutes

      Based on your understanding of your capacity needs (through written SLAs and informal but regular meetings with the business) highlight major risks you foresee.

      Instructions

      1. Make a chart with two columns on a whiteboard. They should be labelled “risk” and “mitigation” respectively.
      2. Record risks to capacity you have identified in earlier activities.
      • Refer to the Capacity Snapshot Tool for components that are highlighted in red and yellow. These are specific components that present special challenges. Identify the risk(s) in as much detail as possible. Include service and business risks as well.
      • Examples: a marketing push will put pressure on the web server; a hiring push will require more Office 365 licenses; a downturn in registration will mean that fewer VMs will be required to run the service.

      Input

      • Capacity Snapshot Tool results

      Output

      • Inefficiencies

      Materials

      • Whiteboard
      • Markers

      Participants

      • Capacity manager
      • Infrastructure staff

      Info-Tech Insight

      It’s an old adage, but it checks out: don’t come to the table armed only with problems. Be a problem solver and prove IT’s value to the organization.

      Identify capacity risks and mitigate them (cont.)

      4.1b 1.5 hours

      Instructions (cont.)

      1. Begin developing mitigation strategies. Options for responding to known capacity risks fall into one of two camps:
      • Acceptance: responding to the risk is costlier than acknowledging its existence without taking any action. For gold systems, acceptance is typically not acceptable.
      • Mitigation: limiting/reducing, eliminating, or transferring risk (Herrera) comprise the sort of mitigation discussed here.
        • Limiting/reducing: taking steps to improve the capacity situation, but accepting some level of risk (spinning up a new VM, pushing back on demands from the business, promoting efficiency).
        • Eliminating: the most comprehensive (and most expensive) mitigation strategy, elimination could involve purchasing a new server or, at the extreme end, building a new datacenter.
        • Transfer: “robbing Peter to pay Paul,” in the words of capacity manager Todd Evans, is one potential way to limit your exposure. Is there a less critical service that can be sacrificed to keep your gold service online?
    • Record the results of this exercise in section 5 of the Capacity Plan Template.
    • Input

      • Capacity Snapshot Tool results

      Output

      • Capacity risk mitigations

      Materials

      • Whiteboard
      • Markers

      Participants

      • Capacity manager
      • Infrastructure staff

      Info-Tech Insight

      It’s an old adage, but it checks out: don’t come to the table armed only with problems. Be a problem solver and prove IT’s value to the organization.

      Identify availability risks and mitigate them

      4.1c 30 minutes

      While capacity management is a form of availability management, it is not the only form. In this activity, outline the specific nature of threats to availability.

      Instructions

      1. Make a chart with two columns on a whiteboard. They should be labelled “risk” and “mitigation” respectively.
      2. Begin brainstorming general availability risks based on the following sources of information/categories:
      • Vendor outages
      • Disaster recovery
      • Historical availability issues

      The image contains a large blue circle labelled: Availability. Also in the blue circle is a small red circle labelled: Capacity.

      Input

      • Capacity Snapshot Tool results

      Output

      • Availability risks and mitigations

      Materials

      • Whiteboard
      • Markers

      Participants

      • Capacity manager
      • Infrastructure staff

      Info-Tech Best Practice

      A dynamic central repository is a good way to ensure that availability issues stemming from a variety of causes are captured and mitigated.

      Identify availability risks and mitigate them (cont.)

      4.1c 1.5 hours

      Although it is easier said than done, identifying potential mitigations is a crucial part of availability management as an activity.

      Instructions (cont.)

      1. Begin developing mitigation strategies. Options for responding to known capacity risks fall into one of two camps:
      • Acceptance – responding to the risk is costlier than taking it on. Some unavailability is inevitable, between maintenance and unscheduled downtime. Record this, though it may not require immediate action.
      • Mitigation strategies:
        • Limiting/reducing – taking steps to increase availability of critical systems. This could include hot spares for unreliable systems or engaging a new vendor.
        • Eliminating – the most comprehensive (and most expensive) mitigation strategy. It could include selling.
        • Transfer – “robbing Peter to pay Paul,” in the words of capacity manager Todd Evans, is one potential way to limit your exposure. Is there a less critical service that can be sacrificed to keep your gold service online?
    • Record the results of this exercise in section 5 of Capacity Plan Template.
    • Input

      • Capacity Snapshot Tool results

      Output

      • Availability risks and mitigations

      Materials

      • Whiteboard
      • Markers

      Participants

      • Capacity manager
      • Infrastructure staff

      Iterate on the process and present your completed availability and capacity management plan

      The stakeholders consulted as part of the process will be interested in its results. Share them, either in person or through a collaboration tool.

      The current status of your availability and capacity management plan should be on the agenda for every stakeholder meeting. Direct the stakeholders’ attention to the parts of the document that are relevant to them, and solicit their thoughts on the document’s accuracy. Over time you should get a pretty good idea of who among your stakeholder group is skilled at projecting demand, and who over- or underestimates, and by how much. This information will improve your projections and, therefore, your management over time.

      Info-Tech Insight

      Use the experience gained and the artifacts generated to build trust with the business. The meetings should be regular, and demonstrating that you’re actually using the information for good is likely to make hesitant participants in the process more likely to open up.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

      The image contains a picture of an Info-Tech analyst.

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      4.1

      The image contains a screenshot of activity 4.1.

      Identify capacity risks and mitigate them

      The analyst will guide workshop participants in identifying potential risks to capacity and determining strategies for mitigating them.

      Phase 4 Guided Implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Identify and mitigate risks

      Proposed Time to Completion: 1 week

      Step 4.1: Identify and mitigate risks

      Review your findings with an analyst

      • Discuss your potential risks and your strategies for mitigating those risks.

      Then complete these activities…

      • Identify capacity risks and mitigate them
      • Identify availability risks and mitigate them
      • Complete your capacity management plan

      With these tools & templates:

      Capacity Snapshot Tool

      Capacity Plan Template

      Phase 4 Results & Insights:

      • Be a problem solver and prove IT’s value to the organization. Capacity management allows infrastructure to drive business value.
      • Iterate and share results. Reinforce your relationships with stakeholders and continue to refine how capacity management transforms your organization’s business processes.

      Insight breakdown

      Insight 1

      Components are critical to availability and capacity management.

      The CEO doesn’t care about the SMTP server. She cares about meeting customer needs and producing profit. For IT capacity and availability managers, though, the devil is in the details. It only takes one faulty component to knock out a service. Keep track and keep the lights on.

      Insight 2

      Ask what the business is working on, not what they need.

      If you ask them what they need, they’ll tell you – and it won’t be cheap. Find out what they’re going to do, and use your expertise to service those needs. Use your IT experience to estimate the impact of business and service level changes on the components that secure the availability you need.

      Insight 3

      Cloud shmoud.

      The role of the capacity manager might be changing with the advent of the public cloud, but it has not disappeared. Capacity managers in the age of the cloud are responsible for managing vendor relationships, negotiating external SLAs, projecting costs and securing budgets, reining in prodigal divisions, and so on.

      Summary of accomplishment

      Knowledge Gained

      • Impact of downtime on the organization
      • Gold systems
      • Key dependencies and sub-components
      • Strategy for monitoring components
      • Strategy for soliciting business needs
      • Projected capacity needs
      • Availability and capacity risks and mitigations

      Processes Optimized

      • Availability management
      • Capacity management

      Deliverables Completed

      • Business Impact Analysis
      • Capacity Plan Template

      Project step summary

      Client Project: Develop an Availability and Capacity Management Plan

      1. Conduct a business impact analysis
      2. Assign criticality ratings to services
      3. Define your monitoring strategy
      4. Implement your monitoring tool/aggregator
      5. Solicit business needs and gather data
      6. Analyze data and project future needs
      7. Identify and mitigate risks

      Info-Tech Insight

      This project has the ability to fit the following formats:

      • Onsite workshop by Info-Tech Research Group consulting analysts.
      • Do-it-yourself with your team.
      • Remote delivery via Info-Tech Guided Implementation.

      Research contributors and experts

      The image contains a picture of Adrian Blant.

      Adrian Blant, Independent Capacity Consultant, IT Capability Solutions

      Adrian has over 15 years' experience in IT infrastructure. He has built capacity management business processes from the ground up, and focused on ensuring a productive dialogue between IT and the business.

      The image contains a picture of James Zhang.

      James Zhang, Senior Manager Disaster Recovery, AIG Technology

      James has over 20 years' experience in IT and 10 years' experience in capacity management. Throughout his career, he has focused on creating new business processes to deliver value and increase efficiency over the long term.

      The image contains a picture of Mayank Banerjee.

      Mayank Banerjee, CTO, Global Supply Chain Management, HelloFresh

      Mayank has over 15 years' experience across a wide range of technologies and industries. He has implemented highly automated capacity management processes as part of his role of owning and solving end-to-end business problems.

      The image contains a picture of Mike Lynch

      Mike Lynch, Consultant, CapacityIQ

      Mike has over 20 years' experience in IT infrastructure. He takes a holistic approach to capacity management to identify and solve key problems, and has developed automated processes for mapping performance data to information that can inform business decisions.

      The image contains a picture of Paul Waguespack.

      Paul Waguespack, Manager of Application Systems Engineering, Tufts Health Plan

      Paul has over 10 years' experience in IT. He has specialized in implementing new applications and functionalities throughout their entire lifecycle, and integrating with all aspects of IT operations.

      The image contains a picture of Richie Mendoza.

      Richie Mendoza, IT Consultant, SMITS Inc.

      Richie has over 10 years' experience in IT infrastructure. He has specialized in using demand forecasting to guide infrastructure capacity purchasing decisions, to provide availability while avoiding costly overprovisioning.

      The image contains a picture of Rob Thompson.

      Rob Thompson, President, IT Tools & Process

      Rob has over 30 years’ IT experience. Throughout his career he has focused on making IT a generator of business value. He now runs a boutique consulting firm.

      Todd Evans, Capacity and Performance Management SME, IBM

      Todd has over 20 years' experience in capacity and performance management. At Kaiser Permanente, he established a well-defined mapping of the businesses workflow processes to technical requirements for applications and infrastructure.

      Bibliography

      451 Research. “Best of both worlds: Can enterprises achieve both scalability and control when it comes to cloud?” 451 Research, November 2016. Web.

      Allen, Katie. “Work Also Shrinks to Fit the Time Available: And We Can Prove It.” The Guardian. 25 Oct. 2017.

      Amazon. “Amazon Elastic Compute Cloud.” Amazon Web Services. N.d. Web.

      Armandpour, Tim. “Lies Vendors Tell about Service Level Agreements and How to Negotiate for Something Better.” Network World. 12 Jan 2016.

      “Availability Management.” ITIL and ITSM World. 2001. Web.

      Availability Management Plan Template. Purple Griffon. 30 Nov. 2012. Web.

      Bairi, Jayachandra, B., Murali Manohar, and Goutam Kumar Kundu. “Capacity and Availability Management by Quantitative Project Management in the IT Service Industry.” Asian Journal on Quality 13.2 (2012): 163-76. Web.

      BMC Capacity Optimization. BMC. 24 Oct 2017. Web.

      Brooks, Peter, and Christa Landsberg. Capacity Management in Today’s IT Environment. MentPro. 16 Aug 2017. Web.

      "Capacity and Availability Management." CMMI Institute. April 2017. Web.

      Capacity and Availability Management. IT Quality Group Switzerland. 24 Oct. 2017. Web.

      Capacity and Performance Management: Best Practices White Paper. Cisco. 4 Oct. 2005. Web.

      "Capacity Management." Techopedia.

      “Capacity Management Forecasting Best Practices and Recommendations.” STG. 26 Jan 2015. Web.

      Capacity Management from the Ground up. Metron. 24 Oct. 2017. Web.

      Capacity Management in the Modern Datacenter. Turbonomic. 25 Oct. 2017. Web.

      Capacity Management Maturity Assessing and Improving the Effectiveness. Metron. 24 Oct. 2017. Web.

      “Capacity Management Software.” TeamQuest. 24 Oct 2017. Web,

      Capacity Plan Template. Purainfo. 11 Oct 2012. Web.

      “Capacity Planner—Job Description.” Automotive Industrial Partnership. 24 Oct. 2017. Web.

      Capacity Planning. CDC. Web. Aug. 2017.

      "Capacity Planning." TechTarget. 24 Oct 2017. Web.

      “Capacity Planning and Management.” BMC. 24 Oct 2017. Web.

      "Checklist Capacity Plan." IT Process Wiki. 24 Oct. 2017. Web.

      Dykes, Brent. “Actionable Insights: The Missing Link Between Data and Business Value.” Forbes. April 26, 2016. Web.

      Evolved Capacity Management. CA Technologies. Oct. 2013. Web.

      Francis, Ryan. “False positives still cause threat alert fatigue.” CSO. May 3, 2017. Web.

      Frymire, Scott. "Capacity Planning vs. Capacity Analytics." ScienceLogic. 24 Oct. 2017. Web.

      Glossary. Exin. Aug. 2017. Web.

      Herrera, Michael. “Four Types of Risk Mitigation and BCM Governance, Risk and Compliance.” MHA Consulting. May 17, 2013.

      Hill, Jon. How to Do Capacity Planning. TeamQuest. 24 Oct. 2017. Web.

      “How to Create an SLA in 7 Easy Steps.” ITSM Perfection. 25 Oct. 2017. Web.

      Hunter, John. “Myth: If You Can’t Measure It: You Can’t Manage It.” W. Edwards Deming Institute Blog. 13 Aug 2015. Web.

      IT Service Criticality. U of Bristol. 24 Oct. 2017. Web.

      "ITIL Capacity Management." BMC's Complete Guide to ITIL. BMC Software. 22 Dec. 2016. Web.

      “Just-in-time.” The Economist. 6 Jul 2009. Web.

      Kalm, Denise P., and Marv Waschke. Capacity Management: A CA Service Management Process Map. CA. 24 Oct. 2017. Web.

      Klimek, Peter, Rudolf Hanel, and Stefan Thurner. “Parkinson’s Law Quantified: Three Investigations in Bureaucratic Inefficiency.” Journal of Statistical Mechanics: Theory and Experiment 3 (2009): 1-13. Aug. 2017. Web.

      Landgrave, Tim. "Plan for Effective Capacity and Availability Management in New Systems." TechRepublic. 10 Oct. 2002. Web.

      Longoria, Gina. “Hewlett Packard Enterprise Goes After Amazon Public Cloud in Enterprise Storage.” Forbes. 2 Dec. 2016. Web.

      Maheshwari, Umesh. “Understanding Storage Capacity.” NimbleStorage. 7 Jan. 2016. Web.

      Mappic, Sandy. “Just how complex can a Login Transaction be? Answer: Very!” Appdynamics. Dec. 11 2011. Web.

      Miller, Ron. “AWS Fires Back at Larry Ellison’s Claims, Saying It’s Just Larry Being Larry.” Tech Crunch. 2 Oct. 2017. Web.

      National College for Teaching & Leadership. “The role of data in measuring school performance.” National College for Teaching & Leadership. N.d. Web,

      Newland, Chris, et al. Enterprise Capacity Management. CETI, Ohio State U. 24 Oct. 2017. Web.

      Office of Government Commerce . Best Practice for Service Delivery. London: Her Majesty’s Stationery Office, 2001.

      Office of Government Commerce. Best Practice for Business Perspective: The IS View on Delivering Services to the Business. London: Her Majesty’s Stationery Office, 2004.

      Parkinson, C. Northcote. “Parkinson’s Law.” The Economist. 19 Nov. 1955. Web.

      “Parkinson’s Law Is Proven Again.” Financial Times. 25 Oct. 2017. Web.

      Paul, John, and Chris Hayes. Performance Monitoring and Capacity Planning. VM Ware. 2006. Web.

      “Reliability and Validity.” UC Davis. N.d. Web.

      "Role: Capacity Manager." IBM. 2008. Web.

      Ryan, Liz. “‘If You Can’t Measure It, You Can’t Manage It’: Not True.” Forbes. 10 Feb. 2014. Web.

      S, Lalit. “Using Flexible Capacity to Lower and Manage On-Premises TCO.” HPE. 23 Nov. 2016. Web.

      Snedeker, Ben. “The Pros and Cons of Public and Private Clouds for Small Business.” Infusionsoft. September 6, 2017. Web.

      Statement of Work: IBM Enterprise Availability Management Service. IBM. Jan 2016. Web.

      “The Road to Perfect AWS Reserved Instance Planning & Management in a Nutshell.” Botmetric. 25 Oct. 2017. Web.

      Transforming the Information Infrastructure: Build, Manage, Optimize. Asigra. Aug. 2017. Web.

      Valentic, Branimir. "Three Faces of Capacity Management." ITIL/ISO 20000 Knowledge Base. Advisera. 24 Oct. 2017. Web.

      "Unify IT Performance Monitoring and Optimization." IDERA. 24 Oct. 2017. Web.

      "What is IT Capacity Management?" Villanova U. Aug. 2017. Web.

      Wolstenholme, Andrew. Final internal Audit Report: IT Availability and Capacity (IA 13 519/F). Transport For London. 23 Feb. 2015. Web.

      Mergers & Acquisitions: The Buy Blueprint

      • Buy Link or Shortcode: {j2store}325|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: 5 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy

      There are four key scenarios or entry points for IT as the acquiring organization in M&As:

      • IT can suggest an acquisition to meet the business objectives of the organization.
      • IT is brought in to strategy plan the acquisition from both the business’ and IT’s perspectives.
      • IT participates in due diligence activities and valuates the organization potentially being acquired.
      • IT needs to reactively prepare its environment to enable the integration.

      Consider the ideal scenario for your IT organization.

      Our Advice

      Critical Insight

      Acquisitions are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:

      • The growing trend for organizations to increase, decrease, or evolve through these types of transactions.
      • A maturing business perspective of IT, preventing the difficulty that IT is faced with when invited into the transaction process late.
      • Transactions that are driven by digital motivations, requiring IT’s expertise.
      • There never being such a thing as a true merger, making the majority of M&A activity either acquisitions or divestitures.

      Impact and Result

      Prepare for a growth/integration transaction by:

      • Recognizing the trend for organizations to engage in M&A activity and the increased likelihood that, as an IT leader, you will be involved in a transaction in your career.
      • Creating a standard strategy that will enable strong program management.
      • Properly considering all the critical components of the transaction and integration by prioritizing tasks that will reduce risk, deliver value, and meet stakeholder expectations.

      Mergers & Acquisitions: The Buy Blueprint Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how your organization can excel its growth strategy by engaging in M&A transactions. Review Info-Tech’s methodology and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Proactive Phase

      Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.

      • One-Pager: M&A Proactive
      • Case Study: M&A Proactive
      • Information Asset Audit Tool
      • Data Valuation Tool
      • Enterprise Integration Process Mapping Tool
      • Risk Register Tool
      • Security M&A Due Diligence Tool

      2. Discovery & Strategy

      Create a standardized approach for how your IT organization should address acquisitions.

      • One-Pager: M&A Discovery & Strategy – Buy
      • Case Study: M&A Discovery & Strategy – Buy

      3. Due Diligence & Preparation

      Evaluate the target organizations to minimize risk and have an established integration project plan.

      • One-Pager: M&A Due Diligence & Preparation – Buy
      • Case Study: M&A Due Diligence & Preparation – Buy
      • IT Due Diligence Charter
      • Technical Debt Business Impact Analysis Tool
      • IT Culture Diagnostic
      • M&A Integration Project Management Tool (SharePoint)
      • SharePoint Template: Step-by-Step Deployment Guide
      • M&A Integration Project Management Tool (Excel)
      • Resource Management Supply-Demand Calculator

      4. Execution & Value Realization

      Deliver on the integration project plan successfully and communicate IT’s transaction value to the business.

      • One-Pager: M&A Execution & Value Realization – Buy
      • Case Study: M&A Execution & Value Realization – Buy

      Infographic

      Workshop: Mergers & Acquisitions: The Buy Blueprint

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Pre-Transaction Discovery & Strategy

      The Purpose

      Establish the transaction foundation.

      Discover the motivation for acquiring.

      Formalize the program plan.

      Create the valuation framework.

      Strategize the transaction and finalize the M&A strategy and approach.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Set up crucial elements to facilitate the success of the transaction.

      Have a repeatable transaction strategy that can be reused for multiple organizations.

      Activities

      1.1 Conduct the CIO Business Vision and CEO-CIO Alignment Diagnostics.

      1.2 Identify key stakeholders and outline their relationship to the M&A process.

      1.3 Identify the rationale for the company's decision to pursue an acquisition.

      1.4 Assess the IT/digital strategy.

      1.5 Identify pain points and opportunities tied to the acquisition.

      1.6 Create the IT vision and mission statements and identify IT guiding principles and the transition team.

      1.7 Document the M&A governance.

      1.8 Establish program metrics.

      1.9 Create the valuation framework.

      1.10 Establish the integration strategy.

      1.11 Conduct a RACI.

      1.12 Create the communication plan.

      1.13 Prepare to assess target organization(s).

      Outputs

      Business perspectives of IT

      Stakeholder network map for M&A transactions

      Business context implications for IT

      IT’s acquiring strategic direction

      Governance structure

      M&A program metrics

      IT valuation framework

      Integration strategy

      RACI

      Communication plan

      Prepared to assess target organization(s)

      2 Mid-Transaction Due Diligence & Preparation

      The Purpose

      Establish the transaction foundation.

      Discover the motivation for integration.

      Assess the target organization(s).

      Create the valuation framework.

      Plan the integration roadmap.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Methodology identified to assess organizations during due diligence.

      Methodology can be reused for multiple organizations.

      Integration activities are planned and assigned.

      Activities

      2.1 Gather and evaluate the stakeholders involved, M&A strategy, future-state operating model, and governance.

      2.2 Review the business rationale for the acquisition.

      2.3 Establish the integration strategy.

      2.4 Create the due diligence charter.

      2.5 Create a list of IT artifacts to be reviewed in the data room.

      2.6 Conduct a technical debt assessment.

      2.7 Assess the current culture and identify the goal culture.

      2.8 Identify the needed workforce supply.

      2.9 Create the valuation framework.

      2.10 Establish the integration roadmap.

      2.11 Establish and align project metrics with identified tasks.

      2.12 Estimate integration costs.

      Outputs

      Stakeholder map

      IT strategy assessment

      IT operating model and IT governance structure defined

      Business context implications for IT

      Integration strategy

      Due diligence charter

      Data room artifacts

      Technical debt assessment

      Culture assessment

      Workforce supply identified

      IT valuation framework

      Integration roadmap and associated resourcing

      3 Post-Transaction Execution & Value Realization

      The Purpose

      Establish the transaction foundation.

      Discover the motivation for integration.

      Plan the integration roadmap.

      Prepare employees for the transition.

      Engage in integration.

      Assess the transaction outcomes.

      Key Benefits Achieved

      All major stakeholders are on the same page.

      Integration activities are planned and assigned.

      Employees are set up for a smooth and successful transition.

      Integration strategy and roadmap executed to benefit the organization.

      Review what went well and identify improvements to be made in future transactions.

      Activities

      3.1 Identify key stakeholders and determine IT transaction team.

      3.2 Gather and evaluate the M&A strategy, future-state operating model, and governance.

      3.3 Review the business rationale for the acquisition.

      3.4 Establish the integration strategy.

      3.5 Prioritize integration tasks.

      3.6 Establish the integration roadmap.

      3.7 Establish and align project metrics with identified tasks.

      3.8 Estimate integration costs.

      3.9 Assess the current culture and identify the goal culture.

      3.10 Identify the needed workforce supply.

      3.11 Create an employee transition plan.

      3.12 Create functional workplans for employees.

      3.13 Complete the integration by regularly updating the project plan.

      3.14 Begin to rationalize the IT environment where possible and necessary.

      3.15 Confirm integration costs.

      3.16 Review IT’s transaction value.

      3.17 Conduct a transaction and integration SWOT.

      3.18 Review the playbook and prepare for future transactions.

      Outputs

      M&A transaction team

      Stakeholder map

      IT strategy assessed

      IT operating model and IT governance structure defined

      Business context implications for IT

      Integration strategy

      Integration roadmap and associated resourcing

      Culture assessment

      Workforce supply identified

      Employee transition plan

      Employee functional workplans

      Updated integration project plan

      Rationalized IT environment

      SWOT of transaction

      M&A Buy Playbook refined for future transactions

      Further reading

      Mergers & Acquisitions: The Buy Blueprint

      For IT leaders who want to have a role in the transaction process when their business is engaging in an M&A purchase.

      EXECUTIVE BRIEF

      Analyst Perspective

      Don’t wait to be invited to the M&A table, make it.

      Photo of Brittany Lutes, Research Analyst, CIO Practice, Info-Tech Research Group.
      Brittany Lutes
      Research Analyst,
      CIO Practice
      Info-Tech Research Group
      Photo of Ibrahim Abdel-Kader, Research Analyst, CIO Practice, Info-Tech Research Group.
      Ibrahim Abdel-Kader
      Research Analyst,
      CIO Practice
      Info-Tech Research Group

      IT has always been an afterthought in the M&A process, often brought in last minute once the deal is nearly, if not completely, solidified. This is a mistake. When IT is brought into the process late, the business misses opportunities to generate value related to the transaction and has less awareness of critical risks or inaccuracies.

      To prevent this mistake, IT leadership needs to develop strong business relationships and gain respect for their innovative suggestions. In fact, when it comes to modern M&A activity, IT should be the ones suggesting potential transactions to meet business needs, specifically when it comes to modernizing the business or adopting digital capabilities.

      IT needs to stop waiting to be invited to the acquisition or divestiture table. IT needs to suggest that the table be constructed and actively work toward achieving the strategic objectives of the business.

      Executive Summary

      Your Challenge

      There are four key scenarios or entry points for IT as the acquiring organization in M&As:

      • IT can suggest an acquisition to meet the business objectives of the organization.
      • IT is brought in to strategy plan the acquisition from both the business’ and IT’s perspectives.
      • IT participates in due diligence activities and valuates the organization potentially being acquired.
      • IT needs to reactively prepare its environment to enable the integration.

      Consider the ideal scenario for your IT organization.

      Common Obstacles

      Some of the obstacles IT faces include:

      • IT is often told about the transaction once the deal has already been solidified and is now forced to meet unrealistic business demands.
      • The business does not trust IT and therefore does not approach IT to define value or reduce risks to the transaction process.
      • The people and culture element are forgotten or not given adequate priority.

      These obstacles often arise when IT waits to be invited into the transaction process and misses critical opportunities.

      Info-Tech's Approach

      Prepare for a growth/integration transaction by:

      • Recognizing the trend for organizations to engage in M&A activity and the increased likelihood that, as an IT leader, you will be involved in a transaction in your career.
      • Creating a standard strategy that will enable strong program management.
      • Properly considering all the critical components of the transaction and integration by prioritizing tasks that will reduce risk, deliver value, and meet stakeholder expectations.

      Info-Tech Insight

      As the number of merger, acquisition, and divestiture transactions continues to increase, so too does IT’s opportunity to leverage the growing digital nature of these transactions and get involved at the onset.

      The changing M&A landscape

      Businesses will embrace more digital M&A transactions in the post-pandemic world

      • When the pandemic occurred, businesses reacted by either pausing (61%) or completely cancelling (46%) deals that were in the mid-transaction state (Deloitte, 2020). The uncertainty made many organizations consider whether the risks would be worth the potential benefits.
      • However, many organizations quickly realized the pandemic is not a hindrance to M&A transactions but an opportunity. Over 16,000 American companies were involved in M&A transactions in the first six months of 2021 (The Economist). For reference, this had been averaging around 10,000 per six months from 2016 to 2020.
      • In addition to this transaction growth, organizations have increasingly been embracing digital. These trends increase the likelihood that, as an IT leader, you will engage in an M&A transaction. However, it is up to you when you get involved in the transactions.

      The total value of transactions in the year after the pandemic started was $1.3 billion – a 93% increase in value compared to before the pandemic. (Nasdaq)

      Virtual deal-making will be the preferred method of 55% of organizations in the post-pandemic world. (Wall Street Journal, 2020)

      Your challenge

      IT is often not involved in the M&A transaction process. When it is, it’s often too late.

      • The most important driver of an acquisition is the ability to access new technology (DLA Piper), and yet 50% of the time, IT isn’t involved in the M&A transaction at all (IMAA Institute, 2017).
      • Additionally, IT’s lack of involvement in the process negatively impacts the business:
        • Most organizations (60%) do not have a standardized approach to integration (Steeves and Associates).
        • Weak integration teams contribute to the failure of 70% of M&A integrations (The Wall Street Journal, 2019).
        • Less than half (47%) of organizations actually experience the positive results sought by the M&A transaction (Steeves and Associates).
      • Organizations pursuing M&A and not involving IT are setting themselves up for failure.

      Only half of M&A deals involve IT (Source: IMAA Institute, 2017)

      Common Obstacles

      These barriers make this challenge difficult to address for many organizations:

      • IT is rarely afforded the opportunity to participate in the transaction deal. When IT is invited, this often happens later in the process where integration will be critical to business continuity.
      • IT has not had the opportunity to demonstrate that it is a valuable business partner in other business initiatives.
      • One of the most critical elements that IT often doesn’t take the time or doesn’t have the time to focus on is the people and leadership component.
      • IT waits to be invited to the process rather then actively involving themselves and suggesting how value can be added to the process.

      In hindsight, it’s clear to see: Involving IT is just good business.

      47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion. (Source: IMAA Institute, 2017)

      40% of acquiring businesses discovered a cybersecurity problem at an acquisition.” (Source: Okta)

      Info-Tech's approach

      Acquisitions & Divestitures Framework

      Acquisitions and divestitures are inevitable in modern business, and IT’s involvement in the process should be too. This progression is inspired by:

      1. The growing trend for organizations to increase, decrease, or evolve through these types of transactions.
      2. Transactions that are driven by digital motivations, requiring IT’s expertise.
      3. A maturing business perspective of IT, preventing the difficulty that IT is faced with when invited into the transaction process late.
      4. There never being such a thing as a true merger, making the majority of M&A activity either acquisitions or divestitures.
      A diagram highlighting the 'IT Executives' Role in Acquisitions and Divestitures' when they are integrated at different points in the 'Core Business Timeline'. There are four main entry points 'Proactive', 'Discovery and Strategy', 'Due Diligence and Preparation', and 'Execution and Value Realized'. It is highlighted that IT can and should start at 'Proactive', but most organizations start at 'Execution and Value Realized'. 'Proactive': suggest opportunities to evolve the organization; prove IT's value and engage in growth opportunities early. Innovators start here. Steps of the business timeline in 'Proactive' are 'Organization strategies are defined' and 'M and A is considered to enable strategy'. After a buy or sell transaction is initiated is 'Discovery and Strategy': pre-transaction state. If it is a Buy transaction, 'Establish IT's involvement and approach'. If it is a Sell transaction, 'Prepare to engage in negotiations'. Business Partners start here. Steps of the business timeline in 'Discovery and Strategy' are 'Searching criteria is set', 'Potential candidates are considered', and 'LOI is sent/received'. 'Due Diligence and Preparation': mid-transaction state. If it is a Buy transaction, 'Identify potential transaction benefits and risks'. If it is a Sell transaction, 'Comply, communicate, and collaborate in transaction'. Trusted Operators start here. Steps of the business timeline in 'Due Diligence and Preparation' are 'Due diligence engagement occurs', 'Final agreement is reached', and 'Preparation for transaction execution occurs'. 'Execution and Value Realization': post-transaction state. If it is a Buy transaction, 'Integrate the IT environments and achieve business value'. If it is a Sell transaction, 'Separate the IT environment and deliver on transaction terms'. Firefighters start here. Steps of the business timeline in 'Execution and Value Realization' are 'Staff and operations are addressed appropriately', 'Day 1 of implementation and integration activities occurs', '1st 100 days of new entity state occur' and 'Ongoing risk mitigating and value creating activities occur'.

      The business’ view of IT will impact how soon IT can get involved

      There are four key entry points for IT

      A colorful visualization of the four key entry points for IT and a fifth not-so-key entry point. Starting from the top: 'Innovator', Information and Technology as a Competitive Advantage, 90% Satisfaction; 'Business Partner', Effective Delivery of Strategic Business Projects, 80% Satisfaction; 'Trusted Operator', Enablement of Business Through Application and Work Orders, 70% Satisfaction; 'Firefighter', Reliable Infrastructure and IT Service Desk, 60% Satisfaction; and then 'Unstable', Inability to Consistently Deliver Basic Services, <60% Satisfaction.
      1. Innovator: IT suggests an acquisition to meet the business objectives of the organization.
      2. Business Partner: IT is brought in to strategy plan the acquisition from both the business’ and IT’s perspective.
      3. Trusted Operator: IT participates in due diligence activities and valuates the organization potentially being acquired.
      4. Firefighter: IT reactively engages in the integration with little time to prepare.

      Merger, acquisition, and divestiture defined

      Merger

      A merger looks at the equal combination of two entities or organizations. Mergers are rare in the M&A space, as the organizations will combine assets and services in a completely equal 50/50 split. Two organizations may also choose to divest business entities and merge as a new company.

      Acquisition

      The most common transaction in the M&A space, where an organization will acquire or purchase another organization or entities of another organization. This type of transaction has a clear owner who will be able to make legal decisions regarding the acquired organization.

      Divestiture

      An organization may decide to sell partial elements of a business to an acquiring organization. They will separate this business entity from the rest of the organization and continue to operate the other components of the business.

      Info-Tech Insight

      A true merger does not exist, as there is always someone initiating the discussion. As a result, most M&A activity falls into acquisition or divestiture categories.

      Buying vs. selling

      The M&A process approach differs depending on whether you are the executive IT leader on the buy side or sell side

      This blueprint is only focused on the buy side:

      • More than two organizations could be involved in a transaction.
      • Examples of buy-related scenarios include:
        • Your organization is buying another organization with the intent of having the purchased organization keep its regular staff, operations, and location. This could mean minimal integration is required.
        • Your organization is buying another organization in its entirety with the intent of integrating it into your original company.
        • Your organization is buying components of another organization with the intent of integrating them into your original company.
      • As the purchasing organization, you will probably be initiating the purchase and thus will be valuating the selling organization during due diligence and leading the execution plan.

      The sell side is focused on:

      • Examples of sell-related scenarios include:
        • Your organization is selling to another organization with the intent of keeping its regular staff, operations, and location. This could mean minimal separation is required.
        • Your organization is selling to another organization with the intent of separating to be a part of the purchasing organization.
        • Your organization is engaging in a divestiture with the intent of:
          • Separating components to be part of the purchasing organization permanently.
          • Separating components to be part of a spinoff and establish a unit as a standalone new company.
      • As the selling organization, you could proactively seek out suitors to purchase all or components of your organization, or you could be approached by an organization.

      For more information on divestitures or selling your entire organization, check out Info-Tech’s Mergers & Acquisitions: The Sell Blueprint.

      Core business timeline

      For IT to be valuable in M&As, you need to align your deliverables and your support to the key activities the business and investors are working on.

      Info-Tech’s methodology for Buying Organizations in Mergers, Acquisitions, or Divestitures

      1. Proactive

      2. Discovery & Strategy

      3. Due Diligence & Preparation

      4. Execution & Value Realization

      Phase Steps

      1. Identify Stakeholders and Their Perspective of IT
      2. Assess IT’s Current Value and Future State
      3. Drive Innovation and Suggest Growth Opportunities
      1. Establish the M&A Program Plan
      2. Prepare IT to Engage in the Acquisition
      1. Assess the Target Organization
      2. Prepare to Integrate
      1. Execute the Transaction
      2. Reflection and Value Realization

      Phase Outcomes

      Be an innovative IT leader by suggesting how and why the business should engage in an acquisition or divestiture.

      Create a standardized approach for how your IT organization should address acquisitions.

      Evaluate the target organizations successfully and establish an integration project plan.

      Deliver on the integration project plan successfully and communicate IT’s transaction value to the business.

      Potential metrics for each phase

      1. Proactive

      2. Discovery & Strategy

      3. Due Diligence & Preparation

      4. Execution & Value Realization

      • % Share of business innovation spend from overall IT budget
      • % Critical processes with approved performance goals and metrics
      • % IT initiatives that meet or exceed value expectation defined in business case
      • % IT initiatives aligned with organizational strategic direction
      • % Satisfaction with IT's strategic decision-making abilities
      • $ Estimated business value added through IT-enabled innovation
      • % Overall stakeholder satisfaction with IT
      • % Percent of business leaders that view IT as an Innovator
      • % IT budget as a percent of revenue
      • % Assets that are not allocated
      • % Unallocated software licenses
      • # Obsolete assets
      • % IT spend that can be attributed to the business (chargeback or showback)
      • % Share of CapEx of overall IT budget
      • % Prospective organizations that meet the search criteria
      • $ Total IT cost of ownership (before and after M&A, before and after rationalization)
      • % Business leaders that view IT as a Business Partner
      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target
      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT integration
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      The IT executive’s role in the buying transaction is critical

      And IT leaders have a greater likelihood than ever of needing to support a merger, acquisition, or divestiture.

      1. Reduced Risk

        IT can identify risks that may go unnoticed when IT is not involved.
      2. Increased Accuracy

        The business can make accurate predictions around the costs, timelines, and needs of IT.
      3. Faster Integration

        Faster integration means faster value realization for the business.
      4. Informed Decision Making

        IT leaders hold critical information that can support the business in moving the transaction forward.
      5. Innovation

        IT can suggest new opportunities to generate revenue, optimize processes, or reduce inefficiencies.

      The IT executive’s critical role is demonstrated by:

      • Reduced Risk

        47% of senior leaders wish they would have spent more time on IT due diligence to prevent value erosion (IMAA Institute, 2017).
      • Increased Accuracy

        87% of respondents to a Deloitte survey effectively conducted a virtual deal, with a focus on cybersecurity and integration (Deloitte, 2020).
      • Faster Integration

        Integration costs range from as low as $4 million to as high as $3.8 billion, making the process an investment for the organization (CIO Dive).
      • Informed Decision Making

        Only 38% of corporate and 22% of private equity firms include IT as a significant aspect in their transaction approach (IMAA Institute, 2017).
      • Innovation

        Successful CIOs involved in M&As can spend 70% of their time on aspects outside of IT and 30% of their time on technology and delivery (CIO).

      Playbook benefits

      IT Benefits

      • IT will be seen as an innovative partner to the business, and its suggestions and involvement in the organization will lead to benefits, not hindrances.
      • Develop a streamlined method to valuate the potential organization being purchased and ensure risk management concerns are brought to the business’ attention immediately.
      • Create a comprehensive list of items that IT needs to do during the integration that can be prioritized and actioned.

      Business Benefits

      • The business will get accurate and relevant information about the organization being acquired, ensuring that the anticipated value of the transaction is correctly planned for.
      • Fewer business interruptions will happen, because IT can accurately plan for and execute the high-priority integration tasks.
      • The business can make a fair offer to the purchased organization, having properly valuated all aspects being bought, including the IT environment.

      Insight summary

      Overarching Insight

      As an IT executive, take control of when you get involved in a growth transaction. Do this by proactively identifying acquisition targets, demonstrating the value of IT, and ensuring that integration of IT environments does not lead to unnecessary and costly decisions.

      Proactive Insight

      CIOs on the forefront of digital transformation need to actively look for and suggest opportunities to acquire or partner on new digital capabilities to respond to rapidly changing business needs.

      Discovery & Strategy Insight

      IT organizations that have an effective M&A program plan are more prepared for the buying transaction, enabling a successful outcome. A structured strategy is particularly necessary for organizations expected to deliver M&As rapidly and frequently.

      Due Diligence & Preparation Insight

      Most IT synergies can be realized in due diligence. It is more impactful to consider IT processes and practices (e.g. contracts and culture) in due diligence rather than later in the integration.

      Execution & Value Realization Insight

      IT needs to realize synergies within the first 100 days of integration. The most successful transactions are when IT continuously realizes synergies a year after the transaction and beyond.

      Blueprint deliverables

      Key Deliverable: M&A Buy Playbook

      The M&A Buy Playbook should be a reusable document that enables your IT organization to successfully deliver on any acquisition transaction.

      Screenshots of the 'M and A Buy Playbook' deliverable.

      M&A Buy One-Pager

      See a one-page overview of each phase of the transaction.

      Screenshots of the 'M and A Buy One-Pagers' deliverable.

      M&A Buy Case Studies

      Read a one-page case study for each phase of the transaction.

      Screenshots of the 'M and A Buy Case Studies' deliverable.

      M&A Integration Project Management Tool (SharePoint)

      Manage the integration process of the acquisition using this SharePoint template.

      Screenshots of the 'M and A Integration Project Management Tool (SharePoint)' deliverable.

      M&A Integration Project Management Tool (Excel)

      Manage the integration process of the acquisition using this Excel tool if you can’t or don’t want to use SharePoint.

      Screenshots of the 'M and A Integration Project Management Tool (Excel)' deliverable.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 6 to 10 calls over the course of 2 to 4 months.

        Proactive Phase

      • Call #1: Scope requirements, objectives, and your specific challenges.
      • Discovery & Strategy Phase

      • Call #2: Determine stakeholders and their perspectives of IT.
      • Call #3: Identify how M&A could support business strategy and how to communicate.
      • Due Diligence & Preparation Phase

      • Call #4: Establish a transaction team and acquisition strategic direction.
      • Call #5: Create program metrics and identify a standard integration strategy.
      • Call #6: Assess the potential organization(s).
      • Call #7: Identify the integration program plan.
      • Execution & Value Realization Phase

      • Call #8: Establish employee transitions to retain key staff.
      • Call #9: Assess IT’s ability to deliver on the acquisition transaction.

      The Buy Blueprint

      Phase 1

      Proactive

      Phase 1

      Phase 2 Phase 3 Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Growth Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Acquisition
      • 3.1 Assess the Target Organization
      • 3.2 Prepare to Integrate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Conduct the CEO-CIO Alignment diagnostic
      • Conduct the CIO Business Vision diagnostic
      • Visualize relationships among stakeholders to identify key influencers
      • Group stakeholders into categories
      • Prioritize your stakeholders
      • Plan to communicate
      • Valuate IT
      • Assess the IT/digital strategy
      • Determine pain points and opportunities
      • Align goals to opportunities
      • Recommend growth opportunities

      This phase involves the following participants:

      • IT and business leadership

      What is the Proactive phase?

      Embracing the digital drivers

      As the number of merger, acquisition, or divestiture transactions driven by digital means continues to increase, IT has an opportunity to not just be involved in a transaction but actively seek out potential deals.

      In the Proactive phase, the business is not currently considering a transaction. However, the business could consider one to reach its strategic goals. IT organizations that have developed respected relationships with the business leaders can suggest these potential transactions.

      Understand the business’ perspective of IT, determine who the critical M&A stakeholders are, valuate the IT environment, and examine how it supports the business goals in order to suggest an M&A transaction.

      In doing so, IT isn’t waiting to be invited to the transaction table – it’s creating it.

      Goal: To support the organization in reaching its strategic goals by suggesting M&A activities that will enable the organization to reach its objectives faster and with greater-value outcomes.

      Proactive Prerequisite Checklist

      Before coming into the Proactive phase, you should have addressed the following:

      • Understand what mergers, acquisitions, and divestitures are.
      • Understand what mergers, acquisitions, and divestitures mean for the business.
      • Understand what mergers, acquisitions, and divestitures mean for IT.

      Review the Executive Brief for more information on mergers, acquisitions, and divestitures for purchasing organizations.

      Proactive

      Step 1.1

      Identify M&A Stakeholders and Their Perspective of IT

      Activities

      • 1.1.1 Conduct the CEO-CIO Alignment diagnostic
      • 1.1.2 Conduct the CIO Business Vision diagnostic
      • 1.1.3 Visualize relationships among stakeholders to identify key influencers
      • 1.1.4 Group stakeholders into categories
      • 1.1.5 Prioritize your stakeholders
      • 1.16 Plan to communicate

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical M&A stakeholders

      Outcomes of Step

      Understand how the business perceives IT and establish strong relationships with critical M&A stakeholders.

      Business executives' perspectives of IT

      Leverage diagnostics and gain alignment on IT’s role in the organization

      • To suggest or get involved with a merger, acquisition, or divestiture, the IT executive leader needs to be well respected by other members of the executive leadership team and the business.
      • Specifically, the Proactive phase relies on the IT organization being viewed as an Innovator within the business.
      • Identify how the CEO/business executive currently views IT and where they would like IT to move within the Maturity Ladder.
      • Additionally, understand how other critical department leaders view IT and how they view the partnership with IT.
      A colorful visualization titled 'Maturity Ladder' detailing levels of IT function that a business may choose from based on the business executives' perspectives of IT. Starting from the bottom: 'Struggle', Does not embarrass, Does not crash; 'Support', Keeps business happy, Keeps costs low; 'Optimize', Increases efficiency, Decreases costs; 'Expand', Extends into new business, Generates revenue; 'Transform', Creates new industry.

      Misalignment in target state requires further communication between the CIO and CEO to ensure IT is striving toward an agreed-upon direction.

      Info-Tech’s CIO Business Vision (CIO BV) diagnostic measures a variety of high-value metrics to provide a well-rounded understanding of stakeholder satisfaction with IT.

      Sample of Info-Tech's CIO Business Vision diagnostic measuring percentages of high-value metrics like 'IT Satisfaction' and 'IT Value' regarding business leader satisfaction. A note for these two reads 'Evaluate business leader satisfaction with IT this year and last year'. A section titled 'Relationship' has metrics such as 'Understands Needs' and 'Trains Effectively'. A note for this section reads 'Examine indicators of the relationship between IT and the business'. A section titled 'Security Friction' has metrics such as 'Regulatory Compliance-Driven' and 'Office/Desktop Security'.

      Business Satisfaction and Importance for Core Services

      The core services of IT are important when determining what IT should focus on. The most important services with the lowest satisfaction offer the largest area of improvement for IT to drive business value.

      Sample of Info-Tech's CIO Business Vision diagnostic specifically comparing the business satisfaction of 12 core services with their importance. Services listed include 'Service Desk', 'IT Security', 'Requirements Gathering', 'Business Apps', 'Data Quality', and more. There is a short description of the services, a percentage for the business satisfaction with the service, a percentage comparing it to last year, and a numbered ranking of importance for each service. A note reads 'Assess satisfaction and importance across 12 core IT capabilities'.

      1.1.1 Conduct the CEO-CIO Alignment diagnostic

      2 weeks

      Input: IT organization expertise and the CEO-CIO Alignment diagnostic

      Output: An understanding of an executive business stakeholder’s perception of IT

      Materials: CEO-CIO Alignment diagnostic, M&A Buy Playbook

      Participants: IT executive/CIO, Business executive/CEO

      1. The CEO-CIO Alignment diagnostic can be a powerful input. Speak with your Info-Tech account representative to conduct the diagnostic. Use the results to inform current IT capabilities.
      2. You may choose to debrief the results of your diagnostic with an Info-Tech analyst. We recommend this to help your team understand how to interpret and draw conclusions from the results.
      3. Examine the results of the survey and note where there might be specific capabilities that could be improved.
      4. Determine whether there are any areas of significant disagreement between the you and the CEO. Mark down those areas for further conversations. Additionally, take note of areas that could be leveraged to support growth transactions or support your rationale in recommending growth transactions.

      Download the sample report.

      Record the results in the M&A Buy Playbook.

      1.1.2 Conduct the CIO Business Vision diagnostic

      2 weeks

      Input: IT organization expertise, CIO BV diagnostic

      Output: An understanding of business stakeholder perception of certain IT capabilities and services

      Materials: CIO Business Vision diagnostic, Computer, Whiteboard and markers, M&A Buy Playbook

      Participants: IT executive/CIO, Senior business leaders

      1. The CIO Business Vision (CIO BV) diagnostic can be a powerful tool for identifying IT capability focus areas. Speak with your account representative to conduct the CIO BV diagnostic. Use the results to inform current IT capabilities.
      2. You may choose to debrief the results of your diagnostic with an Info-Tech analyst. We recommend this to help your team understand how to interpret the results and draw conclusions from the diagnostic.
      3. Examine the results of the survey and take note of any IT services that have low scores.
      4. Read through the diagnostic comments and note any common themes. Especially note which stakeholders identified they have a favorable relationship with IT and which stakeholders identified they have an unfavorable relationship. For those who have an unfavorable relationship, identify if they will have a critical role in a growth transaction.

      Download the sample report.

      Record the results in the M&A Buy Playbook.

      Create a stakeholder network map for M&A transactions

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      Example:

      Diagram of stakeholders and their relationships with other stakeholders, such as 'Board Members', 'CFO/Finance', 'Compliance', etc. with 'CIO/IT Leader' highlighted in the middle. There are unidirectional black arrows and bi-directional green arrows indicating each connection.

        Legend
      • Black arrows indicate the direction of professional influence
      • Dashed green arrows indicate bidirectional, informal influence relationships

      Info-Tech Insight

      Your stakeholder map defines the influence landscape that the M&A transaction will occur within. This will identify who holds various levels of accountability and decision-making authority when a transaction does take place.

      Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantial relationships with your stakeholders.

      1.1.3 Visualize relationships among stakeholders to identify key influencers

      1-3 hours

      Input: List of M&A stakeholders

      Output: Relationships among M&A stakeholders and influencers

      Materials: M&A Buy Playbook

      Participants: IT executive leadership

      1. The purpose of this activity is to list all the stakeholders within your organization that will have a direct or indirect impact on the M&A transaction.
      2. Determine the critical stakeholders, and then determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
      3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
      4. Construct a diagram linking stakeholders and their influencers together.
        • Use black arrows to indicate the direction of professional influence.
        • Use dashed green arrows to indicate bidirectional, informal influence relationships.

      Record the results in the M&A Buy Playbook.

      Categorize your stakeholders with a prioritization map

      A stakeholder prioritization map helps IT leaders categorize their stakeholders by their level of influence and ownership in the merger, acquisition, or divestiture process.

      A prioritization map of stakeholder categories split into four quadrants. The vertical axis is 'Influence', from low on the bottom to high on top. The horizontal axis is 'Ownership/Interest', from low on the left to high on the right. 'Spectators' are low influence, low ownership/interest. 'Mediators' are high influence, low ownership/interest. 'Noisemakers' are low influence, high ownership/interest. 'Players' are high influence, high ownership/interest.

      There are four areas in the map, and the stakeholders within each area should be treated differently.

      Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.

      Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.

      Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.

      Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.

      1.1.4 Group stakeholders into categories

      30 minutes

      Input: Stakeholder map, Stakeholder list

      Output: Categorization of stakeholders and influencers

      Materials: Flip charts, Markers, Sticky notes, M&A Buy Playbook

      Participants: IT executive leadership, Stakeholders

      1. Identify your stakeholders’ interest in and influence on the M&A process as high, medium, or low by rating the attributes below.
      2. Map your results to the model to the right to determine each stakeholder’s category.

      Same prioritization map of stakeholder categories as before. This one has specific stakeholders mapped onto it. 'CFO' is mapped as low interest and middling influence, between 'Mediator' and 'Spectator'. 'CIO' is mapped as higher than average interest and high influence, a 'Player'. 'Board Member' is mapped as high interest and high influence, a 'Player'.

      Level of Influence
      • Power: Ability of a stakeholder to effect change.
      • Urgency: Degree of immediacy demanded.
      • Legitimacy: Perceived validity of stakeholder’s claim.
      • Volume: How loud their “voice” is or could become.
      • Contribution: What they have that is of value to you.
      Level of Interest

      How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?

      Record the results in the M&A Buy Playbook.

      Prioritize your stakeholders

      There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

      Level of Support

      Supporter

      Evangelist

      Neutral

      Blocker

      Stakeholder Category Player Critical High High Critical
      Mediator Medium Low Low Medium
      Noisemaker High Medium Medium High
      Spectator Low Irrelevant Irrelevant Low

      Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by answering the following question: How significant is that stakeholder to the M&A or divestiture process?

      These parameters are used to prioritize which stakeholders are most important and should receive your focused attention.

      1.1.5 Prioritize your stakeholders

      30 minutes

      Input: Stakeholder matrix

      Output: Stakeholder and influencer prioritization

      Materials: Flip charts, Markers, Sticky notes, M&A Buy Playbook

      Participants: IT executive leadership, M&A/divestiture stakeholders

      1. Identify the level of support of each stakeholder by answering the following question: How significant is that stakeholder to the M&A transaction process?
      2. Prioritize your stakeholders using the prioritization scheme on the previous slide.

      Stakeholder

      Category

      Level of Support

      Prioritization

      CMO Spectator Neutral Irrelevant
      CIO Player Supporter Critical

      Record the results in the M&A Buy Playbook.

      Define strategies for engaging stakeholders by type

      A revisit to the map of stakeholder categories, but with strategies listed for each one, and arrows on the side instead of an axis. The vertical arrow is 'Authority', which increases upward, and the horizontal axis is Ownership/Interest which increases as it moves to the right. The strategy for 'Players' is 'Engage', for 'Mediators' is 'Satisfy', for 'Noisemakers' is 'Inform', and for 'Spectators' is 'Monitor'.

      Type

      Quadrant

      Actions

      Players High influence, high interest – actively engage Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success.
      Mediators High influence, low interest – keep satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.
      Noisemakers Low influence, high interest – keep informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.
      Spectators Low influence, low interest – monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      Info-Tech Insight

      Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying stakeholder groups, the IT executive leader can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers while ensuring the needs of Mediators and Players are met.

      1.1.6 Plan to communicate

      30 minutes

      Input: Stakeholder priority, Stakeholder categorization, Stakeholder influence

      Output: Stakeholder communication plan

      Materials: Flip charts, Markers, Sticky notes, M&A Buy Playbook

      Participants: IT executive leadership, M&A/divestiture stakeholders

      The purpose of this activity is to make a communication plan for each of the stakeholders identified in the previous activities, especially those who will have a critical role in the M&A transaction process.

      1. In the M&A Buy Playbook, input the type of influence each stakeholder has on IT, how they would be categorized in the M&A process, and their level of priority. Use this information to create a communication plan.
      2. Determine the methods and frequency of communication to keep the necessary stakeholder satisfied and maintain or enhance IT’s profile within the organization.

      Record the results in the M&A Buy Playbook.

      Proactive

      Step 1.2

      Assess IT’s Current Value and Method to Achieve a Future State

      Activities

      • 1.2.1 Valuate IT
      • 1.2.2 Assess the IT/digital strategy

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical stakeholders to M&A

      Outcomes of Step

      Identify critical opportunities to optimize IT and meet strategic business goals through a merger, acquisition, or divestiture.

      How to valuate your IT environment

      And why it matters so much

      • Valuating your current organization’s IT environment is a critical step that all IT organizations should take, whether involved in an M&A or not, to fully understand what it might be worth.
      • The business investments in IT can be directly translated into a value amount. For every $1 invested in IT, the business might be gaining $100 in value back or possibly even loosing $100.
      • Determining, documenting, and communicating this information ensures that the business takes IT’s suggestions seriously and recognizes why investing in IT is so critical.
      • There are three ways a business or asset can be valuated:
        • Cost Approach: Look at the costs associated with building, purchasing, replacing, and maintaining a given aspect of the business.
        • Market Approach: Look at the relative value of a particular aspect of the business. Relative value can fluctuate and depends on what the markets and consequently society believe that particular element is worth.
        • Discounted Cash Flow Approach: Focus on what the potential value of the business could be or the intrinsic value anticipated due to future profitability.
      • (Source: “Valuation Methods,” Corporate Finance Institute)

      Four ways to create value through digital

      1. Reduced costs
      2. Improved customer experience
      3. New revenue sources
      4. Better decision making
      5. (Source: McKinsey & Company)

      1.2.1 Valuate IT

      1 day

      Input: Valuation of data, Valuation of applications, Valuation of infrastructure and operations, Valuation of security and risk

      Output: Valuation of IT

      Materials: Relevant templates/tools listed on the following slides, Capital budget, Operating budget, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership

      The purpose of this activity is to demonstrate that IT is not simply an operational functional area that diminishes business resources. Rather, IT contributes significant value to the business.

      1. Review each of the following slides to valuate IT’s data, applications, infrastructure and operations, and security and risk. These valuations consider several tangible and intangible factors and result in a final dollar amount.
      2. Input the financial amounts identified for each critical area into a summary slide. Use this information to determine where IT is delivering value to the organization.

      Info-Tech Insight

      Consistency is key when valuating your IT organization as well as other IT organizations throughout the transaction process.

      Record the results in the M&A Buy Playbook.

      Data valuation

      Data valuation identifies how you monetize the information that your organization owns.

      Create a data value chain for your organization

      When valuating the information and data that exists in an organization, there are many things to consider.

      Info-Tech has two tools that can support this process:

      1. Information Asset Audit Tool: Use this tool first to take inventory of the different information assets that exist in your organization.
      2. Data Valuation Tool: Once information assets have been accounted for, valuate the data that exists within those information assets.

      Data Collection

      Insight Creation

      Value Creation

      Data Valuation

      01 Data Source
      02 Data Collection Method
      03 Data
      04 Data Analysis
      05 Insight
      06 Insight Delivery
      07 Consumer
      08 Value in Data
      09 Value Dimension
      10 Value Metrics Group
      11 Value Metrics
      Screenshots of Tab 2 of Info-Tech's Data Valuation Tool.

      Instructions

      1. Using the Data Valuation Tool, start gathering information based on the eight steps above to understand your organization’s journey from data to value.
      2. Identify the data value spectrum. (For example: customer sales service, citizen licensing service, etc.)
      3. Fill out the columns for data sources, data collection, and data first.
      4. Capture data analysis and related information.
      5. Then capture the value in data.
      6. Add value dimensions such as usage, quality, and economic dimensions.
        • Remember that economic value is not the only dimension, and usage/quality has a significant impact on economic value.
      7. Collect evidence to justify your data valuation calculator (market research, internal metrics, etc.).
      8. Finally, calculate the value that has a direct correlation with underlying value metrics.

      Application valuation

      Calculate the value of your IT applications

      When valuating the applications and their users in an organization, consider using a business process map. This shows how business is transacted in the company by identifying which IT applications support these processes and which business groups have access to them. Info-Tech has a business process mapping tool that can support this process:

      • Enterprise Integration Process Mapping Tool: Complete this tool first to map the different business processes to the supporting applications in your organization.

      Instructions

      1. Start by calculating user costs. This is the product of the (# of users) × (% of time spent using IT) × (fully burdened salary).
      2. Identify the revenue per employee and divide that by the average cost per employee to calculate the derived productivity ratio (DPR).
      3. Once you have calculated the user costs and DPR, multiply those total values together to get the application value.
      4. User Costs

        Total User Costs

        Derived Productivity Ratio (DPR)

        Total DPR

        Application Value

        # of users % time spent using IT Fully burdened salary Multiply values from the 3 user costs columns Revenue per employee Average cost per employee (Revenue P.E) ÷ (Average cost P.E) (User costs) X (DPR)

      5. Once the total application value is established, calculate the combined IT and business costs of delivering that value. IT and business costs include inflexibility (application maintenance), unavailability (downtime costs, including disaster exposure), IT costs (common costs statistically allocated to applications), and fully loaded cost of active (full-time equivalent [FTE]) users.
      6. Calculate the net value of applications by subtracting the total IT and business costs from the total application value calculated in step 3.
      7. IT and Business Costs

        Total IT and Business Costs

        Net Value of Applications

        Application maintenance Downtime costs (include disaster exposure) Common costs allocated to applications Fully loaded costs of active (FTE) users Sum of values from the four IT and business costs columns (Application value) – (IT and business costs)

      (Source: CSO)

      Infrastructure valuation

      Assess the foundational elements of the business’ information technology

      The purpose of this exercise is to provide a high-level infrastructure valuation that will contribute to valuating your IT environment.

      Calculating the value of the infrastructure will require different methods depending on the environment. For example, a fully cloud-hosted organization will have different costs than a fully on-premises IT environment.

      Instructions:

      1. Start by listing all of the infrastructure-related items that are relevant to your organization.
      2. Once you have finalized your items column, identify the total costs/value of each item.
        • For example, total software costs would include servers and storage.
      3. Calculate the total cost/value of your IT infrastructure by adding all of values in the right column.

      Item

      Costs/Value

      Hardware Assets Total Value +$3.2 million
      Hardware Leased/Service Agreement -$
      Software Purchased +$
      Software Leased/Service Agreement -$
      Operational Tools
      Network
      Disaster Recovery
      Antivirus
      Data Centers
      Service Desk
      Other Licenses
      Total:

      For additional support, download the M&A Runbook for Infrastructure and Operations.

      Risk and security

      Assess risk responses and calculate residual risk

      The purpose of this exercise is to provide a high-level risk assessment that will contribute to valuating your IT environment. For a more in-depth risk assessment, please refer to the Info-Tech tools below:

      1. Risk Register Tool
      2. Security M&A Due Diligence Tool

      Instructions

      1. Review the probability and impact scales below and ensure you have the appropriate criteria that align to your organization before you conduct a risk assessment.
      2. Identify the probability of occurrence and estimated financial impact for each risk category detail and fill out the table on the right. Customize the table as needed so it aligns to your organization.
      3. Probability of Risk Occurrence

        Occurrence Criteria
        (Classification; Probability of Risk Event Within One Year)

        Negligible Very Unlikely; ‹20%
        Very Low Unlikely; 20 to 40%
        Low Possible; 40 to 60%
        Moderately Low Likely; 60 to 80%
        Moderate Almost Certain; ›80%

      Note: If needed, you can customize this scale with the severity designations that you prefer. However, make sure you are always consistent with it when conducting a risk assessment.

      Financial & Reputational Impact

      Budgetary and Reputational Implications
      (Financial Impact; Reputational Impact)

      Negligible (‹$10,000; Internal IT stakeholders aware of risk event occurrence)
      Very Low ($10,000 to $25,000; Business customers aware of risk event occurrence)
      Low ($25,000 to $50,000; Board of directors aware of risk event occurrence)
      Moderately Low ($50,000 to $100,000; External customers aware of risk event occurrence)
      Moderate (›$100,000; Media coverage or regulatory body aware of risk event occurrence)

      Risk Category Details

      Probability of Occurrence

      Estimated Financial Impact

      Estimated Severity (Probability X Impact)

      Capacity Planning
      Enterprise Architecture
      Externally Originated Attack
      Hardware Configuration Errors
      Hardware Performance
      Internally Originated Attack
      IT Staffing
      Project Scoping
      Software Implementation Errors
      Technology Evaluation and Selection
      Physical Threats
      Resource Threats
      Personnel Threats
      Technical Threats
      Total:

      1.2.2 Assess the IT/digital strategy

      4 hours

      Input: IT strategy, Digital strategy, Business strategy

      Output: An understanding of an executive business stakeholder’s perception of IT, Alignment of IT/digital strategy and overall organization strategy

      Materials: Computer, Whiteboard and markers, M&A Buy Playbook

      Participants: IT executive/CIO, Business executive/CEO

      The purpose of this activity is to review the business and IT strategies that exist to determine if there are critical capabilities that are not being supported.

      Ideally, the IT and digital strategies would have been created following development of the business strategy. However, sometimes the business strategy does not directly call out the capabilities it requires IT to support.

      1. On the left half of the corresponding slide in the M&A Buy Playbook, document the business goals, initiatives, and capabilities. Input this information from the business or digital strategies. (If more space for goals, initiatives, or capabilities is needed, duplicate the slide).
      2. On the other half of the slide, document the IT goals, initiatives, and capabilities. Input this information from the IT strategy and digital strategy.

      For additional support, see Build a Business-Aligned IT Strategy.

      Record the results in the M&A Buy Playbook.

      Proactive

      Step 1.3

      Drive Innovation and Suggest Growth Opportunities

      Activities

      • 1.3.1 Determine pain points and opportunities
      • 1.3.2 Align goals with opportunities
      • 1.3.3 Recommend growth opportunities

      This step involves the following participants:

      • IT executive leader
      • IT leadership
      • Critical M&A stakeholders

      Outcomes of Step

      Establish strong relationships with critical M&A stakeholders and position IT as an innovative business partner that can suggest growth opportunities.

      1.3.1 Determine pain points and opportunities

      1-2 hours

      Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade

      Output: List of pain points or opportunities that IT can address

      Materials: Computer, Whiteboard and markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Business stakeholders

      The purpose of this activity is to determine the pain points and opportunities that exist for the organization. These can be external or internal to the organization.

      1. Identify what opportunities exist for your organization. Opportunities are the potential positives that the organization would want to leverage.
      2. Next, identify pain points, which are the potential negatives that the organization would want to alleviate.
      3. Spend time considering all the options that might exist, and keep in mind what has been identified previously.

      Opportunities and pain points can be trends, other departments’ initiatives, business perspectives of IT, etc.

      Record the results in the M&A Buy Playbook.

      1.3.2 Align goals with opportunities

      1-2 hours

      Input: CEO-CIO Alignment diagnostic, CIO Business Vision diagnostic, Valuation of IT environment, IT-business goals cascade, List of pain points and opportunities

      Output: An understanding of an executive business stakeholder’s perception of IT, Foundations for growth strategy

      Materials: Computer, Whiteboard and markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Business stakeholders

      The purpose of this activity is to determine whether a growth or separation strategy might be a good suggestion to the business in order to meet its business objectives.

      1. For the top three to five business goals, consider:
        1. Underlying drivers
        2. Digital opportunities
        3. Whether a growth or reduction strategy is the solution
      2. Just because a growth or reduction strategy is a solution for a business goal does not necessarily indicate M&A is the way to go. However, it is important to consider before you pursue suggesting M&A.

      Record the results in the M&A Buy Playbook.

      1.3.3 Recommend growth opportunities

      1-2 hours

      Input: Growth or separation strategy opportunities to support business goals, Stakeholder communication plan, Rationale for the suggestion

      Output: M&A transaction opportunities suggested

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO, Business executive/CEO

      The purpose of this activity is to recommend a merger, acquisition, or divestiture to the business.

      1. Identify which of the business goals the transaction would help solve and why IT is the one to suggest such a goal.
      2. Leverage the stakeholder communication plan identified previously to give insight into stakeholders who would have a significant level of interest, influence, or support in the process.

      Info-Tech Insight

      With technology and digital driving many transactions, leverage this opening and begin the discussions with your business on how and why an acquisition would be a great opportunity.

      Record the results in the M&A Buy Playbook.

      By the end of this Proactive phase, you should:

      Be prepared to suggest M&A opportunities to support your company’s goals through growth or acquisition transactions

      Key outcome from the Proactive phase

      Develop progressive relationships and strong communication with key stakeholders to suggest or be aware of transformational opportunities that can be achieved through growth or reduction strategies such as mergers, acquisitions, or divestitures.

      Key deliverables from the Proactive phase
      • Business perspective of IT examined
      • Key stakeholders identified and relationship to the M&A process outlined
      • Ability to valuate the IT environment and communicate IT’s value to the business
      • Assessment of the business, digital, and IT strategies and how M&As could support those strategies
      • Pain points and opportunities that could be alleviated or supported through an M&A transaction
      • Acquisition or buying recommendations

      The Buy Blueprint

      Phase 2

      Discovery & Strategy

      Phase 1

      Phase 2

      Phase 3Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Growth Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Acquisition
      • 3.1 Assess the Target Organization
      • 3.2 Prepare to Integrate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Create the mission and vision
      • Identify the guiding principles
      • Create the future-state operating model
      • Determine the transition team
      • Document the M&A governance
      • Create program metrics
      • Establish the integration strategy
      • Conduct a RACI
      • Create the communication plan
      • Assess the potential organization(s)

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Transaction FoundationDiscover the Motivation for AcquiringFormalize the Program PlanCreate the Valuation FrameworkStrategize the TransactionNext Steps and Wrap-Up (offsite)

      Activities

      • 0.1 Conduct the CIO Business Vision and CEO-CIO Alignment diagnostics
      • 0.2 Identify key stakeholders and outline their relationship to the M&A process
      • 0.3 Identify the rationale for the company's decisions to pursue an acquisition
      • 1.1 Review the business rationale for the acquisition
      • 1.2 Assess the IT/digital strategy
      • 1.3 Identify pain points and opportunities tied to the acquisition
      • 1.4 Create the IT vision statement, create the IT mission statement, and identify IT guiding principles
      • 2.1 Create the future-state operating model
      • 2.2 Determine the transition team
      • 2.3 Document the M&A governance
      • 2.4 Establish program metrics
      • 3.1 Valuate your data
      • 3.2 Valuate your applications
      • 3.3 Valuate your infrastructure
      • 3.4 Valuate your risk and security
      • 3.5 Combine individual valuations to make a single framework
      • 4.1 Establish the integration strategy
      • 4.2 Conduct a RACI
      • 4.3 Review best practices for assessing target organizations
      • 4.4 Create the communication plan
      • 5.1 Complete in-progress deliverables from previous four days
      • 5.2 Set up review time for workshop deliverables and to discuss next steps

      Deliverables

      1. Business perspectives of IT
      2. Stakeholder network map for M&A transactions
      1. Business context implications for IT
      2. IT’s acquisition strategic direction
      1. Operating model for future state
      2. Transition team
      3. Governance structure
      4. M&A program metrics
      1. IT valuation framework
      1. Integration strategy
      2. RACI
      3. Communication plan
      1. Completed M&A program plan and strategy
      2. Prepared to assess target organization(s)

      What is the Discovery & Strategy phase?

      Pre-transaction state

      The Discovery & Strategy phase during an acquisition is a unique opportunity for many IT organizations. IT organizations that can participate in the acquisition transaction at this stage are likely considered a strategic partner of the business.

      For one-off acquisitions, IT being invited during this stage of the process is rare. However, for organizations that are preparing to engage in many acquisitions over the coming years, this type of strategy will greatly benefit from IT involvement. Again, the likelihood of participating in an M&A transaction is increasing, making it a smart IT leadership decision to, at the very least, loosely prepare a program plan that can act as a strategic pillar throughout the transaction.

      During this phase of the pre-transaction state, IT will also be asked to participate in ensuring that the potential organization being sought will be able to meet any IT-specific search criteria that was set when the transaction was put into motion.

      Goal: To identify a repeatable program plan that IT can leverage when acquiring all or parts of another organization’s IT environment, ensuring customer satisfaction and business continuity

      Discovery & Strategy Prerequisite Checklist

      Before coming into the Discovery & Strategy phase, you should have addressed the following:

      • Understand the business perspective of IT.
      • Know the key stakeholders and have outlined their relationships to the M&A process.
      • Be able to valuate the IT environment and communicate IT's value to the business.
      • Understand the rationale for the company's decisions to pursue an acquisition and the opportunities or pain points the acquisition should address.

      Discovery & Strategy

      Step 2.1

      Establish the M&A Program Plan

      Activities

      • 2.1.1 Create the mission and vision
      • 2.1.2 Identify the guiding principles
      • 2.1.3 Create the future-state operating model
      • 2.1.4 Determine the transition team
      • 2.1.5 Document the M&A governance
      • 2.1.6 Create program metrics

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Outcomes of Step

      Establish an M&A program plan that can be repeated across acquisitions.

      The vision and mission statements clearly articulate IT’s aspirations and purpose

      The IT vision statement communicates a desired future state of the IT organization, whereas the IT mission statement portrays the organization’s reason for being. While each serves its own purpose, they should both be derived from the business context implications for IT.

      Vision Statements

      Mission Statements

      Characteristics

      • Describe a desired future
      • Focus on ends, not means
      • Concise
      • Aspirational
      • Memorable
      • Articulate a reason for existence
      • Focus on how to achieve the vision
      • Concise
      • Easy to grasp
      • Sharply focused
      • Inspirational

      Samples

      To be a trusted advisor and partner in enabling business innovation and growth through an engaged IT workforce. (Source: Business News Daily) IT is a cohesive, proactive, and disciplined team that delivers innovative technology solutions while demonstrating a strong customer-oriented mindset. (Source: Forbes, 2013)

      2.1.1 Create the mission and vision statements

      2 hours

      Input: Business objectives, IT capabilities, Rationale for the transaction

      Output: IT’s mission and vision statements for growth strategies tied to mergers, acquisitions, and divestitures

      Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create mission and vision statements that reflect IT’s intent and method to support the organization as it pursues a growth strategy.

      1. Review the definitions and characteristics of mission and vision statements.
      2. Brainstorm different versions of the mission and vision statements.
      3. Edit the statements until you get to a single version of each that accurately reflects IT’s role in the growth process.

      Record the results in the M&A Buy Playbook.

      Guiding principles provide a sense of direction

      IT guiding principles are shared, long-lasting beliefs that guide the use of IT in constructing, transforming, and operating the enterprise by informing and restricting IT investment portfolio management, solution development, and procurement decisions.

      A diagram illustrating the place of 'IT guiding principles' in the process of making 'Decisions on the use of IT'. There are four main items, connecting lines naming the type of process in getting from one step to the next, and a line underneath clarifying the questions asked at each step. On the far left, over the question 'What decisions should be made?', is 'Business context and IT implications'. This flows forward to 'IT guiding principles', and they are connected by 'Influence'. Next, over the question 'How should decisions be made?', is the main highlighted section. 'IT guiding principles' flows forward to 'Decisions on the use of IT', and they are connected by 'Guide and inform'. On the far right, over the question 'Who has the accountability and authority to make decisions?', is 'IT policies'. This flows back to 'Decisions on the use of IT', and they are connected by 'Direct and control'.

      IT principles must be carefully constructed to make sure they are adhered to and relevant

      Info-Tech has identified a set of characteristics that IT principles should possess. These characteristics ensure the IT principles are relevant and followed in the organization.

      Approach focused. IT principles should be focused on the approach – how the organization is built, transformed, and operated – as opposed to what needs to be built, which is defined by both functional and non-functional requirements.

      Business relevant. Create IT principles that are specific to the organization. Tie IT principles to the organization’s priorities and strategic aspirations.

      Long lasting. Build IT principles that will withstand the test of time.

      Prescriptive. Inform and direct decision making with actionable IT principles. Avoid truisms, general statements, and observations.

      Verifiable. If compliance can’t be verified, people are less likely to follow the principle.

      Easily Digestible. IT principles must be clearly understood by everyone in IT and by business stakeholders. IT principles aren’t a secret manuscript of the IT team. IT principles should be succinct; wordy principles are hard to understand and remember.

      Followed. Successful IT principles represent a collection of beliefs shared among enterprise stakeholders. IT principles must be continuously communicated to all stakeholders to achieve and maintain buy-in.

      In organizations where formal policy enforcement works well, IT principles should be enforced through appropriate governance processes.

      Consider the example principles below

      IT Principle Name

      IT Principle Statement

      1. Risk Management We will ensure that the organization’s IT Risk Management Register is properly updated to reflect all potential risks and that a plan of action against those risks has been identified.
      2. Transparent Communication We will ensure employees are spoken to with respect and transparency throughout the transaction process.
      3. Integration for Success We will create an integration strategy that enables the organization and clearly communicates the resources required to succeed.
      4. Managed Data We will handle data creation, modification, integration, and use across the enterprise in compliance with our data governance policy.
      5. Establish a single IT Environment We will identify, prioritize, and manage the applications and services that IT provides in order to eliminate redundant technology and maximize the value that users and customers experience.
      6. Compliance With Laws and Regulations We will operate in compliance with all applicable laws and regulations for both our organization and the potentially purchased organization.
      7. Defined Value We will create a plan of action that aligns with the organization’s defined value expectations.
      8. Network Readiness We will ensure that employees and customers have immediate access to the network with minimal or no outages.
      9. Operating to Succeed We will bring all of IT into a central operating model within two years of the transaction.

      2.1.2 Identify the guiding principles

      2 hours

      Input: Business objectives, IT capabilities, Rationale for the transaction, Mission and vision statements

      Output: IT’s guiding principles for growth strategies tied to mergers, acquisitions, and divestitures

      Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create the guiding principles that will direct the IT organization throughout the growth strategy process.

      1. Review the role of guiding principles and the examples of guiding principles that organizations have used.
      2. Brainstorm different versions of the guiding principles. Each guiding principle should start with the phrase “We will…”
      3. Edit and consolidate the statements until you have a list of approximately eight to ten statements that accurately reflect IT’s role in the growth process.
      4. Review the guiding principles every six months to ensure they continue to support the delivery of the business’ growth strategy goals.

      Record the results in the M&A Buy Playbook.

      Create two IT teams to support the transaction

      IT M&A Transaction Team

      • The IT M&A Transaction Team should consist of the strongest members of the IT team who can be expected to deliver on unusual or additional tasks not asked of them in normal day-to-day operations.
      • The roles selected for this team will have very specific skills sets or deliver on critical integration capabilities, making their involvement in the combination of two or more IT environments paramount.
      • These individuals need to have a history of proving themselves very trustworthy, as they will likely be required to sign an NDA as well.
      • Expect to have to certain duplicate capabilities or roles across the M&A transaction team and operational team.

      IT Operational Team

      • This group is responsible for ensuring the business operations continue.
      • These employees might be those who are newer to the organization but can be counted on to deliver consistent IT services and products.
      • The roles of this team should ensure that end users or external customers remain satisfied.

      Key capabilities to support M&A

      Consider the following capabilities when looking at who should be a part of the M&A transaction team.

      Employees who have a significant role in ensuring that these capabilities are being delivered will be a top priority.

      Infrastructure

      • Systems Integration
      • Data Management

      Business Focus

      • Service-Level Management
      • Enterprise Architecture
      • Stakeholder Management
      • Project Management

      Risk & Security

      • Privacy Management
      • Security Management
      • Risk & Compliance Management

      Build a lasting and scalable operating model

      An operating model is an abstract visualization, used like an architect’s blueprint, that depicts how structures and resources are aligned and integrated to deliver on the organization’s strategy.

      It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint before embarking on detailed organizational design.

      The visual should highlight which capabilities are critical to attaining strategic goals and clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization.

      As you assess the current operating model, consider the following:

      • Does the operating model contain all the necessary capabilities your IT organization requires to be successful?
      • What capabilities should be duplicated?
      • Are there individuals with the skill set to support those roles? If not, is there a plan to acquire or develop those skills?
      • A dedicated project team strictly focused on M&A is great. However, is it feasible for your organization? If not, what blockers exist?
      A diagram with 'Initiatives' and 'Solutions' on the left and right of an area chart, 'Customer' at the top, the area between them labelled 'Functional Area n', and six horizontal bars labelled 'IT Capability' stacked on top of each other. The 'IT Capability' bars are slightly skewed to the 'Solutions' side of the chart.

      Info-Tech Insight

      Investing time up-front getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and allowing your model to change as the business changes.

      2.1.3 Create the future-state operating model

      4 hours

      Input: Current operating model, IT strategy, IT capabilities, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements

      Output: Future-state operating model

      Materials: Operating model, Capability overlay, Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to establish what the future-state operating model will be if your organization needs to adjust to support a growth transaction.

      1. Ensuring that all the IT capabilities are identified by the business and IT strategy, document your organization’s current operating model.
      2. Identify what core capabilities would be critical to the buying transaction process and integration. Highlight and make copies of those capabilities in the M&A Buy Playbook.
      3. Arrange the capabilities to clearly show the flow of inputs and outputs. Identify critical stakeholders of the process (such as customers or end users) if that will help the flow.
      4. Ensure the capabilities that will be decentralized are clearly identified. Decentralized capabilities do not exist within the central IT organization but rather in specific lines of businesses or products to better understand needs and deliver on the capability.

      An example operating model is included in the M&A Buy Playbook. This process benefits from strong reference architecture and capability mapping ahead of time.

      Record the results in the M&A Buy Playbook.

      2.1.4 Determine the transition team

      3 hours

      Input: IT capabilities, Future-state operating model, M&A-specific IT capabilities, Business objectives, Rationale for the transaction, Mission and vision statements

      Output: Transition team

      Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a team that will support your IT organization throughout the transaction. Determining which capabilities and therefore which roles will be required ensures that the business will continue to get the operational support it needs.

      1. Based on the outcome of activity 2.1.3, review the capabilities that your organization will require on the transition team. Group capabilities into functional groups containing capabilities that are aligned well with one another because they have similar responsibilities and functionalities.
      2. Replace the capabilities with roles. For example, stakeholder management, requirements gathering, and project management might be one functional group. Project management and stakeholder management might combine to create a project manager role.
      3. Review the examples in the M&A Buy Playbook and identify which roles will be a part of the transition team.

      For more information, see Redesign Your Organizational Structure

      What is governance?

      And why does it matter so much to IT and the M&A process?

      • Governance is the method in which decisions get made, specifically as they impact various resources (time, money, and people).
      • Because M&A is such a highly governed transaction, it is important to document the governance bodies that exist in your organization.
      • This will give insight into what types of governing bodies there are, what decisions they make, and how that will impact IT.
      • For example, funds to support integration need to be discussed, approved, and supplied to IT from a governing body overseeing the acquisition.
      • A highly mature IT organization will have automated governance, while a seemingly non-existent governance process will be considered ad hoc.
      A pyramid with four levels representing the types of governing bodies that are available with differing levels of IT maturity. An arrow beside the pyramid points upward. The bottom of the arrow is labelled 'Traditional (People and document centric)' and the top is labelled 'Adaptive (Data centric)'. Starting at the bottom of the pyramid is level 1 'Ad Hoc Governance', 'Governance that is not well defined or understood within the organization. It occurs out of necessity but often not by the right people'. Level 2 is 'Controlled Governance', 'Governance focused on compliance and decisions driven by hierarchical authority. Levels of authority are defined and often driven by regulatory'. Level 3 is 'Agile Governance', 'Governance that is flexible to support different needs and quick response in the organization. Driven by principles and delegated throughout the company'. At the top of the pyramid is level 4 'Automated Governance', 'Governance that is entrenched and automated into organizational processes and product/service design. Empowered and fully delegated governance to maintain fit and drive organizational success and survival'.

      2.1.5 Document M&A governance

      1-2 hours

      Input: List of governing bodies, Governing body committee profiles, Governance structure

      Output: Documented method on how decisions are made as it relates to the M&A transaction

      Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine the method in which decisions are made throughout the M&A transaction as it relates to IT. This will require understanding both governing bodies internal to IT and those external to IT.

      1. First, determine the other governance structures within the organization that will impact the decisions made about M&A. List out these bodies or committees.
      2. Create a profile for each committee that looks at the membership, purpose of the committee, decision areas (authority), and the process of inputs and outputs. Ensure IT committees that will have a role in this process are also documented. Consider the benefits realized, risks, and resources required for each.
      3. Organize the committees into a structure, identifying the committees that have a role in defining the strategy, designing and building, and running.

      Record the results in the M&A Buy Playbook.

      Current-state structure map – definitions of tiers

      Strategy: These groups will focus on decisions that directly connect to the strategic direction of the organization.

      Design & Build: The second tier of groups will oversee prioritization of a certain area of governance as well as design and build decisions that feed into strategic decisions.

      Run: The lowest level of governance will be oversight of more-specific initiatives and capabilities within IT.

      Expect tier overlap. Some committees will operate in areas that cover two or three of these governance tiers.

      Measure the IT program’s success in terms of its ability to support the business’ M&A goals

      Upper management will measure IT’s success based on your ability to support the underlying reasons for the M&A. Using business metrics will help assure business stakeholders that IT understands their needs and is working with the business to achieve them.

      Business-Specific Metrics

      • Revenue Growth: Increase in the top line as seen by market expansion, product expansion, etc. by percentage/time.
      • Synergy Extraction: Reduction in costs as determined by the ability to identify and eliminate redundancies over time.
      • Profit Margin Growth: Increase in the bottom line as a result of increased revenue growth and/or decreased costs over time.

      IT-Specific Metrics

      • IT operational savings and cost reductions due to synergies: Operating expenses, capital expenditures, licenses, contracts, applications, infrastructure over time.
      • Reduction in IT staff expense and headcount: Decreased budget allocated to IT staff, and ability to identify and remove redundancies in staff.
      • Meeting or improving on IT budget estimates: Delivering successful IT integration on a budget that is the same or lower than the budget estimated during due diligence.
      • Meeting or improving on IT time-to-integration estimates: Delivering successful IT integration on a timeline that is the same or shorter than the timeline estimated during due diligence.
      • Business capability support: Delivering the end state of IT that supports the expected business capabilities and growth.

      Establish your own metrics to gauge the success of IT

      Establish SMART M&A Success Metrics

      S pecific Make sure the objective is clear and detailed.
      M easurable Objectives are measurable if there are specific metrics assigned to measure success. Metrics should be objective.
      A ctionable Objectives become actionable when specific initiatives designed to achieve the objective are identified.
      R ealistic Objectives must be achievable given your current resources or known available resources.
      T ime-Bound An objective without a timeline can be put off indefinitely. Furthermore, measuring success is challenging without a timeline.
      • What should IT consider when looking to identify potential additions, deletions, or modifications that will either add value to the organization or reduce costs/risks?
      • Provide a definition of synergies.
      • IT operational savings and cost reductions due to synergies: Operating expenses, capital expenditures, licenses, contracts, applications, infrastructure.
      • Reduction in IT staff expense and headcount: Decreased budget allocated to IT staff, and ability to identify and remove redundancies in staff.
      • Meeting or improving on IT budget estimates: Delivering successful IT integration on a budget that is the same or lower than the budget estimated during due diligence.
      • Meeting or improving on IT time-to-integration estimates: Delivering successful IT integration on a timeline that is the same or shorter than the timeline estimated during due diligence.
      • Revenue growth: Increase in the top line as a result, as seen by market expansion, product expansion, etc.
      • Synergy extraction: Reduction in costs, as determined by the ability to identify and eliminate redundancies.
      • Profit margin growth: Increase in the bottom line as a result of increased revenue growth and/or decreased costs.

      Metrics for each phase

      1. Proactive

      2. Discovery & Strategy

      3. Valuation & Due Diligence

      4. Execution & Value Realization

      • % Share of business innovation spend from overall IT budget
      • % Critical processes with approved performance goals and metrics
      • % IT initiatives that meet or exceed value expectation defined in business case
      • % IT initiatives aligned with organizational strategic direction
      • % Satisfaction with IT's strategic decision-making abilities
      • $ Estimated business value added through IT-enabled innovation
      • % Overall stakeholder satisfaction with IT
      • % Percent of business leaders that view IT as an Innovator
      • % IT budget as a percent of revenue
      • % Assets that are not allocated
      • % Unallocated software licenses
      • # Obsolete assets
      • % IT spend that can be attributed to the business (chargeback or showback)
      • % Share of CapEx of overall IT budget
      • % Prospective organizations that meet the search criteria
      • $ Total IT cost of ownership (before and after M&A, before and after rationalization)
      • % Business leaders that view IT as a Business Partner
      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target
      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT integration
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      2.1.6 Create program metrics

      1-2 hours

      Input: IT capabilities, Mission, vision, and guiding principles, Rationale for the acquisition

      Output: Program metrics to support IT throughout the M&A process

      Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine how IT’s success throughout a growth transaction will be measured and determined.

      1. Document a list of appropriate metrics on the whiteboard. Remember to include metrics that demonstrate the business impact. You can use the sample metrics listed on the previous slide as a starting point.
      2. Set a target and deadline for each metric. This will help the group determine when it is time to evaluate progression.
      3. Establish a baseline for each metric based on information collected within your organization.
      4. Assign an owner for tracking each metric as well as someone to be accountable for performance.

      Record the results in the M&A Buy Playbook.

      Discovery & Strategy

      Step 2.2

      Prepare IT to Engage in the Acquisition

      Activities

      • 2.2.1 Establish the integration strategy
      • 2.2.2 Conduct a RACI
      • 2.2.3 Create the communication plan
      • 2.2.4 Assess the potential organization(s)

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team

      Outcomes of Step

      Identify IT’s plan of action when it comes to the acquisition and align IT’s integration strategy with the business’ M&A strategy.

      Integration strategies

      There are several IT integration strategies that will help you achieve your target technology environment.

      IT Integration Strategies
      • Absorption. Convert the target organization’s strategy, structure, processes, and/or systems to that of the acquiring organization.
      • Best-of-Breed. Pick and choose the most effective people, processes, and technologies to form an efficient operating model.
      • Transformation Retire systems from both organizations and use collective capabilities, data, and processes to create something entirely new.
      • Preservation Retain individual business units that will operate within their own capability. People, processes, and technologies are unchanged.

      The approach IT takes will depend on the business objectives for the M&A.

      • Generally speaking, the integration strategy is well understood and influenced by the frequency of and rationale for acquiring.
      • Based on the initiatives generated by each business process owner, you need to determine the IT integration strategy that will best support the desired target technology environment.

      Key considerations when choosing an IT integration strategy include:

      • What are the main business objectives of the M&A?
      • What are the key synergies expected from the transaction?
      • What IT integration best helps obtain these benefits?
      • What opportunities exist to position the business for sustainable growth?

      Absorption and best-of-breed

      Review highlights and drawbacks of absorption and best-of-breed integration strategies

      Absorption
        Highlights
      • Recommended for businesses striving to reduce costs and drive efficiency gains.
      • Economies of scale realized through consolidation and elimination of redundant applications.
      • Quickest path to a single company operation and systems as well as lower overall IT cost.
        Drawbacks
      • Potential for disruption of the target company’s business operations.
      • Requires significant business process changes.
      • Disregarding the target offerings altogether may lead to inferior system decisions that do not yield sustainable results.
      Best-of-Breed
        Highlights
      • Recommended for businesses looking to expand their market presence or acquire new products. Essentially aligning the two organizations in the same market.
      • Each side has a unique offering but complementing capabilities.
      • Potential for better buy-in from the target because some of their systems are kept, resulting in willingness to
        Drawbacks
      • May take longer to integrate because it tends to present increased complexity that results in higher costs and risks.
      • Requires major integration efforts from both sides of the company. If the target organization is uncooperative, creating the desired technology environment will be difficult.

      Transformation and preservation

      Review highlights and drawbacks of transformation and preservation integration strategies

      Transformation
        Highlights
      • This is the most customized approach, although it is rarely used.
      • It is essential to have an established long-term vision of business capabilities when choosing this path.
      • When executed correctly, this approach presents potential for significant upside and creation of sustainable competitive advantages.
        Drawbacks
      • This approach requires extensive time to implement, and the cost of integration work may be significant.
      • If a new system is created without strategic capabilities, the organizations will not realize long-term benefits.
      • The cost of correcting complexities at later stages in the integration effort may be drastic.
      Preservation
        Highlights
      • This approach is appropriate if the merging organizations will remain fairly independent, if there will be limited or no communication between companies, and if the companies’ market strategies, products, and channels are entirely distinct.
      • Environment can be accomplished quickly and at a low cost.
        Drawbacks
      • Impact to each business is minimal, but there is potential for lost synergies and higher operational costs. This may be uncontrollable if the natures of the two businesses are too different to integrate.
      • Reduced benefits and limited opportunities for IT integration.

      2.2.1 Establish the integration strategy

      1-2 hours

      Input: Business integration strategy, Guiding principles, M&A governance

      Output: IT’s integration strategy

      Materials: Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to determine IT’s approach to integration. The approach might differ slightly from transaction to transaction. However, the business’ approach to transactions should give insight into the general integration strategy IT should adopt.

      1. Make sure you have clearly articulated the business objectives for the M&A, the technology end state for IT, and the magnitude of the overall integration.
      2. Review and discuss the highlights and drawbacks of each type of integration.
      3. Use Info-Tech’s Integration Posture Selection Framework on the next slide to select the integration posture that will appropriately enable the business. Consider these questions during your discussion:
        1. What are the main business objectives of the M&A? What key IT capabilities will need to support business objectives?
        2. What key synergies are expected from the transaction? What opportunities exist to position the business for sustainable growth?
        3. What IT integration best helps obtain these benefits?

      Record the results in the M&A Buy Playbook.

      Integration Posture Selection Framework

      Business M&A Strategy

      Resultant Technology Strategy

      M&A Magnitude (% of Acquirer Assets, Income, or Market Value)

      IT Integration Posture

      A. Horizontal Adopt One Model ‹10% Absorption
      10 to 75% Absorption or Best-of-Breed
      ›75% Best-of-Breed
      B. Vertical Create Links Between Critical Systems Any
      • Preservation (Differentiated Functions)
      • Absorption or Best-of-Breed (Non-Differentiated Functions)
      C. Conglomerate Independent Model Any Preservation
      D. Hybrid: Horizontal & Conglomerate Independent Model Any Preservation

      2.2.2 Conduct a RACI

      1-2 hours

      Input: IT capabilities, Transition team, Integration strategy

      Output: Completed RACI for transition team

      Materials: Reference architecture, Organizational structure, Flip charts/whiteboard, Markers, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to identify the core accountabilities and responsibilities for the roles identified as critical to your transition team. While there might be slight variation from transaction to transaction, ideally each role should be performing certain tasks.

      1. First, identify a list of critical tasks that need to be completed to support the purchase or acquisition. For example:
        • Communicate with the company M&A team.
        • Identify critical IT risks that could impact the organization after the transaction.
        • Identify key artifacts to collect and review during due diligence.
      2. Next, identify at the activity level which role is accountable or responsible for each activity. Enter an A for accountable, R for responsible, or A/R for both.

      Record the results in the M&A Buy Playbook.

      Communication and change

      Prepare key stakeholders for the potential changes

      • Anytime you are starting a project or program that will depend on users and stakeholders to give up their old way of doing things, change will force people to become novices again, leading to lost productivity and added stress.
      • Change management can improve outcomes for any project where you need people to adopt new tools and procedures, comply with new policies, learn new skills and behaviors, or understand and support new processes.
      • M&As move very quickly, and it can be very difficult to keep track of which stakeholders you need to be communicating with and what you should be communicating.
      • Not all organizations embrace or resist change in the same ways. Base your change communications on your organization’s cultural appetite for change in general.
        • Organizations with a low appetite for change will require more direct, assertive communications.
        • Organizations with a high appetite for change are more suited to more open, participatory approaches.

      Three key dimensions determine the appetite for cultural change:

      • Power Distance. Refers to the acceptance that power is distributed unequally throughout the organization.
        In organizations with a high power distance, the unequal power distribution is accepted by the less powerful employees.
      • Individualism. Organizations that score high in individualism have employees who are more independent. Those who score low in individualism fall into the collectivism side, where employees are strongly tied to one another or their groups.
      • Uncertainty Avoidance. Describes the level of acceptance that an organization has toward uncertainty. Those who score high in this area find that their employees do not favor uncertain situations, while those that score low in this area find that their employees are comfortable with change and uncertainty.

      2.2.3 Create the communication plan

      1-2 hours

      Input: IT’s M&A mission, vision, and guiding principles, M&A transition team, IT integration strategy, RACI

      Output: IT’s M&A communication plan

      Materials: Flip charts/whiteboard, Markers, RACI, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a communication plan that IT can leverage throughout the initiative.

      1. Create a structured communication plan that allows for continuous communication with the integration management office, senior management, and the business functional heads.
      2. Outline key topics of communication, with stakeholders, inputs, and outputs for each topic.
      3. Review Info-Tech’s example communication plan in the M&A Buy Playbook and update it with relevant information.
      4. Does this communication plan make sense for your organization? What doesn’t make sense? Adjust the communication guide to suit your organization.

      Record the results in the M&A Buy Playbook.

      Assessing potential organizations

      As soon as you have identified organizations to consider, it’s imperative to assess critical risks. Most IT leaders can attest that they will receive little to no notice when they have to assess the IT organization of a potential purchase. As a result, having a standardized template to quickly gauge the value of the business can be critical.

      Ways to Assess

      1. News: Assess what sort of news has been announced in relation to the organization. Have they had any risk incidents? Has a critical vendor announced working with them?
      2. LinkedIn: Scan through the LinkedIn profiles of employees. This will give you a sense of what platforms they have based on their employees.
      3. Trends: Some industries will have specific solutions that are relevant and popular. Assess what the key players are (if you don’t already know) to determine the solution.
      4. Business Architecture: While this assessment won’t perfect, try to understand the business’ value streams and the critical business and IT capabilities that would be needed to support them.

      2.2.4 Assess the potential organization(s)

      1-2 hours

      Input: Publicized historical risk events, Solutions and vendor contracts likely in the works, Trends

      Output: IT’s valuation of the potential organization(s) for acquisition

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO

      The purpose of this activity is to assess the organization(s) that your organization is considering purchasing.

      1. Complete the Historical Valuation Worksheet in the M&A Buy Playbook to understand the type of IT organization that your company may inherit and need to integrate with.
        • The business likely isn’t looking for in-depth details at this time. However, as the IT leader, it is your responsibility to ensure critical risks are identified and communicated to the business.
      2. Use the information identified to help the business narrow down which organizations should be targeted for the acquisition.

      Record the results in the M&A Buy Playbook.

      By the end of this pre-transaction phase you should:

      Have a program plan for M&As and a repeatable M&A strategy for IT when engaging in growth transactions

      Key outcomes from the Discovery & Strategy phase
      • Be prepared to analyze and recommend potential organizations that the business can acquire or merge with, using a strong program plan that can be repeated across transactions.
      • Create a M&A strategy that accounts for all the necessary elements of a transaction and ensures sufficient governance, capabilities, and metrics exist.
      Key deliverables from the Discovery & Strategy phase
      • Create vision and mission statements
      • Establish guiding principles
      • Create a future-state operating model
      • Identify the key roles for the transaction team
      • Identify and communicate the M&A governance
      • Determine target metrics
      • Identify the M&A operating model
      • Select the integration strategy framework
      • Conduct a RACI for key transaction tasks for the transaction team
      • Document the communication plan

      M&A Buy Blueprint

      Phase 3

      Due Diligence & Preparation

      Phase 1Phase 2

      Phase 3

      Phase 4
      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Growth Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Acquisition
      • 3.1 Assess the Target Organization
      • 3.2 Prepare to Integrate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Drive value with a due diligence charter
      • Identify data room artifacts
      • Assess technical debt
      • Valuate the target IT organization
      • Assess culture
      • Prioritize integration tasks
      • Establish the integration roadmap
      • Identify the needed workforce supply
      • Estimate integration costs
      • Create an employee transition plan
      • Create functional workplans for employees
      • Align project metrics with identified tasks

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team
      • Business leaders
      • Prospective IT organization
      • Transition team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Transaction FoundationDiscover the Motivation for IntegrationAssess the Target Organization(s)Create the Valuation FrameworkPlan the Integration RoadmapNext Steps and Wrap-Up (offsite)

      Activities

      • 0.1 Identify the rationale for the company's decisions to pursue an acquisition.
      • 0.2 Identify key stakeholders and determine the IT transaction team.
      • 0.3 Gather and evaluate the M&A strategy, future-state operating model, and governance.
      • 1.1 Review the business rationale for the acquisition.
      • 1.2 Identify pain points and opportunities tied to the acquisition.
      • 1.3 Establish the integration strategy.
      • 1.4 Create the due diligence charter.
      • 2.1 Create a list of IT artifacts to be reviewed in the data room.
      • 2.2 Conduct a technical debt assessment.
      • 2.3 Assess the current culture and identify the goal culture.
      • 2.4 Identify the needed workforce supply.
      • 3.1 Valuate the target organization’s data.
      • 3.2 Valuate the target organization’s applications.
      • 3.3 Valuate the target organization’s infrastructure.
      • 3.4 Valuate the target organization’s risk and security.
      • 3.5 Combine individual valuations to make a single framework.
      • 4.1 Prioritize integration tasks.
      • 4.2 Establish the integration roadmap.
      • 4.3 Establish and align project metrics with identified tasks.
      • 4.4 Estimate integration costs.
      • 5.1 Complete in-progress deliverables from previous four days.
      • 5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. IT strategy
      2. IT operating model
      3. IT governance structure
      4. M&A transaction team
      1. Business context implications for IT
      2. Integration strategy
      3. Due diligence charter
      1. Data room artifacts
      2. Technical debt assessment
      3. Culture assessment
      4. Workforce supply identified
      1. IT valuation framework to assess target organization(s)
      1. Integration roadmap and associated resourcing
      1. Acquisition integration strategy for IT

      What is the Due Diligence & Preparation phase?

      Mid-transaction state

      The Due Diligence & Preparation phase during an acquisition is a critical time for IT. If IT fails to proactively participate in this phase, IT will have to merely react to integration expectations set by the business.

      While not all IT organizations are able to participate in this phase, the evolving nature of M&As to be driven by digital and technological capabilities increases the rationale for IT being at the table. Identifying critical IT risks, which will inevitably be business risks, begins during the due diligence phase.

      This is also the opportunity for IT to plan how it will execute the planned integration strategy. Having access to critical information only available in data rooms will further enable IT to successfully plan and execute the acquisition to deliver the value the business is seeking through a growth transaction.

      Goal: To thoroughly evaluate all potential risks associated with the organization(s) being pursued and create a detailed plan for integrating the IT environments

      Due Diligence Prerequisite Checklist

      Before coming into the Due Diligence & Preparation phase, you must have addressed the following:

      • Understand the rationale for the company's decisions to pursue an acquisition and what opportunities or pain points the acquisition should alleviate.
      • Identify the key roles for the transaction team.
      • Identify the M&A governance.
      • Determine target metrics.
      • Select an integration strategy framework.
      • Conduct a RACI for key transaction tasks for the transaction team.

      Before coming into the Due Diligence & Preparation phase, we recommend addressing the following:

      • Create vision and mission statements.
      • Establish guiding principles.
      • Create a future-state operating model.
      • Identify the M&A operating model.
      • Document the communication plan.
      • Examine the business perspective of IT.
      • Identify key stakeholders and outline their relationship to the M&A process.
      • Be able to valuate the IT environment and communicate IT’s value to the business.

      The Technology Value Trinity

      Delivery of Business Value & Strategic Needs

      • Digital & Technology Strategy
        The identification of objectives and initiatives necessary to achieve business goals.
      • IT Operating Model
        The model for how IT is organized to deliver on business needs and strategies.
      • Information & Technology Governance
        The governance to ensure the organization and its customers get maximum value from the use of information and technology.

      All three elements of the Technology Value Trinity work in harmony to deliver business value and achieve strategic needs. As one changes, the others need to change as well.

      • Digital and IT Strategy tells you what you need to achieve to be successful.
      • IT Operating Model and Organizational Design is the alignment of resources to deliver on your strategy and priorities.
      • Information & Technology Governance is the confirmation of IT’s goals and strategy, which ensures the alignment of IT and business strategy. It’s the mechanism by which you continuously prioritize work to ensure that what is delivered is in line with the strategy. This oversight evaluates, directs, and monitors the delivery of outcomes to ensure that the use of resources results in the achieving the organization’s goals.

      Too often strategy, operating model and organizational design, and governance are considered separate practices. As a result, “strategic documents” end up being wish lists, and projects continue to be prioritized based on who shouts the loudest – not based on what is in the best interest of the organization.

      Due Diligence & Preparation

      Step 3.1

      Assess the Target Organization

      Activities

      • 3.1.1 Drive value with a due diligence charter
      • 3.1.2 Identify data room artifacts
      • 3.1.3 Assess technical debt
      • 3.1.4 Valuate the target IT organization
      • 3.1.5 Assess culture

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Company M&A team
      • Business leaders
      • Prospective IT organization
      • Transition team

      Outcomes of Step

      This step of the process is when IT should actively evaluate the target organization being pursued for acquisition.

      3.1.1 Drive value with a due diligence charter

      1-2 hours

      Input: Key roles for the transaction team, M&A governance, Target metrics, Selected integration strategy framework, RACI of key transaction tasks for the transaction team

      Output: IT Due Diligence Charter

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to create a charter leveraging the items completed in the previous phase, as listed on the Due Diligence Prerequisite Checklist slide, to gain executive sign-off.

      1. In the IT Due Diligence Charter in the M&A Buy Playbook, complete the aspects of the charter that are relevant for you and your organization.
      2. We recommend including these items in the charter:
        • Communication plan
        • Transition team roles
        • Goals and metrics for the transaction
        • Integration strategy
        • Acquisition RACI
      3. Once the charter has been completed, ensure that business executives agree to the charter and sign off on the plan of action.

      Record the results in the M&A Buy Playbook.

      3.1.2 Identify data room artifacts

      4 hours

      Input: Future-state operating model, M&A governance, Target metrics, Selected integration strategy framework, RACI of key transaction tasks for the transaction team

      Output: List of items to acquire and review in the data room

      Materials: Critical domain lists on following slides, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

      The purpose of this activity is to create a list of the key artifacts that should be asked for and reviewed during the due diligence process.

      1. Review the lists on the following pages as a starting point. Identify which domains, stakeholders, artifacts, and information should be requested for the data room. This information should be directed to the target organization.
      2. IT leadership may or may not be asked to enter the data room directly. Therefore, it’s important that you clearly identify these artifacts.
      3. List each question or concern, select the associated workstream in the M&A Buy Playbook, and update the status of the information retrieval.
      4. Use the comments section to document your discoveries or concerns.

      Record the results in the M&A Buy Playbook.

      Critical domains

      Understand the key stakeholders and outputs for each domain

      Each critical domain will likely have different stakeholders who know that domain best. Communicate with these stakeholders throughout the M&A process to make sure you are getting accurate information and interpreting it correctly.

      Domain

      Stakeholders

      Key Artifacts

      Key Information to request

      Business
      • Enterprise Architecture
      • Business Relationship Manager
      • Business Process Owners
      • Business capability map
      • Capability map (the M&A team should be taking care of this, but make sure it exists)
      • Business satisfaction with various IT systems and services
      Leadership/IT Executive
      • CIO
      • CTO
      • CISO
      • IT budgets
      • IT capital and operating budgets (from current year and previous year)
      Data & Analytics
      • Chief Data Officer
      • Data Architect
      • Enterprise Architect
      • Master data domains, system of record for each
      • Unstructured data retention requirements
      • Data architecture
      • Master data domains, sources, and storage
      • Data retention requirements
      Applications
      • Applications Manager
      • Application Portfolio Manager
      • Application Architect
      • Applications map
      • Applications inventory
      • Applications architecture
      • Copy of all software license agreements
      • Copy of all software maintenance agreements
      Infrastructure
      • Head of Infrastructure
      • Enterprise Architect
      • Infrastructure Architect
      • Infrastructure Manager
      • Infrastructure map
      • Infrastructure inventory
      • Network architecture (including which data centers host which infrastructure and applications)
      • Inventory (including integration capabilities of vendors, versions, switches, and routers)
      • Copy of all hardware lease or purchase agreements
      • Copy of all hardware maintenance agreements
      • Copy of all outsourcing/external service provider agreements
      • Copy of all service-level agreements for centrally provided, shared services and systems
      Products and Services
      • Product Manager
      • Head of Customer Interactions
      • Product lifecycle
      • Product inventory
      • Customer market strategy

      Critical domains (continued)

      Understand the key stakeholders and outputs for each domain

      Domain

      Stakeholders

      Key Artifacts

      Key Information to request

      Operations
      • Head of Operations
      • Service catalog
      • Service overview
      • Service owners
      • Access policies and procedures
      • Availability and service levels
      • Support policies and procedures
      • Costs and approvals (internal and customer costs)
      IT Processes
      • CIO
      • IT Management
      • VP of IT Governance
      • VP of IT Strategy
      • IT process flow diagram
      • Processes in place and productivity levels (capacity)
      • Critical processes/processes the organization feels they do particularly well
      IT People
      • CIO
      • VP of Human Resources
      • IT organizational chart
      • Competency & capacity assessment
      • IT organizational structure (including resources from external service providers such as contractors) with appropriate job descriptions or roles and responsibilities
      • IT headcount and location
      Security
      • CISO
      • Security Architect
      • Security posture
      • Information security staff
      • Information security service providers
      • Information security tools
      • In-flight information security projects
      Projects
      • Head of Projects
      • Project portfolio
      • List of all future, ongoing, and recently completed projects
      Vendors
      • Head of Vendor Management
      • License inventory
      • Inventory (including what will and will not be transitioning, vendors, versions, number of licenses)

      Assess the target organization’s technical debt

      The other organization could be costly to purchase if not yet modernizing.

      • Consider the potential costs that your business will have to spend to get the other IT organization modernized or even digital.
      • This will be highly affected by your planned integration strategy.
      • A best-of-breed strategy might simply mean there's little to bring over from the other organization’s environment.
      • It’s often challenging to identify a direct financial cost for technical debt. Consider direct costs but also assess categories of impact that can have a long-term effect on your business: lost customer, staff, or business partner goodwill; limited flexibility and resilience; and health, safety, and compliance impacts.
      • Use more objective measures to track subjective impact. For example, consider the number of customers who could be significantly affected by each tech debt in the next quarter.

      Focus on solving the problems you need to address.

      Analyzing technical debt has value in that the analysis can help your organization make better risk management and resource allocation decisions.

      Review these examples of technical debt

      Do you have any of these challenges?

      Applications
      • Inefficient or incomplete code
      • Fragile or obsolete systems of record that limit the implementation of new functionality
      • Out-of-date IDEs or compilers
      • Unsupported applications
      Data & Analytics
      • Data presented via API that does not conform to chosen standards (EDI, NRF-ARTS, etc.)
      • Poor data governance
      • No transformation between OLTP and the data warehouse
      • Heavy use of OLTP for reporting
      • Lack of AI model and decision governance, maintenance
      End-User Computing
      • Aging and slow equipment
      • No configuration management
      • No MDM/UEM
      Security
      • Unpatched/unpatchable systems
      • Legacy firewalls
      • No data classification system
      • “Perimeter” security architecture
      • No documented security incident response
      • No policies, or unenforced policies
      Operations
      • Incomplete, ineffective, or undocumented business continuity and disaster recovery plans
      • Insufficient backups or archiving
      • Inefficient MACD processes
      • Application sprawl with no record of installed applications or licenses
      • No ticketing or ITSM system
      • No change management process
      • No problem management process
      • No event/alert management
      Infrastructure
      • End-of-life/unsupported equipment
      • Aging power or cooling systems
      • Water- or halon-based data center fire suppression systems
      • Out-of-date firmware
      • No DR site
      • Damaged or messy cabling
      • Lack of system redundancy
      • Integrated computers on business equipment (e.g. shop floor equipment, medical equipment) running out-of-date OS/software
      Project & Portfolio Management
      • No project closure process
      • Ineffective project intake process
      • No resource management practices

      “This isn’t a philosophical exercise. Knowing what you want to get out of this analysis informs the type of technical debt you will calculate and the approach you will take.” (Scott Buchholz, CTO, Deloitte Government & Public Services Practice, The Wall Street Journal, 2015)

      3.1.3 Assess technical debt

      1-2 hours

      Input: Participant views on organizational tech debt, Five to ten key technical debts, Business impact scoring scales, Reasonable next-quarter scenarios for each technical debt, Technical debt business impact analysis

      Output: Initial list of tech debt for the target organization

      Materials: Whiteboard, Sticky notes, Technical Debt Business Impact Analysis Tool, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Business leaders, Transition team

      The purpose of this activity is to assess the technical debt of the other IT organization. Taking on unnecessary technical debt is one of the biggest risks to the IT environment

      1. This activity can be completed by leveraging the blueprint Manage Your Technical Debt, specifically the Technical Debt Business Impact Analysis Tool. Complete the following activities in the blueprint:
        • 1.2.1 Identify your technical debt
        • 1.2.2 Select tech debt for your impact analysis
        • 2.2.2 Estimate tech debt impact
        • 2.2.3 Identify the most-critical technical debts
      2. Review examples of technical debt in the previous slide to assist you with this activity.
      3. Document the results from tab 3, Impact Analysis, in the M&A Buy Playbook if you are trying to record all artifacts related to the transaction in one place.

      Record the results in the M&A Buy Playbook.

      How to valuate an IT environment

      And why it matters so much

      • Valuating the target organization’s IT environment is a critical step to fully understand what it might be worth. Business partners are often not in the position to valuate the IT aspects to the degree that you would be.
      • The business investments in IT can be directly translated to a value amount. Meaning for every $1 invested in IT, the business might be gaining $100 in value back or possibly even loosing $100.
      • Determining, documenting, and communicating this information ensures that the business takes IT’s suggestions seriously and recognizes why investing in IT can be so critical.
      • There are three ways a business or asset can be valuated:
        • Cost Approach: Look at the costs associated with building, purchasing, replacing, and maintaining a given aspect of the business.
        • Market Approach: Look at the relative value of a particular aspect of the business. Relative value can fluctuate and depends on what the markets and consequently society believe that particular element is worth.
        • Discounted Cash Flow Approach: Focus on what the potential value of the business could be or the intrinsic value anticipated due to future profitability.

      The IT valuation conducted during due diligence can have a significant impact on the final financials of the transaction for the business.

      3.1.4 Valuate the target IT organization

      1 day

      Input: Valuation of data, Valuation of applications, Valuation of infrastructure and operations, Valuation of security and risk

      Output: Valuation of target organization’s IT

      Materials: Relevant templates/tools, Capital budget, Operating budget, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Prospective IT organization

      The purpose of this activity is to valuate the other IT organization.

      1. Review each of slides 42 to 45 to generate a valuation of IT’s data, applications, infrastructure, and security and risk. These valuations consider several tangible and intangible factors and result in a final dollar amount. For more information on this activity, review Activity 1.2.1 from the Proactive phase.
      2. Identify financial amounts for each critical area and add the financial output to the summary slide in the M&A Buy Playbook.
      3. Compare this information against your own IT organization’s valuation.
        1. Does it add value to your IT organization?
        2. Is there too much risk to accept if this transaction goes through?

      Info-Tech Insight

      Consistency is key when valuating your IT organization as well as other IT organizations throughout the transaction process.

      Record the results in the M&A Buy Playbook.

      Culture should not be overlooked, especially as it relates to the integration of IT environments

      • There are three types of culture that need to be considered.
      • Most importantly, this transition is an opportunity to change the culture that might exist in your organization’s IT environment.
      • Make a decision on which type of culture you’d like IT to have post-transition.

      Target Organization’s Culture

      The culture that the target organization is currently embracing. Their established and undefined governance practices will lend insight into this.

      Your Organization’s Culture

      The culture that your organization is currently embracing. Examine people’s attitudes and behaviors within IT toward their jobs and the organization.

      Ideal Culture

      What will the future culture of the IT organization be once integration is complete? Are there aspects that your current organization and the target organization embrace that are worth considering?

      Culture categories

      Map the results of the IT Culture Diagnostic to an existing framework

      Competitive
      • Autonomy
      • Confront conflict directly
      • Decisive
      • Competitive
      • Achievement oriented
      • Results oriented
      • High performance expectations
      • Aggressive
      • High pay for good performance
      • Working long hours
      • Having a good reputation
      • Being distinctive/different
      Innovative
      • Adaptable
      • Innovative
      • Quick to take advantage of opportunities
      • Risk taking
      • Opportunities for professional growth
      • Not constrained by rules
      • Tolerant
      • Informal
      • Enthusiastic
      Traditional
      • Stability
      • Reflective
      • Rule oriented
      • Analytical
      • High attention to detail
      • Organized
      • Clear guiding philosophy
      • Security of employment
      • Emphasis on quality
      • Focus on safety
      Cooperative
      • Team oriented
      • Fair
      • Praise for good performance
      • Supportive
      • Calm
      • Developing friends at work
      • Socially responsible

      Culture Considerations

      • What culture category was dominant for each IT organization?
      • Do you share the same dominant category?
      • Is your current dominant culture category the most ideal to have post-integration?

      3.1.5 Assess Culture

      3-4 hours

      Input: Cultural assessments for current IT organization, Cultural assessment for target IT organization

      Output: Goal for IT culture

      Materials: IT Culture Diagnostic, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, IT employees of current organization, IT employees of target organization, Company M&A team

      The purpose of this activity is to assess the different cultures that might exist within the IT environments of both organizations. More importantly, your IT organization can select its desired IT culture for the long term if it does not already exist.

      1. Complete this activity by leveraging the blueprint Fix Your IT Culture, specifically the IT Culture Diagnostic. Fill out the diagnostic for the IT department in your organization:
        1. Answer the 16 questions in tab 2, Diagnostic.
        2. Find out your dominant culture and review recommendations in tab 3, Results.
      2. Document the results from tab 3, Results, in the M&A Buy Playbook if you are trying to record all artifacts related to the transaction in one place.
      3. Repeat the activity for the target organization.
      4. Leverage the information to determine what the goal for the culture of IT will be post-integration if it will differ from the current culture.

      Record the results in the M&A Buy Playbook.

      Due Diligence & Preparation

      Step 3.2

      Prepare to Integrate

      Activities

      • 3.2.1 Prioritize integration tasks
      • 3.2.2 Establish the integration roadmap
      • 3.2.3 Identify the needed workforce supply
      • 3.2.4 Estimate integration costs
      • 3.2.5 Create an employee transition plan
      • 3.2.6 Create functional workplans for employees
      • 3.2.7 Align project metrics with identified tasks

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Transition team
      • Company M&A team

      Outcomes of Step

      Have an established plan of action toward integration across all domains and a strategy toward resources.

      Don’t underestimate the importance of integration preparation

      Integration is the process of combining the various components of one or more organizations into a single organization.

      80% of integration should happen within the first two years. (Source: CIO Dive)

      70% of M&A IT integrations fail due to components that could and should be addressed at the beginning. (Source: The Wall Street Journal, 2019)

      Info-Tech Insight

      Integration is not rationalization. Once the organization has integrated, it can prepare to rationalize the IT environment.

      Integration needs

      Identify your domain needs to support the target technology environment

      Set up a meeting with your IT due diligence team to:

      • Address data, applications, infrastructure, and other domain gaps.
      • Discuss the people and processes necessary to achieve the target technology environment and support M&A business objectives.

      Use this opportunity to:

      • Identify data and application complexities between your organization and the target organization.
      • Identify the IT people and process gaps, redundancies, and initiatives.
      • Determine your infrastructure needs and identify redundancies.
        • Does IT have the infrastructure to support the applications and business capabilities of the resultant enterprise?
        • Identify any gaps between the current infrastructure in both organizations and the infrastructure required in the resultant enterprise.
        • Identify any redundancies.
        • Determine the appropriate IT integration strategies.
      • Document your gaps, redundancies, initiatives, and assumptions to help you track and justify the initiatives that must be undertaken and help estimate the cost of integration.

      Integration implications

      Understand the implications for integration with respect to each target technology environment

      Domain

      Independent Models

      Create Links Between Critical Systems

      Move Key Capabilities to Common Systems

      Adopt One Model

      Data & Analytics

      • Consider data sources that might need to be combined (e.g. financials, email lists, internet).
      • Understand where each organization will warehouse its data and how it will be managed in a cost-effective manner.
      • Consider your reporting and transactional needs. Initially systems may remain separate, but eventually they will need to be merged.
      • Analyze whether or not the data types are compatible between companies.
      • Understand the critical data needs and the complexity of integration activities.
      • Consider your reporting and transactional needs. Initially systems may remain separate, but eventually they will need to be merged.
      • Focus on the master data domains that represent the core of your business.
      • Assess the value, size, location, and cleanliness of the target organization’s data sets.
      • Determine the data sets that will be migrated to capture expected synergies and drive core capabilities while addressing how other data sets will be maintained and managed.
      • Decide which applications to keep and which to terminate. This includes setting timelines for application retirement.
      • Establish interim linkages and common interfaces for applications while major migrations occur.

      Applications

      • Establish whether or not there are certain critical applications that still need to be linked (e.g. email, financials).
      • Leverage the unique strengths and functionalities provided by the applications used by each organization.
      • Confirm that adequate documentation and licensing exists.
      • Decide which critical applications need to be linked versus which need to be kept separate to drive synergies. For example, financial, email, and CRM may need to be linked, while certain applications may remain distinct.
      • Pay particular attention to the extent to which systems relating to customers, products, orders, and shipments need to be integrated.
      • Determine the key capabilities that require support from the applications identified by business process owners.
      • Assess which major applications need to be adopted by both organizations, based on the M&A goals.
      • Establish interim linkages and common interfaces for applications while major migrations occur.
      • Decide which applications to keep and which to terminate. This includes setting timelines for application retirement.
      • Establish interim linkages and common interfaces for applications while major migrations occur.

      Integration implications (continued)

      Understand the implications for integration with respect to each target technology environment

      Domain

      Independent Models

      Create Links Between Critical Systems

      Move Key Capabilities to Common Systems

      Adopt One Model

      Infrastructure

      • Assess the infrastructure demands created by retaining separate models (e.g. separate domains, voice, network integration).
      • Evaluate whether or not there are redundant data centers that could be consolidated to reduce costs.
      • Assess the infrastructure demands created by retaining separate models (e.g. separate domains, voice, network integration).
      • Evaluate whether or not there are redundant data centers that could be consolidated to reduce costs.
      • Evaluate whether certain infrastructure components, such as data centers, can be consolidated to support the new model while also eliminating redundancies. This will help reduce costs.
      • Assess which infrastructure components need to be kept versus which need to be terminated to support the new application portfolio. Keep in mind that increasing the transaction volume on a particular application increases the infrastructure capacity that is required for that application.
      • Extend the network to integrate additional locations.

      IT People & Processes

      • Retain workers from each IT department who possess knowledge of key products, services, and legacy systems.
      • Consider whether there are redundancies in staffing that could be eliminated.
      • The IT processes of each organization will most likely remain separate.
      • Consider the impact of the target organization on your IT processes.
      • Retain workers from each IT department who possess knowledge of key products, services, and legacy systems.
      • Consider whether there are redundancies in staffing that could be eliminated.
      • Consider how critical IT processes of the target organization fit with your current IT processes.
      • Identify which redundant staff members should be terminated by focusing on the key skills that will be necessary to support the common systems.
      • If there is overlap with the IT processes in both organizations, you may wish to map out both processes to get a sense for how they might work together.
      • Assess what processes will be prioritized to support IT strategies.
      • Identify which redundant staff members should be terminated by focusing on the key skills that will be necessary to support the prioritized IT processes.

      Integration implications (continued)

      Understand the implications for integration with respect to each target technology environment

      Domain

      Independent Models

      Create Links Between Critical Systems

      Move Key Capabilities to Common Systems

      Adopt One Model

      Leadership/IT Executive

      • Have insight into the goals and direction of the organization’s leadership. Make sure that a communication path has been established to receive information and provide feedback.
      • The decentralized model will require some form of centralization and strong governance processes to enable informed decisions.
      • Ensure that each area can deliver on its needs while not overstepping the goals and direction of the organization.
      • This will help with integration in the sense that front-line employees can see a single organization beginning to form.
      • In this model, there is the opportunity to select elements of each leadership style and strategy that will work for the larger organization.
      • Leadership can provide a single and unified approach to how the strategic goals will be executed.
      • More often than not, this would be the acquiring organization’s strategic direction.

      Vendors

      • Determine which contracts the target organization currently has in place.
      • Having different vendors in place will not be a bad model if it makes sense.
      • Spend time reviewing the contracts and ensuring that each organization has the right contracts to succeed.
      • Identify what redundancies might exist (ERPs, for example) and determine if the vendor would be willing to terminate one contract or another.
      • Through integration, it might be possible to engage in one set of contract negotiations for a single application or technology.
      • Identify whether there are opportunities to combine contracts or if they must remain completely separated until the end of the term.
      • In an effort to capitalize on the contracts working well, reduce the contracts that might be hindering the organization.
      • Speak to the vendor offering the contract.
      • Going forward, ensure the contracts are negotiated to include clauses to allow for easier and more cost-effective integration.

      Integration implications (continued)

      Understand the implications for integration with respect to each target technology environment

      Domain

      Independent Models

      Create Links Between Critical Systems

      Move Key Capabilities to Common Systems

      Adopt One Model

      Security

      • Both organizations would need to have a process for securing their organization.
      • Sharing and accessing information might be more difficult, as each organization would need to keep the other organization separate to ensure the organization remains secure.
      • Creating standard policies and procedures that each organization must adhere to would be critical here (for example, multifactor authentication).
      • Establish a single path of communication between the two organizations, ensuring reliable and secure data and information sharing.
      • Leverage the same solutions to protect the business as a whole from internal and external threats.
      • Identify opportunities where there might be user points of failure that could be addressed early in the process.
      • Determine what method of threat detection and response will best support the business and select that method to apply to the entire organization, both original and newly acquired.

      Projects

      • Projects remain ongoing as they were prior to the integration.
      • Some projects might be made redundant after the initial integration is over.
      • Re-evaluate the projects after integration to ensure they continue to deliver on the business’ strategic direction.
      • Determine which projects are similar to one another and identify opportunities to leverage business needs and solutions for each organization where possible.
      • Review project histories to determine the rationale for and success of projects that could be reused in either organization going forward.
      • Determine which projects should remain ongoing and which projects could wait to be implemented or could be completely stopped.
      • There might be certain modernization projects ongoing that cannot be stopped.
      • However, for all other projects, embrace a single portfolio.
      • Completely reduce or remove all ongoing projects from the one organization and continue with only the projects of the other organization.
      • Add in new projects when they arise as needed.

      3.2.1 Prioritize integration tasks

      2 hours

      Input: Integration tasks, Transition team, M&A RACI

      Output: Prioritized integration list

      Materials: Integration task checklist, Integration roadmap

      Participants: IT executive/CIO, IT senior leadership, Company M&A team

      The purpose of this activity is to prioritize the different integration tasks that your organization has identified as necessary to this transaction. Some tasks might not be relevant for this particular transaction, and others might be critical.

      1. Download the SharePoint or Excel version of the M&A Integration Project Management Tool. Identify which integration tasks you want as part of your project plan. Alter or remove any tasks that are irrelevant to your organization. Add in tasks you think are missing.
      2. When deciding criticality of the task, consider the effect on stakeholders, those who are impacted or influenced in the process of the task, and dependencies (e.g. data strategy needs to be addressed first before you can tackle its dependencies, like data quality).
      3. Feel free to edit the way you measure criticality. The standard tool leverages a three-point scale. At the end, you should have a list of tasks in priority order based on criticality.

      Record the updates in the M&A Integration Project Management Tool (SharePoint).

      Record the updates in the M&A Integration Project Management Tool (Excel).

      Integration checklists

      Prerequisite Checklist
      • Build the project plan for integration and prioritize activities
        • Plan first day
        • Plan first 30/100 days
        • Plan first year
      • Create an organization-aligned IT strategy
      • Identify critical stakeholders
      • Create a communication strategy
      • Understand the rationale for the acquisition or purchase
      • Develop IT's purchasing strategy
      • Determine goal opportunities
      • Create the mission and vision statements
      • Create the guiding principles
      • Create program metrics
      • Consolidate reports from due diligence/data room
      • Conduct culture assessment
      • Create a transaction team
      • Assess workforce demand and supply
      • Plan and communicate potential layoffs
      • Create an employee transition plan
      • Identify the IT investment
      Business
      • Design an enterprise architecture
      • Document your business architecture
      • Identify and assess all of IT's risks
      Leadership/IT Executive
      • Build an IT budget
      • Structure operating budget
      • Structure capital budget
      • Identify the needed workforce demand vs. capacity
      • Establish and monitor key metrics
      • Communicate value realized/cost savings
      Data
      • Confirm data strategy
      • Confirm data governance
      • Data architecture
      • Data sources
      • Data storage (on-premises vs. cloud)
      • Enterprise content management
      • Compatibility of data types between organizations
      • Cleanliness/usability of target organization data sets
      • Identify data sets that need to be combined to capture synergies/drive core capabilities
      • Reporting and analytics capabilities
      Applications
      • Prioritize and address critical applications
        • ERP
        • CRM
        • Email
        • HRIS
        • Financial
        • Sales
        • Risk
        • Security
      • Leverage application rationalization framework to determine applications to keep, terminate, or create
      • Develop method of integrating applications
      • Model critical applications that have dependencies on one another
      • Identify the infrastructure capacity required to support critical applications
      Operations
      • Communicate helpdesk/service desk information
      • Manage sales access to customer data
      • Determine locations and hours of operation
      • Consolidate phone lists and extensions
      • Synchronize email address books

      Integration checklists (continued)

      Infrastructure
      • Determine single network access
      • Manage organization domains
      • Consolidate data centers
      • Compile inventory of vendors, versions, switches, and routers
      • Review hardware lease or purchase agreements
      • Review outsourcing/service provider agreements
      • Review service-level agreements
      • Assess connectivity linkages between locations
      • Plan to migrate to a single email system if necessary
      Vendors
      • Establish a sustainable vendor management office
      • Review vendor landscape
      • Identify warranty options
      • Rationalize vendor services and solutions
      • Identify opportunities to mature the security architecture
      People
      • Design an IT operating model
      • Redesign your IT organizational structure
      • Conduct a RACI
      • Conduct a culture assessment and identify goal IT culture
      • Build an IT employee engagement program
      • Determine critical roles and systems/process/products they support
      • Create a list of employees to be terminated
      • Create employee transition plans
      • Create functional workplans
      Projects
      • Stop duplicate or unnecessary target organization projects
      • Communicate project intake process
      • Prioritize projects
      Products & Services
      • Ensure customer services requirements are met
      • Ensure customer interaction requirements are met
      • Select a solution for product lifecycle management
      Security
      • Conduct a security assessment of target organization
      • Develop accessibility prioritization and schedule
      • Establish an information security strategy
      • Develop a security awareness and training program
      • Develop and manage security governance, risk, and compliance
      • Identify security budget
      • Build a data privacy and classification program
      IT Processes
      • Evaluate current process models
      • Determine productivity/capacity levels of processes
      • Identify processes to be terminated
      • Identify process expectations from target organization
      • Establish a communication plan
      • Develop a change management process
      • Establish/review IT policies

      3.2.2 Establish the integration roadmap

      2 hours

      Input: Prioritized integration tasks, Employee transition plan, Integration RACI, Costs for activities, Activity owners

      Output: Integration roadmap

      Materials: M&A Integration Project Plan Tool (SharePoint), M&A Integration Project Plan Tool (Excel)

      Participants: IT executive/CIO, IT senior leadership, Transition team, Company M&A team

      The purpose of this activity is to create a roadmap to support IT throughout the integration process. Using the information gathered in previous activities, you can create a roadmap that will ensure a smooth integration.

      1. Leverage our M&A Integration Project Management Tool to track critical elements of the integration project. There are a few options available:
        1. Follow the instructions on the next slide if you are looking to upload our SharePoint project template.
        2. If you cannot or do not want to use SharePoint as your project management solution, download our Excel version of the tool.
          **Remember that this your tool, so customize to your liking.
      2. Identify who will own or be accountable for each of the integration tasks and establish the time frame for when each project should begin and end. This will confirm which tasks should be prioritized.

      Record the updates in the M&A Integration Project Management Tool (SharePoint).

      Record the updates in the M&A Integration Project Management Tool (Excel).

      Integration Project Management Tool (SharePoint Template)

      Follow these instructions to upload our template to your SharePoint environment

      1. Create or use an existing SP site.
      2. Download the M&A Integration Project Plan Tool (SharePoint) .wsp file from the Mergers & Acquisitions: The Buy Blueprint landing page.
      3. To import a template into your SharePoint environment, do the following:
        1. Open PowerShell.
        2. Connect-SPO Service (need to install PowerShell module).
        3. Enter in your tenant admin URL.
        4. Enter in your admin credentials.
        5. Set-SPO Site https://YourDomain.sharepoint.com/sites/YourSiteHe... -DenyAddAndCustomizePages 0
        OR
        1. Turn on both custom script features to allow users to run custom
      4. Screenshot of the 'Custom Script' option for importing a template into your SharePoint environment. Feature description reads 'Control whether users can run custom script on personal sites and self-service created sites. Note: changes to this setting might take up to 24 hours to take effect. For more information, see http://go.microsoft.com/fwlink/?LinkIn=397546'. There are options to prevent or allow users from running custom script on personal/self-service created sites.
      5. Enable the SharePoint Server Standard Site Collection features.
      6. Upload the .wsp file in Solutions Gallery.
      7. Deploy by creating a subsite and select from custom options.
        • Allow or prevent custom script
        • Security considerations of allowing custom script
        • Save, download, and upload a SharePoint site as a template
      8. Refer to Microsoft documentation to understand security considerations and what is and isn’t supported:

      For more information, check out the SharePoint Template: Step-by-Step Deployment Guide.

      Participate in active workforce planning to transition employees

      The chosen IT operating model, primary M&A goals, and any planned changes to business strategy will dramatically impact IT staffing and workforce planning efforts.

      Visualization of the three aspects of 'IT workforce planning', as listed below.

      IT workforce planning

      • Primary M&A goals
        If the goal of the M&A is cost cutting, then workforce planning will be necessary to identify labor redundancies.
      • Changes to business strategy
        If business strategy will change after the merger, then workforce planning will typically be more involved than if business strategy will not change.
      • Integration strategy
        For independent models, workforce planning will typically be unnecessary.
        For connection of essential systems or absorption, workforce planning will likely be an involved, time-consuming process.
      1. Estimate the headcount you will need through the end of the M&A transition period.
      2. Outline the process you will use to assess staff for roles that have more than one candidate.
      3. Review employees in each department to determine the best fit for each role.
      4. Determine whether terminations will happen all together or in waves.

      Info-Tech Insight

      Don’t be a short-term thinker when it comes to workforce planning! IT teams that only consider the headcount needed on day one of the new entity will end up scrambling to find skilled resources to fill workforce gaps later in the transition period.

      3.2.3 Identify the needed workforce supply

      3-4 hours

      Input: IT strategy, Prioritized integration tasks

      Output: A clear indication of how many resources are required for each role and the number of resources that the organization actually has

      Materials: Resource Management Supply-Demand Calculator

      Participants: IT executive/CIO, IT senior leadership, Target organization employees, Company M&A team, Transition team

      The purpose of this activity is to determine the anticipated amount of work that will be required to support projects (like integration), administrative, and keep-the-lights-on activities.

      1. Download the Resource Management Supply-Demand Calculator.
      2. The calculator requires minimal up-front staff participation: You can obtain meaningful results with participation from as few as one person with insight on the distribution of your resources and their average work week or month.
      3. The calculator will yield a report that shows a breakdown of your annual resource supply and demand, as well as the gap between the supply and demand. Further insight on project and non-project supply and demand are provided.
      4. Repeat the tool several times to identify the needs of your IT environment for day one, day 30/100, and year one. Anticipate that these will change over time. Also, do not forget to obtain this information from the target organization. Given that you will be integrating, it’s important to know how many staff they have in which roles.
      5. **For additional information, please review slides starting from slide 44 in Establish Realistic IT Resource Management Practices to see how to use the tool.

      Record the results in the Resource Management Supply-Demand Calculator.

      Resource Supply-Demand Calculator Output Example

      Example of a 'Resource Management Supply-Demand Analysis Report' with charts and tables measuring Annualized Resource Supply and Demand, Resource Capacity Confidence, Project Capacity, and combinations of those metrics.

      Resource Capacity Confidence. This figure is based on your confidence in supply confidence, demand stability, and the supply-demand ratio.

      Importance of estimating integration costs

      Change is the key driver of integration costs

      Integration costs are dependent on the following:
      • Meeting synergy targets – whether that be cost saving or growth related.
        • Employee-related costs, licensing, and reconfiguration fees play a huge part in meeting synergy targets.
      • Adjustments related to compliance or regulations – especially if there are changes to legal entities, reporting requirements, or risk-mitigation standards.
      • Governance or third party–related support required to ensure timelines are met and the integration is a success.
      Integration costs vary by industry type.
      • Certain industries may have integration costs made up of mostly one type, differing from other industries, due to the complexity and different demands of the transaction. For example:
        • Healthcare integration costs are mostly driven by regulatory, safety, and quality standards, as well as consolidation of the research and development function.
        • Energy and Utilities tend to have the lowest integration costs due to most transactions occurring within the same sector rather than as a cross-sector investment. For example, oil and gas acquisitions tend to be for oil fields and rigs (strategic fixed assets), which can easily be added to the buyer’s portfolio.

      Integration costs are more related to the degree of change required than the size of the transaction.

      3.2.4 Estimate integration costs

      3-4 hours

      Input: Integration tasks, Transition team, Valuation of current IT environment, Valuation of target IT environment, Outputs from data room, Technical debt, Employees

      Output: List of anticipated costs required to support IT integration

      Materials: Integration task checklist, Integration roadmap, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

      The purpose of this activity is to estimate the costs that will be associated with the integration. It’s important to ensure a realistic figure is identified and communicated to the larger M&A team within your company as early in the process as possible. This ensures that the funding required for the transaction is secured and budgeted for in the overarching transaction.

      1. On the associated slide in the M&A Buy Playbook, input:
        • Task
        • Domain
        • Cost type
        • Total cost amount
        • Level of certainty around the cost
      2. Provide a copy of the estimated costs to the company’s M&A team. Also provide any additional information identified earlier to help them understand the importance of those costs.

      Record the results in the M&A Buy Playbook.

      Employee transition planning

      Considering employee impact will be a huge component to ensure successful integration

      • Meet With Leadership
      • Plan Individual and Department Redeployment
      • Plan Individual and Department Layoffs
      • Monitor and Manage Departmental Effectiveness
      • For employees, the transition could mean:
        • Changing from their current role to a new role to meet requirements and expectations throughout the transition.
        • Being laid off because the role they are currently occupying has been made redundant.
      • It is important to plan for what the M&A integration needs will be and what the IT operational needs will be.
      • A lack of foresight into this long-term plan could lead to undue costs and headaches trying to retain critical staff, rehiring positions that were already let go, and keeping redundant employees longer then necessary.

      Info-Tech Insight

      Being transparent throughout the process is critical. Do not hesitate to tell employees the likelihood that their job may be made redundant. This will ensure a high level of trust and credibility for those who remain with the organization after the transaction.

      3.2.5 Create an employee transition plan

      3-4 hours

      Input: IT strategy, IT organizational design, Resource Supply-Demand Calculator output

      Output: Employee transition plans

      Materials: M&A Buy Playbook, Whiteboard, Sticky notes, Markers

      Participants: IT executive/CIO, IT senior leadership, Company M&A team, Transition team

      The purpose of this activity is to create a transition plan for employees.

      1. Transition planning can be done at specific individual levels or more broadly to reflect a single role. Consider these four items in the transition plan:
        • Understand the direction of the employee transitions.
        • Identify employees that will be involved in the transition (moved or laid off).
        • Prepare to meet with employees.
        • Meet with employees.
      2. For each employee that will be facing some sort of change in their regular role, permanent or temporary, create a transition plan.
      3. For additional information on transitioning employees, review the blueprint Streamline Your Workforce During a Pandemic.

      **Note that if someone’s future role is a layoff, then there is no need to record anything for skills needed or method for skill development.

      Record the results in the M&A Buy Playbook.

      3.2.6 Create functional workplans for employees

      3-4 hours

      Input: Prioritized integration tasks, Employee transition plan, Integration RACI, Costs for activities, Activity owners

      Output: Employee functional workplans

      Materials: M&A Buy Playbook, Learning and development tools

      Participants: IT executive/CIO, IT senior leadership, IT management team, Company M&A team, Transition team

      The purpose of this activity is to create a functional workplan for the different employees so that they know what their key role and responsibilities are once the transaction occurs.

      1. First complete the transition plan from the previous activity (3.2.5) and the separation roadmap. Have these documents ready to review throughout this process.
      2. Identify the employees who will be transitioning to a new role permanently or temporarily. Creating a functional workplan is especially important for these employees.
      3. Identify the skills these employees need to have to support the separation. Record this in the corresponding slide in the M&A Buy Playbook.
      4. For each employee, identify someone who will be a point of contact for them throughout the transition.

      It is recommended that each employee have a functional workplan. Leverage the IT managers to support this task.

      Record the results in the M&A Buy Playbook.

      Metrics for integration

      Valuation & Due Diligence

      • % Defects discovered in production
      • $ Cost per user for enterprise applications
      • % In-house-built applications vs. enterprise applications
      • % Owners identified for all data domains
      • # IT staff asked to participate in due diligence
      • Change to due diligence
      • IT budget variance
      • Synergy target

      Execution & Value Realization

      • % Satisfaction with the effectiveness of IT capabilities
      • % Overall end-customer satisfaction
      • $ Impact of vendor SLA breaches
      • $ Savings through cost-optimization efforts
      • $ Savings through application rationalization and technology standardization
      • # Key positions empty
      • % Frequency of staff turnover
      • % Emergency changes
      • # Hours of unplanned downtime
      • % Releases that cause downtime
      • % Incidents with identified problem record
      • % Problems with identified root cause
      • # Days from problem identification to root cause fix
      • % Projects that consider IT risk
      • % Incidents due to issues not addressed in the security plan
      • # Average vulnerability remediation time
      • % Application budget spent on new build/buy vs. maintenance (deferred feature implementation, enhancements, bug fixes)
      • # Time (days) to value realization
      • % Projects that realized planned benefits
      • $ IT operational savings and cost reductions that are related to synergies/divestitures
      • % IT staff–related expenses/redundancies
      • # Days spent on IT integration
      • $ Accurate IT budget estimates
      • % Revenue growth directly tied to IT delivery
      • % Profit margin growth

      3.2.7 Align project metrics with identified tasks

      3-4 hours

      Input: Prioritized integration tasks, Employee transition plan, Integration RACI, Costs for activities, Activity owners, M&A goals

      Output: Integration-specific metrics to measure success

      Materials: Roadmap template, M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Transition team

      The purpose of this activity is to understand how to measure the success of the integration project by aligning metrics to each identified task.

      1. Review the M&A goals identified by the business. Your metrics will need to tie back to those business goals.
      2. Identify metrics that align to identified tasks and measure achievement of those goals. For each metric you consider, ask the following questions:
        • What is the main goal or objective that this metric is trying to solve?
        • What does success look like?
        • Does the metric promote the right behavior?
        • Is the metric actionable? What is the story you are trying to tell with this metric?
        • How often will this get measured?
        • Are there any metrics it supports or is supported by?

      Record the results in the M&A Buy Playbook.

      By the end of this mid-transaction phase you should:

      Have successfully evaluated the target organization’s IT environment, escalated the acquisition risks and benefits, and prepared IT for integration.

      Key outcomes from the Due Diligence & Preparation phase
      • Participate in due diligence activities to accurately valuate the target organization(s) and determine if there are critical risks or benefits the current organization should be aware of.
      • Create an integration roadmap that considers the tasks that will need to be completed and the resources required to support integration.
      Key deliverables from the Due Diligence & Preparation phase
      • Establish a due diligence charter
      • Create a list of data room artifacts and engage in due diligence
      • Assess the target organization’s technical debt
      • Valuate the target IT organization
      • Assess and plan for culture
      • Prioritize integration tasks
      • Establish the integration roadmap
      • Identify the needed workforce supply
      • Estimate integration costs
      • Create employee transition plans
      • Create functional workplans for employees
      • Align project metrics with identified tasks

      M&A Buy Blueprint

      Phase 4

      Execution & Value Realization

      Phase 1Phase 2Phase 3

      Phase 4

      • 1.1 Identify Stakeholders and Their Perspective of IT
      • 1.2 Assess IT’s Current Value and Future State
      • 1.3 Drive Innovation and Suggest Growth Opportunities
      • 2.1 Establish the M&A Program Plan
      • 2.2 Prepare IT to Engage in the Acquisition
      • 3.1 Assess the Target Organization
      • 3.2 Prepare to Integrate
      • 4.1 Execute the Transaction
      • 4.2 Reflection and Value Realization

      This phase will walk you through the following activities:

      • Rationalize the IT environment
      • Continually update the project plan
      • Confirm integration costs
      • Review IT’s transaction value
      • Conduct a transaction and integration SWOT
      • Review the playbook and prepare for future transactions

      This phase involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Vendor management team
      • IT transaction team
      • Company M&A team

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Work

      Day 1

      Day 2

      Day 3

      Engage in Integration

      Day 4

      Establish the Transaction FoundationDiscover the Motivation for IntegrationPlan the Integration RoadmapPrepare Employees for the TransitionEngage in IntegrationAssess the Transaction Outcomes (Must be within 30 days of transaction date)

      Activities

      • 0.1 Understand the rationale for the company's decisions to pursue an acquisition.
      • 0.2 Identify key stakeholders and determine the IT transaction team.
      • 0.3 Gather and evaluate the M&A strategy, future-state operating model, and governance.
      • 1.1 Review the business rationale for the acquisition.
      • 1.2 Identify pain points and opportunities tied to the acquisition.
      • 1.3 Establish the integration strategy.
      • 1.4 Prioritize Integration tasks.
      • 2.1 Establish the integration roadmap.
      • 2.2 Establish and align project metrics with identified tasks.
      • 2.3 Estimate integration costs.
      • 3.1 Assess the current culture and identify the goal culture.
      • 3.2 Identify the needed workforce supply.
      • 3.3 Create an employee transition plan.
      • 3.4 Create functional workplans for employees.
      • I.1 Complete the integration by regularly updating the project plan.
      • I.2 Begin to rationalize the IT environment where possible and necessary.
      • 4.1 Confirm integration costs.
      • 4.2 Review IT’s transaction value.
      • 4.3 Conduct a transaction and integration SWOT.
      • 4.4 Review the playbook and prepare for future transactions.

      Deliverables

      1. IT strategy
      2. IT operating model
      3. IT governance structure
      4. M&A transaction team
      1. Business context implications for IT
      2. Integration strategy
      1. Integration roadmap and associated resourcing
      1. Culture assessment
      2. Workforce supply identified
      3. Employee transition plan
      1. Rationalized IT environment
      2. Updated integration project plan
      1. SWOT of transaction
      2. M&A Buy Playbook refined for future transactions

      What is the Execution & Value Realization phase?

      Post-transaction state

      Once the transaction comes to a close, it’s time for IT to deliver on the critical integration tasks. Set the organization up for success by having an integration roadmap. Retaining critical IT staff throughout this process will also be imperative to the overall transaction success.

      Throughout the integration process, roadblocks will arise and need to be addressed. However, by ensuring that employees, technology, and processes are planned for ahead of the transaction, you as IT will be able to weather those unexpected concerns with greater ease.

      Now that you as an IT leader have engaged in an acquisition, demonstrating the value IT was able to provide to the process is critical to establishing a positive and respected relationship with other senior leaders in the business. Be prepared to identify the positives and communicate this value to advance the business’ perception of IT.

      Goal: To carry out the planned integration activities and deliver the intended value to the business

      Execution Prerequisite Checklist

      Before coming into the Execution & Value Realization phase, you must have addressed the following:

      • Understand the rationale for the company's decisions to pursue an acquisition and what opportunities or pain points the acquisition should alleviate.
      • Identify the key roles for the transaction team.
      • Identify the M&A governance.
      • Determine target metrics and align to project tasks.
      • Select an integration strategy framework.
      • Conduct a RACI for key transaction tasks for the transaction team.
      • Create a list of data room artifacts and engage in due diligence (directly or indirectly).
      • Prioritize integration tasks.
      • Establish the integration roadmap.
      • Identify the needed workforce supply.
      • Create employee transition plans.

      Before coming into the Execution & Value Realization phase, we recommend addressing the following:

      • Create vision and mission statements.
      • Establish guiding principles.
      • Create a future-state operating model.
      • Identify the M&A operating model.
      • Document the communication plan.
      • Examine the business perspective of IT.
      • Identify key stakeholders and outline their relationship to the M&A process.
      • Be able to valuate the IT environment and communicate IT's value to the business.
      • Establish a due diligence charter.
      • Assess the target organization’s technical debt.
      • Valuate the target IT organization.
      • Assess and plan for culture.
      • Estimate integration costs.
      • Create functional workplans for employees.

      Integration checklists

      Prerequisite Checklist
      • Build the project plan for integration and prioritize activities
        • Plan first day
        • Plan first 30/100 days
        • Plan first year
      • Create an organization-aligned IT strategy
      • Identify critical stakeholders
      • Create a communication strategy
      • Understand the rationale for the acquisition or purchase
      • Develop IT's purchasing strategy
      • Determine goal opportunities
      • Create the mission and vision statements
      • Create the guiding principles
      • Create program metrics
      • Consolidate reports from due diligence/data room
      • Conduct culture assessment
      • Create a transaction team
      • Assess workforce demand and supply
      • Plan and communicate potential layoffs
      • Create an employee transition plan
      • Identify the IT investment
      Business
      • Design an enterprise architecture
      • Document your business architecture
      • Identify and assess all of IT's risks
      Leadership/IT Executive
      • Build an IT budget
      • Structure operating budget
      • Structure capital budget
      • Identify the needed workforce demand vs. capacity
      • Establish and monitor key metrics
      • Communicate value realized/cost savings
      Data
      • Confirm data strategy
      • Confirm data governance
      • Data architecture
      • Data sources
      • Data storage (on-premises vs. cloud)
      • Enterprise content management
      • Compatibility of data types between organizations
      • Cleanliness/usability of target organization data sets
      • Identify data sets that need to be combined to capture synergies/drive core capabilities
      • Reporting and analytics capabilities
      Applications
      • Prioritize and address critical applications
        • ERP
        • CRM
        • Email
        • HRIS
        • Financial
        • Sales
        • Risk
        • Security
      • Leverage application rationalization framework to determine applications to keep, terminate, or create
      • Develop method of integrating applications
      • Model critical applications that have dependencies on one another
      • Identify the infrastructure capacity required to support critical applications
      Operations
      • Communicate helpdesk/service desk information
      • Manage sales access to customer data
      • Determine locations and hours of operation
      • Consolidate phone lists and extensions
      • Synchronize email address books

      Integration checklists (continued)

      Infrastructure
      • Determine single network access
      • Manage organization domains
      • Consolidate data centers
      • Compile inventory of vendors, versions, switches, and routers
      • Review hardware lease or purchase agreements
      • Review outsourcing/service provider agreements
      • Review service-level agreements
      • Assess connectivity linkages between locations
      • Plan to migrate to a single email system if necessary
      Vendors
      • Establish a sustainable vendor management office
      • Review vendor landscape
      • Identify warranty options
      • Rationalize vendor services and solutions
      • Identify opportunities to mature the security architecture
      People
      • Design an IT operating model
      • Redesign your IT organizational structure
      • Conduct a RACI
      • Conduct a culture assessment and identify goal IT culture
      • Build an IT employee engagement program
      • Determine critical roles and systems/process/products they support
      • Create a list of employees to be terminated
      • Create employee transition plans
      • Create functional workplans
      Projects
      • Stop duplicate or unnecessary target organization projects
      • Communicate project intake process
      • Prioritize projects
      Products & Services
      • Ensure customer services requirements are met
      • Ensure customer interaction requirements are met
      • Select a solution for product lifecycle management
      Security
      • Conduct a security assessment of target organization
      • Develop accessibility prioritization and schedule
      • Establish an information security strategy
      • Develop a security awareness and training program
      • Develop and manage security governance, risk, and compliance
      • Identify security budget
      • Build a data privacy and classification program
      IT Processes
      • Evaluate current process models
      • Determine productivity/capacity levels of processes
      • Identify processes to be terminated
      • Identify process expectations from target organization
      • Establish a communication plan
      • Develop a change management process
      • Establish/review IT policies

      Execution & Value Realization

      Step 4.1

      Execute the Transaction

      Activities

      • 4.1.1 Rationalize the IT environment
      • 4.1.2 Continually update the project plan

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Vendor management team
      • IT transaction team
      • Company M&A team

      Outcomes of Step

      Successfully execute on the integration and strategize how to rationalize the two (or more) IT environments and update the project plan, strategizing against any roadblocks as they might come.

      Compile –› Assess –› Rationalize

      Access to critical information often does not happen until day one

      • As the transaction comes to a close and the target organization becomes the acquired organization, it’s important to start working on the rationalization of your organization.
      • One of the most important elements will be to have a complete understanding of the acquired organization’s IT environment. Specifically, assess the technology, people, and processes that might exist.
      • This rationalization will be heavily dependent on your planned integration strategy determined in the Discovery & Strategy phase of the process.
      • If your IT organization was not involved until after that phase, then determine whether your organization plans on remaining in its original state, taking on the acquired organization’s state, or forming a best-of-breed state by combining elements.
      • To execute on this, however, a holistic understanding of the new IT environment is required.

      Some Info-Tech resources to support this initiative:

      • Reduce and Manage Your Organization’s Insider Threat Risk
      • Build an Application Rationalization Framework
      • Rationalize Your Collaboration Tools
      • Consolidate IT Asset Management
      • Build Effective Enterprise Integration on the Back of Business Process
      • Consolidate Your Data Centers

      4.1.1 Rationalize the IT environment

      6-12 months

      Input: RACI chart, List of critical applications, List of vendor contracts, List of infrastructure assets, List of data assets

      Output: Rationalized IT environment

      Materials: Software Terms & Conditions Evaluation Tool

      Participants: IT executive/CIO, IT senior leadership, Vendor management

      The purpose of this activity is to rationalize the IT environment to reduce and eliminate redundant technology.

      1. Compile a list of the various applications and vendor contracts from the acquired organization and the original organization.
      2. Determine where there is repetition. Have a member of the vendor management team review those contracts and identify cost-saving opportunities.

      This will not be a quick and easy activity to complete. It will require strong negotiation on the behalf of the vendor management team.

      For additional information and support for this activity, see the blueprint Master Contract Review and Negotiations for Software Agreements.

      4.1.2 Continually update the project plan

      Reoccurring basis following transition

      Input: Prioritized integration tasks, Integration RACI, Activity owners

      Output: Updated integration project plan

      Materials: M&A Integration Project Management Tool

      Participants: IT executive/CIO, IT senior leadership, IT transaction team, Company M&A team

      The purpose of this activity is to ensure that the project plan is continuously updated as your transaction team continues to execute on the various components outlined in the project plan.

      1. Set a regular cadence for the transaction team to meet, update and review the status of the various integration task items, and strategize how to overcome any roadblocks.
      2. Employ governance best practices in these meetings to ensure decisions can be made effectively and resources allocated strategically.

      Record the updates in the M&A Integration Project Management Tool (SharePoint).

      Record the updates in the M&A Integration Project Management Tool (Excel).

      Execution & Value Realization

      Step 4.2

      Reflection and Value Realization

      Activities

      • 4.2.1 Confirm integration costs
      • 4.2.2 Review IT’s transaction value
      • 4.2.3 Conduct a transaction and integration SWOT
      • 4.2.4 Review the playbook and prepare for future transactions

      This step involves the following participants:

      • IT executive/CIO
      • IT senior leadership
      • Transition team
      • Company M&A team

      Outcomes of Step

      Review the value that IT was able to generate around the transaction and strategize on how to improve future acquisition transactions.

      4.2.1 Confirm integration costs

      3-4 hours

      Input: Integration tasks, Transition team, Previous RACI, Estimated costs

      Output: Actual integration costs

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, IT transaction team, Company M&A team

      The purpose of this activity is to confirm the associated costs around integration. While the integration costs would have been estimated previously, it’s important to confirm the costs that were associated with the integration in order to provide an accurate and up-to-date report to the company’s M&A team.

      1. Taking all the original items identified previously in activity 3.2.4, identify if there were changes in the estimated costs. This can be an increase or a decrease.
      2. Ensure that each cost has a justification for why the cost changed from the original estimation.

      Record the results in the M&A Buy Playbook.

      Track synergy capture through the IT integration

      The ultimate goal of the M&A is to achieve and deliver deal objectives. Early in the M&A, IT must identify, prioritize, and execute upon synergies that deliver value to the business and its shareholders. Continue to measure IT’s contribution toward achieving the organization’s M&A goals throughout the integration by keeping track of cost savings and synergies that have been achieved. When these achievements happen, communicate them and celebrate success.

      1. Define Synergy Metrics: Select metrics to track synergies through the integration.
        1. You can track value by looking at percentages of improvement in process-level metrics depending on the synergies being pursued.
        2. For example, if the synergy being pursued is increasing asset utilization, metrics could range from capacity to revenue generated through increased capacity.
      2. Prioritize Synergistic Initiatives: Estimate the cost and benefit of each initiative's implementation to compare the amount of business value to the cost. The benefits and costs should be illustrated at a high level. Estimating the exact dollar value of fulfilling a synergy can be difficult and misleading.
          Steps
        • Determine the benefits that each initiative is expected to deliver.
        • Determine the high-level costs of implementation (capacity, time, resources, effort).
      3. Track Synergy Captures: Develop a detailed workplan to resource the roadmap and track synergy captures as the initiatives are undertaken.

      Once 80% of the necessary synergies are realized, executive pressure will diminish. However, IT must continue to work toward the technology end state to avoid delayed progression.

      4.2.2 Review IT’s transaction value

      3-4 hours

      Input: Prioritized integration tasks, Integration RACI, Activity owners, M&A company goals

      Output: Transaction value

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO, IT senior leadership, Company's M&A team

      The purpose of this activity is to track how your IT organization performed against the originally identified metrics.

      1. If your organization did not have the opportunity to identify metrics earlier, determine from the company M&A team what those metrics might be. Review activity 3.2.7 for more information on metrics.
      2. Identify whether the metric (which should be used to support a goal) was at, below, or above the original target metric. This is a very critical task for IT to complete because it allows IT to confirm that they were successful engaging in the transaction and that the business can count on them in future transactions.
      3. Be sure to record accurate and relevant information on why the outcomes (good or bad) are supporting the M&A goals that were set out by the business.

      Record the results in the M&A Buy Playbook.

      4.2.3 Conduct a transaction and integration SWOT

      2 hours

      Input: Integration costs, Retention rates, Value IT contributed to the transaction

      Output: Strengths, weaknesses, opportunities, and threats

      Materials: Flip charts, Markers, Sticky notes

      Participants: IT executive/CIO, IT senior leadership, Business transaction team

      The purpose of this activity is to assess the positive and negative elements of the transaction.

      1. Consider the various internal and external elements that could have impacted the outcome of the transaction.
        • Strengths. Internal characteristics that are favorable as they relate to your development environment.
        • Weaknesses Internal characteristics that are unfavorable or need improvement.
        • Opportunities External characteristics that you may use to your advantage.
        • Threats External characteristics that may be potential sources of failure or risk.

      Record the results in the M&A Buy Playbook.

      M&A Buy Playbook review

      With an acquisition complete, your IT organization is now more prepared then ever to support the business through future M&As

      • Now that the transaction is more than 80% complete, take the opportunity to review the key elements that worked well and the opportunities for improvement in future transactions.
      • Critically examine the M&A Buy Playbook your IT organization created and identify what worked well to help the transaction and where your organization could adjust to do better in future transactions.
      • If your organization were to engage in another acquisition under your IT leadership, how would you go about the transaction to make sure the company meets its goals?

      4.2.4 Review the playbook and prepare for future transactions

      4 hours

      Input: Transaction and integration SWOT

      Output: Refined M&A playbook

      Materials: M&A Buy Playbook

      Participants: IT executive/CIO

      The purpose of this activity is to revise the playbook and ensure it is ready to go for future transactions.

      1. Using the outputs from the previous activity, 4.2.3, determine what strengths and opportunities there were that should be leveraged in the next transaction.
      2. Likewise, determine which threats and weaknesses could be avoided in the future transactions.
        Remember, this is your M&A Buy Playbook, and it should reflect the most successful outcome for you in your organization.

      Record the results in the M&A Buy Playbook.

      By the end of this post-transaction phase you should:

      Have completed the integration post-transaction and be fluidly delivering the critical value that the business expected of IT.

      Key outcomes from the Execution & Value Realization phase
      • Ensure the integration tasks are being completed and that any blockers related to the transaction are being removed.
      • Determine where IT was able to realize value for the business and demonstrate IT’s involvement in meeting target goals.
      Key deliverables from the Execution & Value Realization phase
      • Rationalize the IT environment
      • Continually update the project plan for completion
      • Confirm integration costs
      • Review IT’s transaction value
      • Conduct a transaction and integration SWOT
      • Review the playbook and prepare for future transactions

      Summary of Accomplishment

      Problem Solved

      Congratulations, you have completed the M&A Buy Blueprint!

      Rather than reacting to a transaction, you have been proactive in tackling this initiative. You now have a process to fall back on in which you can be an innovative IT leader by suggesting how and why the business should engage in an acquisition. You now have:

      • Created a standardized approach for how your IT organization should address acquisitions.
      • Evaluated the target organizations successfully and established an integration project plan.
      • Delivered on the integration project plan successfully and communicated IT’s transaction value to the business.

      Now that you have done all of this, reflect on what went well and what can be improved in case if you have to do this all again in a future transaction.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information
      workshops@infotech.com 1-888-670-8899

      Research Contributors and Experts

      Ibrahim Abdel-Kader
      Research Analyst | CIO
      Info-Tech Research Group
      Brittany Lutes
      Senior Research Analyst | CIO
      Info-Tech Research Group
      John Annand
      Principal Research Director | Infrastructure
      Info-Tech Research Group
      Scott Bickley
      Principal Research Director | Vendor Management
      Info-Tech Research Group
      Cole Cioran
      Practice Lead | Applications
      Info-Tech Research Group
      Dana Daher
      Research Analyst | Strategy & Innovation
      Info-Tech Research Group
      Eric Dolinar
      Manager | M&A Consulting
      Deloitte Canada
      Christoph Egel
      Director, Solution Design & Deliver
      Cooper Tire & Rubber Company
      Nora Fisher
      Vice President | Executive Services Advisory
      Info-Tech Research Group
      Larry Fretz
      Vice President | Industry
      Info-Tech Research Group

      Research Contributors and Experts

      David Glazer
      Vice President of Analytics
      Kroll
      Jack Hakimian
      Senior Vice President | Workshops and Delivery
      Info-Tech Research Group
      Gord Harrison
      Senior Vice President | Research & Advisory
      Info-Tech Research Group
      Valence Howden
      Principal Research Director | CIO
      Info-Tech Research Group
      Jennifer Jones
      Research Director | Industry
      Info-Tech Research Group
      Nancy McCuaig
      Senior Vice President | Chief Technology and Data Office
      IGM Financial Inc.
      Carlene McCubbin
      Practice Lead | CIO
      Info-Tech Research Group
      Kenneth McGee
      Research Fellow | Strategy & Innovation
      Info-Tech Research Group
      Nayma Naser
      Associate
      Deloitte
      Andy Neill
      Practice Lead | Data & Analytics, Enterprise Architecture
      Info-Tech Research Group

      Research Contributors and Experts

      Rick Pittman
      Vice President | Research
      Info-Tech Research Group
      Rocco Rao
      Research Director | Industry
      Info-Tech Research Group
      Mark Rosa
      Senior Vice President & Chief Information Officer
      Mohegan Gaming and Entertainment
      Tracy-Lynn Reid
      Research Lead | People & Leadership
      Info-Tech Research Group
      Jim Robson
      Senior Vice President | Shared Enterprise Services (retired)
      Great-West Life
      Steven Schmidt
      Senior Managing Partner Advisory | Executive Services
      Info-Tech Research Group
      Nikki Seventikidis
      Senior Manager | Finance Initiative & Continuous Improvement
      CST Consultants Inc.
      Allison Straker
      Research Director | CIO
      Info-Tech Research Group
      Justin Waelz
      Senior Network & Systems Administrator
      Info-Tech Research Group
      Sallie Wright
      Executive Counselor
      Info-Tech Research Group

      Bibliography

      “5 Ways for CIOs to Accelerate Value During Mergers and Acquisitions.” Okta, n.d. Web.

      Altintepe, Hakan. “Mergers and acquisitions speed up digital transformation.” CIO.com, 27 July 2018. Web.

      “America’s elite law firms are booming.” The Economist, 15 July 2021. Web.

      Barbaglia, Pamela, and Joshua Franklin. “Global M&A sets Q1 record as dealmakers shape post-COVID world.” Nasdaq, 1 April 2021. Web.

      Boyce, Paul. “Mergers and Acquisitions Definition: Types, Advantages, and Disadvantages.” BoyceWire, 8 Oct. 2020. Web.

      Bradt, George. “83% Of Mergers Fail -- Leverage A 100-Day Action Plan For Success Instead.” Forbes, 27 Jan. 2015. Web.

      Capgemini. “Mergers and Acquisitions: Get CIOs, IT Leaders Involved Early.” Channel e2e, 19 June 2020. Web.

      Chandra, Sumit, et al. “Make Or Break: The Critical Role Of IT In Post-Merger Integration.” IMAA Institute, 2016. Web.

      Deloitte. “How to Calculate Technical Debt.” The Wall Street Journal, 21 Jan. 2015. Web.

      Ernst & Young. “IT As A Driver Of M&A Success.” IMAA Institute, 2017. Web.

      Fernandes, Nuno. “M&As In 2021: How To Improve The Odds Of A Successful Deal.” Forbes, 23 March 2021. Web.

      “Five steps to a better 'technology fit' in mergers and acquisitions.” BCS, 7 Nov. 2019. Web.

      Fricke, Pierre. “The Biggest Opportunity You’re Missing During an M&Aamp; IT Integration.” Rackspace, 4 Nov. 2020. Web.

      Garrison, David W. “Most Mergers Fail Because People Aren't Boxes.” Forbes, 24 June 2019. Web.

      Harroch, Richard. “What You Need To Know About Mergers & Acquisitions: 12 Key Considerations When Selling Your Company.” Forbes, 27 Aug. 2018. Web.

      Hope, Michele. “M&A Integration: New Ways To Contain The IT Cost Of Mergers, Acquisitions And Migrations.” Iron Mountain, n.d. Web.

      “How Agile Project Management Principles Can Modernize M&A.” Business.com, 13 April 2020. Web.

      Hull, Patrick. “Answer 4 Questions to Get a Great Mission Statement.” Forbes, 10 Jan. 2013. Web.

      Kanter, Rosabeth Moss. “What We Can Learn About Unity from Hostile Takeovers.” Harvard Business Review, 12 Nov. 2020. Web.

      Koller, Tim, et al. “Valuation: Measuring and Managing the Value of Companies, 7th edition.” McKinsey & Company, 2020. Web.

      Labate, John. “M&A Alternatives Take Center Stage: Survey.” The Wall Street Journal, 30 Oct. 2020. Web.

      Lerner, Maya Ber. “How to Calculate ROI on Infrastructure Automation.” DevOps.com, 1 July 2020. Web.

      Loten, Angus. “Companies Without a Tech Plan in M&A Deals Face Higher IT Costs.” The Wall Street Journal, 18 June 2019. Web.

      Low, Jia Jen. “Tackling the tech integration challenge of mergers today” Tech HQ, 6 Jan. 2020. Web.

      Lucas, Suzanne. “5 Reasons Turnover Should Scare You.” Inc. 22 March 2013. Web.

      “M&A Trends Survey: The future of M&A. Deal trends in a changing world.” Deloitte, Oct. 2020. Web.

      Maheshwari, Adi, and Manish Dabas. “Six strategies tech companies are using for successful divesting.” EY, 1 Aug. 2020. Web.

      Majaski, Christina. “Mergers and Acquisitions: What's the Difference?” Investopedia, 30 Apr. 2021.

      “Mergers & Acquisitions: Top 5 Technology Considerations.” Teksetra, 21 Jul. 2020. Web.

      “Mergers Acquisitions M&A Process.” Corporate Finance Institute, n.d. Web.

      “Mergers and acquisitions: A means to gain technology and expertise.” DLA Piper, 2020. Web.

      Nash, Kim S. “CIOs Take Larger Role in Pre-IPO Prep Work.” The Wall Street Journal, 5 March 2015. Web.

      Paszti, Laila. “Canada: Emerging Trends In Information Technology (IT) Mergers And Acquisitions.” Mondaq, 24 Oct. 2019. Web.

      Patel, Kiison. “The 8 Biggest M&A Failures of All Time” Deal Room, 9 Sept. 2021. Web.

      Peek, Sean, and Paula Fernandes. “What Is a Vision Statement?” Business News Daily, 7 May 2020. Web.

      Ravid, Barak. “Tech execs focus on growth amid increasingly competitive M&A market.” EY, 28 April 2021. Web.

      Resch, Scott. “5 Questions with a Mergers & Acquisitions Expert.” CIO, 25 June 2019. Web.

      Salsberg, Brian. “Four tips for estimating one-time M&A integration costs.” EY, 17 Oct. 2019. Web.

      Samuels, Mark. “Mergers and acquisitions: Five ways tech can smooth the way.” ZDNet, 15 Aug. 2018. Web.

      “SAP Divestiture Projects: Options, Approach and Challenges.” Cognizant, May, 2014. Web.

      Steeves, Dave. “7 Rules for Surviving a Merger & Acquisition Technology Integration.” Steeves and Associates, 5 Feb. 2020. Web.

      Tanaszi, Margaret. “Calculating IT Value in Business Terms.” CSO, 27 May 2004. Web.

      “The CIO Playbook. Nine Steps CIOs Must Take For Successful Divestitures.” SNP, 2016. Web.

      “The Role of IT in Supporting Mergers and Acquisitions.” Cognizant, Feb. 2015. Web.

      Torres, Roberto. “M&A playbook: How to prepare for the cost, staff and tech hurdles.” CIO Dive, 14 Nov. 2019. Web.

      “Valuation Methods.” Corporate Finance Institute, n.d. Web.

      Weller, Joe. “The Ultimate Guide to the M&A Process for Buyers and Sellers.” Smartsheet, 16 May 2019. Web.

      Assess Infrastructure Readiness for Digital Transformation

      • Buy Link or Shortcode: {j2store}300|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      There are many challenges for I&O when it comes to digital transformation, including:

      • Legacy infrastructure technical debt
      • Skills and talent in the IT team
      • A culture that resists change
      • Fear of job loss

      These and many more will hinder your progress, which demonstrates the need to invest in modernizing your infrastructure, investing in training and hiring talent, and cultivating a culture that supports digital transformation.

      Our Advice

      Critical Insight

      By using the framework of culture, competencies, collaboration and capabilities, organizations can create dimensions in their I&O structure in order to shift from traditional infrastructure management to becoming a strategic enabler, driving agility, innovation, and operational excellence though the effective integration of people, process, and technology.

      Impact and Result

      By driving a customer-centric approach, delivering a successful transformation can be tailored to the business goals and drive adoption and engagement. Refining your roadmap through data and analytics will drive this change. Use third-party expertise to guide your transformation and help build that vision of the future.

      Assess Infrastructure Readiness for Digital Transformation Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess Infrastructure Readiness for Digital Transformation – Unlock the full potential of your infrastructure with a digital transformation strategy and clear the barriers for success.

    • Be customer centric as opposed to being technology driven.
    • Understanding business needs and pain points is key to delivering solutions.
    • Approach infrastructure digital transformation in iterations and look at this as a journey.
      • Assess Infrastructure Readiness for Digital Transformation Storyboard
      • I&O Digital Transformation Maturity Assessment Tool

      Infographic

      Further reading

      Assess Infrastructure Readiness for Digital Transformation

      Unlock the full potential of your infrastructure with a digital transformation strategy and clear the barriers to success.

      Analyst Perspective

      It’s not just about the technology!

      Many businesses fail in their endeavors to complete a digital transformation, but the reasons are complex, and there are many ways to fail, whether it is people, process, or technology. In fact, according to many surveys, 70% of digital transformations fail, and it’s mainly down to strategy – or the lack thereof.

      A lot of organizations think of digital transformation as just an investment in technology, with no vision of what they are trying to achieve or transform. So, out of the gate, many organizations fail to undergo a meaningful transformation, change their business model, or bring about a culture of digital transformation needed to be seriously competitive in their given market.

      When it comes to I&O leaders who have been given a mandate to drive digital transformation projects, they still must align to the vision and mission of the organization; they must still train and hire staff that will be experts in their field; they must still drive process improvements and align the right technology to meet the needs of a digital transformation.

      John Donovan

      John Donovan

      Principal Research Director, I&O
      Info-Tech Research Group

      Insight summary

      Overarching insight

      Digital transformation requires I&O teams to shift from traditional infrastructure management to becoming a strategic enabler, driving agility, innovation, and operational excellence through effective integration of people, process, and technology.

      Insight 1

      Collaboration is a key component of I&O – Promote strong collaboration between I&O and other business functions. When doing a digital transformation, it is clear that this is a cross-functional effort. Business leaders and IT teams need to align their objectives, prioritize initiatives, and ensure that you are seamlessly integrating technologies with the new business functions.

      Insight 2

      Embrace agility and adaptability as core principles – As the digital landscape continues to evolve, it is paramount that I&O leaders are agile and adaptable to changing business needs, adopting new technology and implementing new innovative solutions. The culture of continuous improvement and openness to experimentation and learning will assist the I&O leaders in their journey.

      Insight 3

      Future-proof your infrastructure and operations – By anticipating emerging technologies and trends, you can proactively plan and organize your team for future needs. By investing in scalable, flexible infrastructure such as cloud services, automation, AI technologies, and continuously upskilling the IT staff, you can stay relevant and forward-looking in the digital space.

      Tactical insight

      An IT infrastructure maturity assessment is a foundational step in the journey of digital transformation. The demand will be on performance, resilience, and scalability. IT infrastructure must be able to support innovation and rapid deployment of services.

      Tactical insight

      Having a clear strategy, with leadership commitment along with hiring and training the right people, monitoring and measuring your progress, and ensuring it is a business-led journey will increase your chances of success.

      Executive Summary

      Your Challenge

      There are a lot of challenges for I&O when it comes to digital transformation, including:

      • Legacy infrastructure technical debt.
      • Skills and talent in the IT team.
      • A culture that resists change.
      • Fear of job loss.

      These and many more will hinder your progress, which demonstrates the need to invest in modernizing your infrastructure, investing in training and hiring talent, and cultivating a culture that supports digital transformation.

      Common Obstacles

      Many obstacles to digital transformation begin with non-I&O activities, including:

      • Lack of a clear vision and strategy.
      • Siloed organizational structure.
      • Lack of governance and data management.
      • Limited budget and resources.

      By addressing these obstacles, I&O will have a better chance of a successful transformation and delivering the full potential of digital technologies.

      Info-Tech's Approach

      Building a culture of innovation by developing clear goals and creating a vision will be key.

      • Be customer centric as opposed to being technology driven.
      • Understand the business needs and pain points in order to effectively deliver solutions.
      • Approach infrastructure digital transformation in iterations and look at it as a journey.

      By completing the Info-Tech digital readiness questionnaire, you will see where you are in terms of maturity and areas you need to concentrate on.

      Info-Tech Insight

      By driving a customer-centric approach, delivering a successful transformation can be tailored to the business goals and drive adoption and engagement. Refining your roadmap through data and analytics will drive this change. Use third-party expertise to guide your transformation and help build that vision of the future.

      The cost of digital transformation

      The challenges that stand in the way of your success, and what is needed to reverse the risk

      What CIOs are saying about their challenges

      26% of those CIOs surveyed cite resistance to change, with entrenched viewpoints demonstrating a real need for a cultural shift to enhance the digital transformation journey.

      Source: Prophet, 2019.

      70% of digital transformation projects fall short of their objectives – even when their leadership is aligned, often with serious consequences.

      Source: BCG, 2020.

      Having a clear strategy and commitment from leadership, hiring and training the right people, monitoring and measuring your progress, and ensuring it is a business-led journey will increase your chances of success.

      Info-Tech Insight

      Cultural change, business alignment, skills training, and setting a clear strategy with KPIs to demonstrate success are all key to being successful in your digital journey.

      Small and medium-sized enterprises

      What business owners and CEOs are saying about their digital transformation

      57% of small business owners feel they must improve their IT infrastructure to optimize their operations.

      Source: SMB Story, 2023.

      64% of CEOs believe driving digital transformation at a rapid pace is critical to attracting and retaining talent and customers.

      Source: KPMG, 2022.

      Info-Tech Insight

      An IT infrastructure maturity assessment is a foundational step in the journey of digital transformation. The demand will be on performance, resilience, and scalability. IT infrastructure must be able to support innovation and rapid deployments.

      Architect Your Big Data Environment

      • Buy Link or Shortcode: {j2store}202|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Big Data
      • Parent Category Link: /big-data
      • Organizations may understand the transformative potential of a big data initiative, but they struggle to make the transition from the awareness of its importance to identifying a concrete use case for a pilot project.
      • The big data ecosystem is crowded and confusing, and a lack of understanding of it may cause paralysis for organizations.

      Our Advice

      Critical Insight

      • Don’t panic, and make use of the resources you already have. The skills, tools, and infrastructure for big data can break any budget quickly, but before making rash decisions, start with the resources you have in-house.
      • Big data as a service (BDaaS) is making big waves. BDaaS removes many of the hurdles associated with implementing a big data strategy and vastly lowers the barrier of entry.

      Impact and Result

      • Follow Info-Tech’s methodology for understanding the types of modern approaches to big data tools, and then determining which approach style makes the most sense for your organization.
      • Based on your big data use case, create a plan for getting started with big data tools that takes into account the backing of the use case, the organization’s priorities, and resourcing available.
      • Put a repeatable framework in place for creating a comprehensive big data tool environment that will help you decide on the necessary tools to help you realize the value from your big data use case and scale for the future.

      Architect Your Big Data Environment Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should find your optimal approach to big data tools, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Plant the foundations of your big data tool architecture

      Identify your big data use case and your current data-related capabilities.

      • Architect Your Big Data Environment – Phase 1: Plant the Foundations of Your Big Data Tool Architecture
      • Big Data Execution Plan Presentation
      • Big Data Architecture Planning Tool

      2. Weigh your big data architecture decision criteria

      Determine your capacity for big data tools, as well as the level of customizability and security needed for your solution to help justify your implementation style decision.

      • Architect Your Big Data Environment – Phase 2: Weigh Your Big Data Architecture Decision Criteria

      3. Determine your approach to implementing big data tools

      Analyze the three big data implementation styles, select your approach, and complete the execution plan for your big data initiative.

      • Architect Your Big Data Environment – Phase 3: Determine Your Approach To Implementing Big Data Tools
      [infographic]

      Build an ERP Strategy and Roadmap

      • Buy Link or Shortcode: {j2store}585|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $76,462 Average $ Saved
      • member rating average days saved: 22 Average Days Saved
      • Parent Category Name: Enterprise Resource Planning
      • Parent Category Link: /enterprise-resource-planning
      • Organizations often do not know where to start with an ERP project.
      • They focus on tactically selecting and implementing the technology.
      • ERP projects are routinely reported as going over budget, over schedule, and they fail to realize any benefits.

      Our Advice

      Critical Insight

      • An ERP strategy is an ongoing communication tool for the business.
      • Accountability for ERP success is shared between IT and the business.
      • An actionable roadmap provides a clear path to benefits realization.

      Impact and Result

      • Align the ERP strategy and roadmap with business priorities, securing buy-in from the business for the program.
      • Identification of gaps, needs, and opportunities in relation to business processes; ensuring the most critical areas are addressed.
      • Assess alternatives for the critical path(s) most relevant to your organization’s direction.

      Build an ERP Strategy and Roadmap Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build an ERP Strategy and Roadmap – A comprehensive guide to align business and IT on what the organization needs from their ERP.

      A business-led, top-management-supported initiative partnered with IT has the greatest chance of success.

    • Aligning and prioritizing key business and technology drivers.
    • Clearly defining what is in and out of scope for the project.
    • Getting a clear picture of how the business process and underlying applications support the business strategic priorities.
    • Pulling it all together into an actionable roadmap.
      • Build an ERP Strategy and Roadmap – Phases 1-4
      • ERP Strategy Report Template
      [infographic]

      Workshop: Build an ERP Strategy and Roadmap

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Introduction to ERP

      The Purpose

      To build understanding and alignment between business and IT on what an ERP is and the goals for the project

      Key Benefits Achieved

      Clear understanding of how the ERP supports the organizational goals

      What business processes the ERP will be supporting

      An initial understanding of the effort involved

      Activities

      1.1 Introduction to ERP

      1.2 Background

      1.3 Expectations and goals

      1.4 Align business strategy

      1.5 ERP vision and guiding principles

      1.6 ERP strategy model

      1.7 ERP operating model

      Outputs

      ERP strategy model

      ERP Operating model

      2 Build the ERP operation model

      The Purpose

      Generate an understanding of the business processes, challenges, and application portfolio currently supporting the organization.

      Key Benefits Achieved

      An understanding of the application portfolio supporting the business

      Detailed understanding of the business operating processes and pain points

      Activities

      2.1 Build application portfolio

      2.2 Map the level 1 ERP processes including identifying stakeholders, pain points, and key success indicators

      2.3 Discuss process and technology maturity for each level 1 process

      Outputs

      Application portfolio

      Mega-processes with level 1 process lists

      3 Project set up

      The Purpose

      A project of this size has multiple stakeholders and may have competing priorities. This section maps those stakeholders and identifies their possible conflicting priorities.

      Key Benefits Achieved

      A prioritized list of ERP mega-processes based on process rigor and strategic importance

      An understanding of stakeholders and competing priorities

      Initial compilation of the risks the organization will face with the project to begin early mitigation

      Activities

      3.1 ERP process prioritization

      3.2 Stakeholder mapping

      3.3 Competing priorities review

      3.4 Initial risk register compilation

      Outputs

      Prioritized ERP operating model

      Stakeholder map.

      Competing priorities list.

      Initial risk register.

      4 Roadmap and presentation review

      The Purpose

      Select a future state and build the initial roadmap to set expectations and accountabilities.

      Key Benefits Achieved

      Identification of the future state

      Initial roadmap with expectations on accountability and timelines

      Activities

      4.1 Discuss future state options

      4.2 Build initial roadmap

      4.3 Review of final deliverable

      Outputs

      Future state options

      Initiative roadmap

      Draft final deliverable

      Further reading

      Build an ERP Strategy and Roadmap

      Align business and IT to successfully deliver on your ERP initiative

      Table of Contents

      Analyst Perspective

      Phase 3: Plan Your Project

      Executive Summary

      Step 3.1: Stakeholders, risk, and value

      Phase 1: Build Alignment and Scope

      Step 3.2: Project set up

      Step 1.1: Aligning Business and IT

      Phase 4: Next Steps

      Step 1.2: Scope and Priorities

      Step 4.1: Build your roadmap

      Phase 2: Define Your ERP

      Step 4.2: Wrap up and present

      Step 2.1: ERP business model

      Summary of Accomplishment

      Step 2.2: ERP processes and supporting applications

      Research Contributors

      Step 2.3: Process pains, opportunities, and maturity

      Related Info-Tech Research

      Bibliography

      Build an ERP Strategy and Roadmap

      Align business and IT to successfully deliver on your ERP initiative

      EXECUTIVE BRIEF

      Analyst Perspective

      A foundational ERP strategy is critical to decision making.

      Photo of Robert Fayle, Research Director, Enterprise Applications, Info-Tech Research Group.

      Enterprise resource planning (ERP) is a core tool that the business leverages to accomplish its goals. An ERP that is doing its job well is invisible to the business. The challenges come when the tool is no longer invisible. It has become a source of friction in the functioning of the business

      ERP systems are expensive, their benefits are difficult to quantify, and they often suffer from poor user satisfaction. Post-implementation, technology evolves, organizational goals change, and the health of the system is not monitored. This is complicated in today’s digital landscape with multiple integration points, siloed data, and competing priorities.

      Too often organizations jump into selecting replacement systems without understanding the needs of the organization. Alignment between business and IT is just one part of the overall strategy. Identifying key pain points and opportunities, assessed in the light of organizational strategy, will provide a strong foundation to the transformation of the ERP system.

      Robert Fayle
      Research Director, Enterprise Applications
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Organizations often do not know where to start with an ERP project. They focus on tactically selecting and implementing the technology but ignore the strategic foundation that sets the ERP system up for success. ERP projects are routinely reported as going over budget, over schedule, and they fail to realize any benefits.

      Common Obstacles

      ERP projects impact the entire organization – they are not limited to just financial and operating metrics. The disruption is felt during both implementation and in the production environment.

      Missteps early on can cost time, financial resources, and careers. Roughly 55% of ERP projects reported being over budget, and two-thirds of organizations implementing ERP realized less than half of their anticipated benefits.

      Info-Tech’s Approach

      Obtain organizational buy-in and secure top management support. Set clear expectations, guiding principles, and critical success factors.

      Build an ERP operating model/business model that identifies process boundaries, scope, and prioritizes requirements. Assess stakeholder involvement, change impact, risks, and opportunities.

      Understand the alternatives your organization can choose for the future state of ERP. Develop an actionable roadmap and meaningful KPIs that directly align with your strategic goals.

      Info-Tech Insight

      Accountability for ERP success is shared between IT and the business. There is no single owner of an ERP. A unified approach to building your strategy promotes an integrated roadmap so all stakeholders have clear direction on the future state.

      Insight summary

      Enterprise resource planning (ERP) systems facilitate the flow of information across business units. It allows for the seamless integration of systems and creates a holistic view of the enterprise to support decision making.

      In many organizations, the ERP system is considered the lifeblood of the enterprise. Problems with this key operational system will have a dramatic impact on the ability of the enterprise to survive and grow.

      A measured and strategic approach to change will help mitigate many of the risks associated with ERP projects, which will avoid the chances of these changes becoming the dreaded “career killers.”

      A business led, top management supported initiative partnered with IT has the greatest chance of success.

      • A properly scoped ERP project reduces churn and provides all parts of the business with clarity.
      • This blueprint provides the business and IT the methodology to get the right level of detail for the business processes that the ERP supports so you can avoid getting lost in the details.
      • Build a successful ERP Strategy and roadmap by:
        • Aligning and prioritizing key business and technology drivers.
        • Clearly defining what is in and out of scope for the project.
        • Providing a clear picture of how the business process and underlying applications support the business strategic priorities.
        • Pulling it all together into an actionable roadmap.

      Enterprise Resource Planning (ERP)

      What is ERP?

      Enterprise resource planning (ERP) systems facilitate the flow of information across business units. They allow for the seamless integration of systems and create a holistic view of the enterprise to support decision making.

      In many organizations, the ERP system is considered the lifeblood of the enterprise. Problems with this key operational system will have a dramatic impact on the ability of the enterprise to survive and grow.

      An ERP system:

      • Automates processes, reducing the amount of manual, routine work.
      • Integrates with core modules, eliminating the fragmentation of systems.
      • Centralizes information for reporting from multiple parts of the value chain to a single point.

      A diagram visualizing the many aspects of ERP and the categories they fall under. Highlighted as 'Supply Chain Management' are 'Supply Chain: Procure to Pay' and 'Distribution: Forecast to Delivery'. Highlighted as 'Customer Relationship Management' are 'Sales: Quote to Cash', 'CRM: Market to Order', and 'Customer Service: Issue to Resolution'.

      ERP use cases:

      • Product-Centric
        Suitable for organizations that manufacture, assemble, distribute, or manage material goods.
      • Service-Centric
        Suitable for organizations that provide and manage field services and/or professional services.

      ERP by the numbers

      50-70%
      Statistical analysis of ERP projects indicates rates of failure vary from 50 to 70%. Taking the low end of those analyst reports, one in two ERP projects is considered a failure. (Source: Saxena and Mcdonagh)

      85%
      Companies that apply the principles of behavioral economics outperform their peers by 85% in sales growth and more than 25% in gross margin. (Source: Gallup)

      40%
      Nearly 40% of companies said functionality was the key driver for the adoption of a new ERP. (Source: Gheorghiu)

      ERP dissatisfaction

      Drivers of Dissatisfaction
      Business
      • Misaligned objectives
      • Product fit
      • Changing priorities
      • Lack of metrics
      Data
      • Access to data
      • Data hygiene
      • Data literacy
      • One view of the customer
      People and teams
      • User adoption
      • Lack of IT support
      • Training (use of data and system)
      • Vendor relations
      Technology
      • Systems integration
      • Multi-channel complexity
      • Capability shortfall
      • Lack of product support

      Finance, IT, Sales, and other users of the ERP system can only optimize ERP with the full support of each other. The cooperation of the departments is crucial when trying to improve ERP technology capabilities and customer interaction.

      Info-Tech Insight

      While technology is the key enabler of building strong customer experiences, there are many other drivers of dissatisfaction. IT must stand shoulder-to-shoulder with the business to develop a technology framework for ERP.

      Info-Tech’s methodology for developing a foundational ERP strategy and roadmap

      1. Build alignment and scope 2. Define your ERP 3. Plan your project 4. Next Steps
      Phase Steps
      1. Aligning business and IT
      2. Scope and priorities
      1. ERP Business Model
      2. ERP processes and supporting applications
      3. Process pains, opportunities & maturity
      1. Stakeholders, risk & value
      2. Project set up
      1. Build your roadmap
      2. Wrap up and present
      Phase Outcomes Discuss organizational goals and how to advance those using the ERP system. Establish the scope of the project and ensure that business and IT are aligned on project priorities. Build the ERP business model then move on to the top level (mega) processes and an initial list of the sub-processes. Generate a list of applications that support the identified processes. Conclude with a complete view of the mega-processes and their sub-processes. Map out your stakeholders to evaluate their impact on the project, build an initial risk register and discuss group alignment. Conclude the phase by setting the initial core project team and their accountabilities to the project. Review the different options to solve the identified pain points then build out a roadmap of how to get to that solution. Build a communication plan as part of organizational change management, which includes the stakeholder presentation.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Sample of the Key Deliverable 'ERP Strategy Report'.

      ERP Strategy Report

      Complete an assessment of processes, prioritization, and pain points, and create an initiative roadmap.

      Samples of blueprint deliverables related to 'ERP Strategy Report'.

      ERP Business Model
      Align your business and technology goals and objectives in the current environment.
      Sample of the 'ERP Business Model' blueprint deliverable.
      ERP Operating Model
      Identify and prioritize your ERP top-level processes.
      Sample of the 'ERP Operating Model' blueprint deliverable.
      ERP Process Prioritization
      Assess ERP processes against the axes of rigor and strategic importance.
      Sample of the 'ERP Process Prioritization' blueprint deliverable.
      ERP Strategy Roadmap
      A data-driven roadmap of how to address the ERP pain points and opportunities.
      Sample of the 'ERP Strategy Roadmap' blueprint deliverable.

      Executive Brief Case Study

      INDUSTRY: Aerospace
      SOURCE: Panorama, 2021

      Aerospace organization assesses ERP future state from opportunities, needs, and pain points

      Challenge

      Several issues plagued the aerospace and defense organization. Many of the processes were ad hoc and did not use the system in place, often relying on Excel. The organization had a very large pain point stemming from its lack of business process standardization and oversight. The biggest gap, however, was from the under-utilization of the ERP software.

      Solution

      By assessing the usage of the system by employees and identifying key workarounds, the gaps quickly became apparent. After assessing the organization’s current state and generating recommendations from the gaps, it realized the steps needed to achieve its desired future state. The analysis of the pain points generated various needs and opportunities that allowed the organization to present and discuss its key findings with executive leadership to set milestones for the project.

      Results

      The overall assessment led the organization to the conclusion that in order to achieve its desired future state and maximize ROI from its ERP, the organization must address the internal issues prior to implementing the upgraded software.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between eight to twelve calls over the course of four to six months.

      Phase 1

      • Call #1: Scoping call to understand the current situation.
      • Call #2: Establish business & IT alignment and project scope.

      Phase 2

      • Call #3: Discuss the ERP Strategy business model and mega-processes.
      • Call #4: Begin the drill down on the level 1 processes.

      Phase 3

      • Call #5: Establish the stakeholder map and project risks.
      • Call #6: Discuss project setup including stakeholder commitment and accountability.

      Phase 4

      • Call #7: Discuss resolution paths and build initial roadmap.
      • Call #8: Summarize results and plan next steps.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      Activities
      Introduction to ERP

      1.1 Introduction to ERP

      1.2 Background

      1.3 Expectations and goals

      1.4 Align business strategy

      1.5 ERP vision and guiding principles

      1.6 ERP strategy model

      1.7 ERP operating model

      Build the ERP operating model

      2.1 Build application portfolio

      2.2 Map the level 1 ERP processes including identifying stakeholders, pain points, and key success indicators

      2.3 Discuss process and technology maturity for each level 1 process

      Project set up

      3.1 ERP process prioritization

      3.2 Stakeholder mapping

      3.3 Competing priorities review

      3.4 Initial risk register compilation

      3.5 Workshop retrospective

      Roadmap and presentation review

      4.1 Discuss future state options

      4.2 Build initial roadmap

      4.3 Review of final deliverable

      Next Steps and wrap-up (offsite)

      5.1 Complete in-progress deliverables from previous four days

      5.2 Set up review time for workshop deliverables and to discuss next steps

      Deliverables
      1. ERP strategy model
      2. ERP operating model
      1. Application portfolio
      2. Mega-processes with level 1 process lists
      1. Prioritized ERP operating model
      2. Stakeholder map
      3. Competing priorities list
      4. Initial risk register
      1. Future state options
      2. Initiative roadmap
      3. Draft final deliverable
      1. Completed ERP strategy template
      2. ERP strategy roadmap

      Build an ERP Strategy and Roadmap

      Phase 1

      Build alignment and scope

      Phase 1

      • 1.1 Aligning business and IT
      • 1.2 Scope and priorities

      Phase 2

      • 2.1 ERP Business Model
      • 2.2 ERP processes and supporting applications
      • 2.3 Process pains, opportunities & maturity

      Phase 3

      • 3.1 Stakeholders, risk & value
      • 3.2 Project set up

      Phase 4

      • 4.1 Build your roadmap
      • 4.2 Wrap up and present

      This phase will walk you through the following activities:

      Build a common language to ensure clear understanding of the organizational needs. Define a vision and guiding principles to aid in decision making and enumerate how the ERP supports achievement of the organizational goals. Define the initial scope of the ERP project. This includes the discussion of what is not in scope.

      This phase involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Create a compelling case that addresses strategic business objectives

      When someone at the organization asks you WHY, you need to deliver a compelling case. The ERP project will receive pushback, doubt, and resistance; if you can’t answer the question WHY, you will be left back-peddling.

      When faced with a challenge, prepare for the WHY.

      • Why do we need this?
      • Why are we spending all this money?
      • Why are we bothering?
      • Why is this important?
      • Why did we do it this way?
      • Why did we choose this vendor?

      Most organizations can answer “What?”
      Some organizations can answer “How?”
      Very few organizations have an answer for “Why?”

      Each stage of the project will be difficult and present its own unique challenges and failure points. Re-evaluate if you lose sight of WHY at any stage in the project.

      Step 1.1

      Aligning business and IT

      Activities
      • 1.1.1 Build a glossary
      • 1.1.2 ERP Vision and guiding principles
      • 1.1.3 Corporate goals and ERP benefits

      This step will walk you through the following activities:

      • Building a common language to ensure a clear understanding of the organization’s needs.
      • Creating a definition of your vision and identifying the guiding principles to aid in decision making.
      • Defining how the ERP supports achievement of the organizational goals.

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      Business and IT have a shared understanding of how the ERP supports the organizational goals.

      Are we all talking about the same thing?

      Every group has their own understanding of the ERP system, and they may use the same words to describe different things. For example, is there a difference between procurement of office supplies and procurement of parts to assemble an item for sale? And if they are different, do your terms differ (e.g., procurement versus purchasing)?

      Term(s) Definition
      HRMS, HRIS, HCM Human Resource Management System, Human Resource Information System, Human Capital Management. These represent four capabilities of HR: core HR, talent management, workforce management, and strategic HR.
      Finance Finance includes the core functionalities of GL, AR, and AP. It also covers such items as treasury, financial planning and analysis (FP&A), tax management, expenses, and asset management.
      Supply Chain The processes and networks required to produce and distribute a product or service. This encompasses both the organization and the suppliers.
      Procurement Procurement is about getting the right products from the right suppliers in a timely fashion. Related to procurement is vendor contract management.
      Distribution The process of getting the things we create to our customers.
      CRM Customer Relationship Management, the software used to maintain records of our sales and non-sales contact with our customers.
      Sales The process of identifying customers, providing quotes, and converting those quotes to sales orders to be invoiced.
      Customer Service This is the process of supporting customers with challenges and non-sales questions related to the delivery of our products/services.
      Field Service The group that provides maintenance services to our customers.

      Activity 1.1.1 Build a glossary

      1 hour
      1. As a group, discuss the organization’s functional areas, business capabilities, value streams, and business processes.
      2. Ask each of the participants if there are terms or “jargon” that they hear used that they may be unclear on or know that others may not be aware of. Record these items in the table along with a description.
        • Acronyms are particularly important to document. These are often bandied about without explanation. For example, people outside of finance may not understand that FP&A is short for Financial Planning and Analysis.

      Record this information in the ERP Strategy Report Template.

      Sample of the 'ERP Strategy Report Template: Glossary'.

      Download the ERP Strategy Report Template

      Activity 1.1.1 Working slide

      Example/working slide for your glossary. Consider this a living document and keep it up to date.

      Term(s) Definition
      HRMS, HRIS, HCM Human Resource Management System, Human Resource Information System, Human Capital Management. These represent four capabilities of HR: core HR, talent management, workforce management, and strategic HR.
      Finance Finance includes the core functionalities of GL, AR, and AP. It also covers such items as treasury, financial planning and analysis (FP&A), tax management, expenses, and asset management.
      Supply Chain The processes and networks required to produce and distribute a product or service. This encompasses both the organization and the suppliers.
      Procurement Procurement is about getting the right products from the right suppliers in a timely fashion. Related to procurement is vendor contract management.
      Distribution The process of getting the things we create to our customers.
      CRM Customer Relationship Management, the software used to maintain records of our sales and non-sales contact with our customers.
      Sales The process of identifying customers, providing quotes, and converting those quotes to sales orders to be invoiced.
      Customer Service This is the process of supporting customers with challenges and non-sales questions related to the delivery of our products/services.
      Field Service The group that provides maintenance services to our customers.

      Vision and Guiding Principles

      GUIDING PRINCIPLES

      Guiding principles are high-level rules of engagement that help to align stakeholders from the outset. Determine guiding principles to shape the scope and ensure stakeholders have the same vision.

      Creating Guiding Principles

      Guiding principles should be constructed as full sentences. These statements should be able to guide decisions.

      EXAMPLES

      • [Organization] is implementing an ERP system to streamline processes and reduce redundancies, saving time and money.
      • [Organization] is implementing an ERP to integrate disparate systems and rationalize the application portfolio.
      • [Organization] is aiming at taking advantage of best industry practices and strives to minimize the level of customization required in solution.

      Questions to Ask

      1. What is a strong statement that will help guide decision making throughout the life of the ERP project?
      2. What are your overarching requirements for business processes?
      3. What do you ultimately want to achieve?
      4. What is a statement that will ensure all stakeholders are on the same page for the project?

      Activity 1.1.2 – ERP Vision and Project Guiding Principles

      1 hour

      1. As a group, discuss whether you want to create a separate ERP vision statement or re-state your corporate vision and/or goals.
        • An ERP vision statement will provide project-guiding principles, encompass the ERP objectives, and give a rationale for the project.
        • Using the corporate vision/goals will remind the business and IT that the project is to find an ERP solution that supports and enhances the organizational objectives.
      2. Review each of the sample guiding principles provided and ask the following questions:
        1. Do we agree with the statement?
        2. Is this statement framed in the language we used internally? Does everyone agree on the meaning of the statement?
        3. Will this statement help guide our decision-making process?

      Record this information in the ERP Strategy Report Template.

      Sample of the 'ERP Strategy Report Template: Guiding Principles.

      Download the ERP Strategy Report Template

      Activity 1.1.2 – ERP Vision and Project Guiding Principles

      We, [Organization], will select and implement an integrated software suite that enhances the growth and profitability of the organization through streamlined global business processes, real time data-driven decisions, increased employee productivity, and IT investment protection.

      • Support Business Agility: A flexible and adaptable integrated business system providing a seamless user experience.
      • Utilize ERP best practices: Do not recreate or replicate what we have today, focus on modernization. Exercise customization governance by focusing on those customizations that are strategically differentiating.
      • Automate: Take manual work out where we can, empowering staff and improving productivity through automation and process efficiencies.
      • Stay focused: Focus on scope around core business capabilities. Maintain scope control. Prioritize demand in line with the strategy.
      • Strive for “One Source of Truth”: Unify data model and integrate processes where possible. Assess integration needs carefully.

      Align the ERP strategy with the corporate strategy

      Corporate Strategy Unified Strategy ERP Strategy
      • Conveys the current state of the organization and the path it wants to take.
      • Identifies future goals and business aspirations.
      • Communicates the initiatives that are critical for getting the organization from its current state to the future state.
      • ERP optimization can be and should be linked, with metrics, to the corporate strategy and ultimate business objectives.
      • Communicates the organization’s budget and spending on ERP.
      • Identifies IT initiatives that will support the business and key ERP objectives.
      • Outlines staffing and resourcing for ERP initiatives.

      Info-Tech Insight

      ERP projects are more successful when the management team understands the strategic importance and the criticality of alignment. Time needs to be spent upfront aligning business strategies with ERP capabilities. Effective alignment between IT and the business should happen daily. Alignment doesn’t just to occur at the executive level alone, but at each level of the organization.

      1.1.3 – Corporate goals and ERP benefits

      1-2 hours

      1. Discuss the business objectives. Identify two or three objectives that are a priority for this year.
      2. Produce several ways a new ERP system will meet each objective.
      3. Think about the modules and ERP functions that will help you realize these benefits.

      Cost Reduction

      • Decrease Total Cost: Reduce total costs by five percent by January 2022.
      • Decrease Specific Costs: Reduce costs of “x” business unit by ten percent by Jan. next year.

      ERP Benefits

      • Reduce headcount
      • Reallocate workers
      • Reduce overtime
      • Increased compliance
      • Streamlined audit process
      • Less rework due to decrease in errors

      Download the ERP Strategy Report Template

      Activity 1.1.3 – Corporate goals and ERP benefits

      Corporate Strategy ERP Benefits
      End customer visibility (consumer experience)
      • Help OEM’s target customers
      • Keep customer information up-to-date, including contact choices
      • [Product A] process support improvements
      • Ability to survey and track responses
      • Track and improve renewals
      • Service support – improve cycle times for claims, payment processing, and submission quality
      Social responsibility
      • Reduce paper internally and externally
      • Facilitating tracking and reporting of EFT
      • One location for all documents
      New business development
      • Track all contacts
      • Measure where in process the contact is
      • Measure impact of promotions
      Employee experience
      • Improve integration of systems reducing manual processes through automation
      • Better tracking of sales for employee comp
      • Ability to survey employees

      Step 1.2

      Scope and priorities

      Activities
      • 1.2.1 Project scope
      • 1.2.2 Competing priorities

      This step will walk you through the following activities:

      • Define the initial scope of the ERP project. This includes the discussion of what is not in scope. For example, a stand-alone warehouse management system may be out of scope while an existing HRMS could be in scope.

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      A project scope statement and a prioritized list of projects that may compete for organizational resources.

      Understand the importance of setting expectations with a scope statement

      Be sure to understand what is in scope for an ERP strategy project. Prevent too wide of a scope to avoid scope creep – for example, we aren’t tackling MMS or BI under ERP.

      A diamond shape with three layers. Inside is 'In Scope', middle is 'Scope Creep', and outside is 'Out of Scope'.

      Establishing the parameters of the project in a scope statement helps define expectations and provides a baseline for resource allocation and planning. Future decisions about the strategic direction of ERP will be based on the scope statement.

      Well-executed requirements gathering will help you avoid expanding project parameters, drawing on your resources, and contributing to cost overruns and project delays. Avoid scope creep by gathering high-level requirements that lead to the selection of category-level application solutions (e.g. HRIS, CRM, PLM etc.) rather than granular requirements that would lead to vendor application selection (e.g. SAP, Microsoft, Oracle, etc.).

      Out-of-scope items should also be defined to alleviate ambiguity, reduce assumptions, and further clarify expectations for stakeholders. Out-of-scope items can be placed in a backlog for later consideration.

      In Scope Out of Scope
      Strategy High-level ERP requirements, strategic direction
      Software selection Vendor application selection, Granular system requirements

      Activity 1.2.1 – Define scope

      1 hour

      1. Formulate a scope statement. Decide which people, processes, and functions the ERP strategy will address. Generally, the aim of this project is to develop strategic requirements for the ERP application portfolio – not to select individual vendors.
      2. To assist in forming your scope statement, answer the following questions:
        • What are the major coverage points?
        • Who will be using the systems?
        • How will different users interact with the systems?
        • What are the objectives that need to be addressed?
        • Where do we start?
        • Where do we draw the line?

      Record this information in the ERP Strategy Report Template.

      Sample of the 'ERP Strategy Report Template: Scope Statements'.

      Download the ERP Strategy Report Template

      Activity 1.2.1 – Define scope

      Scope statements

      The following systems are considered in scope for this project:

      • Finance
      • HRMS
      • CRM
      • Supply chain

      The following systems are out of scope for this project:

      • PLM – product lifecycle management
      • Project management
      • Contract management

      The following systems are in scope, in that they must integrate into the new system. They will not change.

      • Payroll processing
      • Bank accounts
      • EDI software

      Know your competing priorities

      Organizations typically have multiple projects on the table or in flight. Each of those projects requires resources and attention from business and/or the IT organization.

      Don’t let poor prioritization hurt your ERP implementation.
      BNP Paribas Fortis had multiple projects that were poorly prioritized resulting in the time to bring products to market to double over a three-year period. (Source: Neito-Rodriguez, 2016)

      Project Timeline Priority notes Implications
      Warehouse management system upgrade project Early 2022 implementation High Taking IT staff and warehouse team, testing by finance
      Microsoft 365 October 2021-March 2022 High IT Staff, org impacted by change management
      Electronic Records Management April 2022 – Feb 2023 High Legislative requirement, org impact due to record keeping
      Web site upgrade Early fiscal 2023

      Activity 1.2.2 – Competing priorities

      1 hour

      1. As a group, discuss the projects that are currently in flight as well as any known projects including such things as territory expansion or new regulation compliance.
      2. For each project discuss and record the following items:
        • The project timeline. When does it start and how long is it expected to run?
        • How important is this project to the organization? A lot of high priority projects are going to require more attention from the staff involved.
        • What are the implications of this project?
          • What staff will be impacted? What business users will be impacted, and what is the IT involvement?
          • To what extent will the overall organization be impacted? Is it localized to a location or is it organization wide?
          • Can the project be deferred?

      Record this information in the ERP Strategy Report Template.

      Sample of the 'ERP Strategy Report Template: Priorities'.

      Download the ERP Strategy Report Template

      Activity 1.2.2 – Competing priorities

      List all your known projects both current and proposed. Discuss the prioritization of those projects, whether they are more or less important than your ERP project.

      Project Timeline Priority notes Implications
      Warehouse management system upgrade project Early 2022 implementation High Taking IT staff and warehouse team, testing by finance
      Microsoft 365 October 2021-March 2022 High IT Staff, org impacted by change management
      Electronic Records Management April 2022 – Feb 2023 High Legislative requirement, org impact due to record keeping
      Web site upgrade Early fiscal 2023 Medium
      Point of Sale replacement Oct 2021– Mar 2022 Medium
      ERP utilization and training on unused systems Friday, Sept 17 Medium Could impact multiple staff
      Managed Security Service RFP This calendar year Medium
      Mental Health Dashboard In research phase Low

      Build an ERP Strategy and Roadmap

      Phase 2

      Define your ERP

      Phase 1

      • 1.1 Aligning business and IT
      • 1.2 Scope and priorities

      Phase 2

      • 2.1 ERP Business Model
      • 2.2 ERP processes and supporting applications
      • 2.3 Process pains, opportunities & maturity

      Phase 3

      • 3.1 Stakeholders, risk & value
      • 3.2 Project set up

      Phase 4

      • 4.1 Build your roadmap
      • 4.2 Wrap up and present

      This phase will walk you through the following activities:

      • Build the ERP business model then move on to the top level (mega) processes and an initial list of the sub-processes
      • Generate a list of applications that support the identified processes
      • Assign stakeholders, discuss pain points, opportunities, and key success indicators
      • Assign process and technology maturity to each stakeholder

      This phase involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP applications support team

      Step 2.1

      ERP business model

      Activities
      • 2.1.1 Environmental factors, technology drivers, and business needs
      • 2.1.2 Challenges, pain points, enablers, and organizational goals

      This step will walk you through the following activities:

      • Identify ERP drivers and objectives
      • Explore ERP challenges and pain points
      • Discuss the ERP benefits and opportunities

      This step involves the following participants:

      • ERP implementation team
      • Business stakeholders

      Outcomes of this step

      • ERP business model

      Explore environmental factors and technology drivers

      1. Identify business drivers that are contributing to the organization’s need for ERP.
      2. Understand how the company is running today and what the organization’s future will look like. Try to identify the purpose for becoming an integrated organization.
      3. Consider external considerations, organizational drivers, technology drivers, and key functional requirements
      The ERP Business Model with 'Business Needs', 'Environmental Factors', and 'Technology Drivers' highlighted. At the center is 'ERP Strategy' with 'Barriers' above and 'Enablers' below. Surrounding and feeding into the center group are 'Business Needs', 'Environmental Factors', 'Technology Drivers', and 'Organizational Goals'.
      External Considerations
      • Regulations
      • Elections
      • Availability of resources
      • Staff licensing and certifications
      Organizational Drivers
      • Compliance
      • Scalability
      • Operational efficiency
      • Union agreements
      • Self service
      • Role appropriate dashboards and reports
      • Real time data access
        • Use of data in the system (no exports)
      Technology Considerations
      • Data accuracy
      • Data quality
      • Better reporting
      Functional Requirements
      • Information availability
      • Integration between systems
      • Secure data

      Activity 2.1.1 – Explore environmental factors and technology drivers

      1 hour

      1. Identify business drivers that are contributing to the organization’s need for ERP.
      2. Understand how the company is running today and what the organization’s future will look like. Try to identify the purpose for becoming an integrated organization. Use a whiteboard or flip charts and markers to capture key findings.
      3. Consider External Considerations, Organizational Drivers, Technology Drivers, and Key Functional Requirements.

      Record this information in the ERP Strategy Report Template.

      Sample of the next slide, 'ERP Business Model', with an iconized ERP Business Model and a table highlighting 'Environmental Factors', 'Technology Drivers', and 'Business Needs'.

      Download the ERP Strategy Report Template

      ERP Business Model A iconized version of the ERP Business Model.

      Environmental FactorsTechnology DriversBusiness Needs
      • Regulations
      • Elections
      • Availability of resources
      • Staff licensing and certifications
      • Document storage
      • Cloud security standards
      • Functionality based on deployment
      • Cloud-first based on above
      • Integration with external data suppliers
      • Integration with internal systems (Elite?)
      • Compliance
      • Scalability
      • Operational efficiency
      • Union agreements
      • Self service
      • Role appropriate dashboards and reports
      • Real time data access
      • Use of data in the system (no exports)
      • CapEx vs. OpEx

      Discuss challenges, pain points, enablers and organizational goals

      1. Identify challenges with current systems and processes.
      2. Brainstorm potential barriers to successful ERP selection and implementation. Use a whiteboard and marker to capture key findings.
      3. Consider organizational goals along with barriers and enablers to ERP success.
      The ERP Business Model with 'Organizational Goals', 'Enablers', and 'Barriers' highlighted. At the center is 'ERP Strategy' with 'Barriers' above and 'Enablers' below. Surrounding and feeding into the center group are 'Business Needs', 'Environmental Factors', 'Technology Drivers', and 'Organizational Goals'.
      Functional Gaps
      • No online purchase order requisition
      Technical Gaps
      • Inconsistent reporting – data quality concerns
      Process Gaps
      • Duplication of data
      • Lack of system integration
      Barriers to Success
      • Cultural mindset
      • Resistance to change
      Business Benefits
      • Business-IT alignment
      IT Benefits
      • Compliance
      • Scalability
      Organizational Benefits
      • Data accuracy
      • Data quality
      Enablers of Success
      • Change management
      • Alignment to strategic objectives

      Activity 2.1.2 – Discuss challenges, pain points, enablers, and organizational goals

      1 hour

      1. Identify challenges with the current systems and processes.
      2. Brainstorm potential barriers to successful ERP selection and implementation. Use a whiteboard or flip chart and markers to capture key findings.
      3. Consider functional gaps, technical gaps, process gaps, and barriers to ERP success.
      4. Identify the opportunities and benefits from an integrated system.
      5. Brainstorm potential enablers for successful ERP selection and implementation. Use a whiteboard and markers to capture key findings.
      6. Consider business benefits, IT benefits, organizational benefits, and enablers of success.

      Record this information in the ERP Strategy Report Template.

      Sample of the next slide, 'ERP Business Model', with an iconized ERP Business Model and a table highlighting 'Organizational Goals', 'Enablers', and 'Barriers'.

      Download the ERP Strategy Report Template

      ERP Business Model A iconized version of the ERP Business Model.

      Organizational Goals Enablers Barriers
      • Efficiency
      • Effectiveness
      • Integrity
      • One source of truth for data
      • One team
      • Customer service, external and internal
      • Cross-trained employees
      • Desire to focus on value-add activities
      • Collaborative
      • Top level executive support
      • Effective change management process
      • Organizational silos
      • Lack of formal process documentation
      • Funding availability
      • What goes first? Organizational priorities

      Step 2.2

      ERP processes and supporting applications

      Activities
      • 2.2.1 ERP process inventory
      • 2.2.2 Application portfolio

      This step will walk you through the following activities:

      • Identify the top-level (mega) processes and create an initial list of the sub-processes
      • Generate a list of applications that support the identified processes

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP applications support team

      Outcomes of this step

      • A list of in scope business processes
      • A list of current applications and services supporting the business processes

      Process Inventory

      In business architecture, the primary view of an organization is known as a business capability map.

      A business capability defines what a business does to enable value creation rather than how.

      Business capabilities:

      • Represent stable business functions
      • Are unique and independent of each other
      • Will typically have a defined business outcome

      A business capability map provides details that help the business architecture practitioner direct attention to a specific area of the business for further assessment.

      A process map titled 'Business capability map (Level 0)' with many processes sectioned off into sections and subsections. The top-left section is 'Products and Services Development' with subsections 'Design'(6 processes) and 'Manufacturing'(3 processes). The top-middle section is 'Revenue Generation'(3 processes) and below that is 'Sourcing'(2 processes). The top-right section is 'Demand Fulfillment'(9 processes). Along the bottom is the section 'Enterprise Management and Planning' with subsections 'Human Resources'(4 processes), 'Business Direction'(4 processes), and 'Finance'(4 processes).

      If you do not have a documented process model, you can use the APQC Framework to help define your inventory of business processes.

      APQC’s Process Classification Framework is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.

      APQC’s Process Classification Framework

      Activity 2.2.1 – Process inventory

      2-4 hours

      1. As a group, discuss the business capabilities, value streams, and business processes.
      2. For each capability determine the following:
        • Is this capability applicable to our organization?
        • What application, if any, supports this capability?
      3. Are there any missing capabilities to add?

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Process Inventory' table on the next slide.

      Download the ERP Strategy Report Template

      Activity 2.2.1 – Process inventory

      Core Finance Core HR Workforce Management Talent Management Warehouse Management Enterprise Asset Management
      Process Technology Process Technology Process Technology Process Technology Process Technology Process Technology
      • General ledger
      • Accounts payable
      • Accounts receivable
      • GL consolidation
      • Cash management
      • Billing and invoicing
      • Expenses
      • Payroll accounting
      • Tax management
      • Reporting
      • Payroll administration
      • Benefits administration
      • Position management
      • Organizational structure
      • Core HR records
      • Time and attendance
      • Leave management
      • Scheduling
      • Performance management
      • Talent acquisition
      • Offboarding & onboarding
      • Plan layout
      • Manage inventory
      • Manage loading docks
      • Pick, pack, ship
      • Plan and manage workforce
      • Manage returns
      • Transfer product cross-dock
      • Asset lifecycle management
      • Supply chain management
      • Maintenance planning & scheduling
      Planning & Budgeting Strategic HR Procurement Customer Relationship Management Facilities Management Project Management
      Process Technology Process Technology Process Technology Process Technology Process Technology Process Technology
      • Budget reporting
      • Variance analysis
      • Multi-year operating plan
      • Monthly forecasting
      • Annual operating plan
      • Compensation planning
      • Workforce planning
      • Succession planning
      • Supplier management
      • Purchase order management
      • Workflow approvals
      • Contract / tender management
      • Contact management
      • Activity management
      • Analytics
      • Plan and acquire
      • Asset maintenance
      • Disposal
      • Project management
      • Project costing
      • Budget control
      • Document management

      Complete an inventory collection of your application portfolio

      MANAGED vs. UNMANAGED APPLICATION ENVIRONMENTS

      • Managed environments make way for easier inventory collection since there is significant control as to what applications can be installed on a company asset. Organizations will most likely have a comprehensive list of supported and approved applications.
      • Unmanaged environments are challenging to control because users are free to install any applications on company assets, which may or may not be supported by IT.
      • Most organizations fall somewhere in between – there is usually a central repository of applications and several applications that are exceptions to the company policies. Ensure that all applications are accounted for.

      Determine your inventory collection method:

      MANUAL INVENTORY COLLECTION
      • In its simplest form, a spreadsheet is used to document your application inventory.
      • For large organizations, reps interview all business domains to create a list of installed applications.
      • Conducting an end-user survey within your business domains is one way to gather your application inventory and assess quality.
      • This manual approach is most appropriate for smaller organizations with small application portfolios across domains.
      AUTOMATED INVENTORY COLLECTION
      • Using inventory collection compatibility tools, discover all of the supported applications within your organization.
      • This approach may not capture all applications, depending on the parameters of your automated tool.
      • This approach works well in a managed environment.

      Activity 2.2.2 – Understand the current application portfolio

      1-2 hours

      1. Brainstorm a list of the applications that support the ERP business processes inventoried in Activity 2.2.1. If an application has multiple instances, list each instance as a separate line item.
      2. Indicate the following for each application:
        1. User satisfaction. This may be more than one entry as different groups – e.g., IT vs. business – may differ.
        2. Processes supported. Refer to processes defined in Activity 2.2.1. Update 2.2.1 if additional processes are identified during this exercise.
        3. Define a future disposition: Keep, Update, Replace. It is possible to have more than one disposition, e.g., Update or Replace is a valid disposition.
      3. [Optional] Collect the following information about each application. This information can be used to calculate the cost per application and total cost per user:
        1. Number of users or user groups
        2. Estimated maintenance costs
        3. Estimated capital costs
        4. Estimated licensing costs
        5. Estimated support costs

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Application Portfolio' table on the next slide.

      Download the ERP Strategy Report Template

      2.2.2 - Application portfolio

      Inventory your applications and assess usage, satisfaction, and disposition

      Application Name Satisfaction Processes Supported Future Disposition
      PeopleSoft Financials Medium and declining ERP – shares one support person with HR Update or Replace
      Time Entry (custom) Low Time and Attendance Replace
      PeopleSoft HR Medium Core HR Update or Replace
      ServiceNow High ITSM
      CSM: Med-Low
      ITSM and CSM
      CSM – complexity and process changes
      Update
      Data Warehouse High IT
      Business: Med-Low
      BI portal – Tibco SaaS datamart Keep
      Regulatory Compliance Medium Regulatory software – users need training Keep
      ACL Analytics Low Audit Replace
      Elite Medium Supply chain for wholesale Update (in progress)
      Visual Importer Med-High Customs and taxes Keep
      Custom Reporting application Med-High Reporting solution for wholesale (custom for old system, patched for Elite) Replace

      2.3.1 – Visual application portfolio [optional]

      A diagram of applications and how they connect to each other. There are 'External Systems' and 'Internal Systems' split into three divisions, 'Retail Division', 'Wholesale Division', and 'Corporate Services'. Example external systems are 'Moneris', 'Freight Carriers', and 'Banks'. Example internal systems are 'Retail ERP/POS', 'Elite', and 'Excel'.

      Step 2.3

      Process pains, opportunities, and maturity

      Activities
      • 2.3.1 Level one process inventory with stakeholders
      • 2.3.2 Process pain points and opportunities
      • 2.3.3 Process key success indicators
      • 2.3.4 Process and technology maturity
      • 2.3.5 Mega-process prioritization

      This step will walk you through the following activities:

      • Assign stakeholders, discuss pain points, opportunities, and key success indicators for the mega-processes identified in Step 2.1
      • Assign process and technology maturity to each prioritizing the mega-processes

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP applications support team

      Outcomes of this step

      For each mega-process:

      • Level 1 processes with process and technology maturity assigned
      • Stakeholders identified
      • Process pain points, opportunities, and key success indicators identified
      • Prioritize the mega-processes

      Building out the mega-processes

      Congratulations, you have made it to the “big lift” portion of the blueprint. For each of the processes that were identified in exercise 2.2.1, you will fill out the following six details:

      1. Primary stakeholder(s)
      2. A description of the process
      3. hat level 1 processes/capabilities the mega-process is composed of
      4. Problems the new system must solve
      5. What success will look like when the new system is implemented
      6. The process and technological maturity of each level 1 process.

      Sample of the 'Core Finance' slide in the ERP Strategy Report, as shown on the next slide, with numbers corresponding to the ordered list above. 1 is on a list of 'Stakeholders', 2 is by the 'Description' box, 3 is on the 'Capability' table column, 4 is on the 'Current Pain Points' box, 5 is on the 'Key Success Factors' box, and 6 is on the 'Maturity' ratings column.

      It will take one to three hours per mega-process to complete the six different sections.

      Note:
      For each mega-process identified you will create a separate slide in the ERP Strategy Report. Default slides have been provided. Add or delete as necessary.

      Sample of the 'Core Finance' slide in the ERP Strategy Report. Note on the list of stakeholders reads 'Primary Stakeholders'. Note on the title, Core Finance, reads 'Mega-process name'. Note on the description box reads 'Description of the process'. Note on the 'Key Success Factors' box reads 'What success looks like'. Note on the 'Current Pain Points' box reads 'Problems the new system must solve'. Below is a capability table with columns 'Capability', 'Maturity', and a blank on for notes. Note on the 'Capability' table column reads 'Level 1 process'. Note on the 'Maturity' ratings column reads 'Level 1 process maturity of process and technology'. Note on the notes column reads 'Level 1 process notes'.

      An ERP project is most effective when you follow a structured approach to define, select, implement, and optimize

      Top-down approach

      ERP Strategy
      • Operating Model – Define process strategy, objectives, and operational implications.
      • Level 1 Processes –Define process boundaries, scope at the organization level; the highest level of mega-process.

      • Level 2 Processes – Define processes by function/group which represent the next level of process interaction in the organization.
      • Level 3 Processes – Decompose process by activity and role and identify suppliers, inputs, outputs, customers, metrics, and controls.
      • Functional Specifications; Blueprint and Technical Framework – Refine how the system will support and enable processes; includes functional and technical elements.
      • Org Structure and Change Management – Align org structure and develop change mgmt. strategy to support your target operating model.
      • Implementation and Transition to Operations – Execute new methods, systems, processes, procedures, and organizational structure.
      • ERP Optimization and Continuous Improvement – Establish a program to monitor, govern, and improve ERP systems and processes.

      *A “stage gate” approach should be used: the next level begins after consensus is achieved for the previous level.

      Activity 2.3.1 – Level 1 process inventory with stakeholders

      1 hour per mega-process

      1. Identify the primary stakeholder for the mega-process. The primary stakeholder is usually the process owner. For example, for core finance the CFO is the process owner/primary stakeholder. Name a maximum of three stakeholders.
      2. In the lower section, detail all the capabilities/processes associated with the mega-process. Be careful to remain at the level 1 process level as it is easy to start identifying the “How” of a process. The “How” is too deep.

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Core Finance' slide in the ERP Strategy Report with the 'Stakeholders' list and 'Capability' table column highlighted.

      Download the ERP Strategy Report Template

      Activity 2.3.2 – Process pain points and opportunities

      30+ minutes per mega-process

      1. As a group, write a clear description of the mega-process. This helps establish alignment on the scope of the mega-process.
      2. Start with the discussion of current pain points with the various capabilities. These pain points will be items that the new solution will have to resolve.

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Core Finance' slide in the ERP Strategy Report with the 'Description', 'Key Success Factors', and 'Current Pain Points' boxes highlighted.

      Download the ERP Strategy Report Template

      Activity 2.3.3 – Key success indicators

      30 minutes per mega-process

      1. Document key success factors that should be base-lined in the existing system to show the overall improvement once the new system is implemented. For example, if month-end close takes 12 days in the current system, target three days for month-end close in the new system.

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Core Finance' slide in the ERP Strategy Report with the 'Description', 'Key Success Factors', and 'Current Pain Points' boxes highlighted.

      Download the ERP Strategy Report Template

      Activity 2.3.4 – Process and technology maturity

      1 hour

      1. For each capability/level 1 process identified determine you level of process maturity:
        • Weak – Ad hoc processes without documentation
        • Moderate – Documented processes that are often executed consistently
        • Strong – Documented processes that include exception handling that are rigorously followed
        • Payroll is an example of a strong process, even if every step is manual. The process is executed the same every time to ensure staff are paid properly and on time.
      2. For each capability/level 1 process identified determine you level of technology maturity:
        • Weak – manual execution and often paper-based
        • Moderate – Some technology support with little automation
        • Strong – The process executed entirely within the technology stack with no manual processes

      Record this information in the ERP Strategy Report Template.

      Sample of the 'Core Finance' slide in the ERP Strategy Report with the 'Maturity' and notes columns highlighted.

      Download the ERP Strategy Report Template

      Activity 2.3.5 – Mega-process prioritization

      1 hour

      1. For the mega-processes identified, map each process’s current state in terms of process rigor versus organizational importance.
        • For process rigor, refer to your process maturity in the previous exercises.
      2. Now, as a group discuss how you want to “move the needle” on each of the processes. Remember that you have a limited capacity so focus on the processes that are, or will be, of strategic importance to the organization. The processes that are placed in the top right quadrant are the ones that are likely the strategic differentiators.

      Record this information in the ERP Strategy Report Template.

      A smaller version of the process prioritization map on the next slide.

      Download the ERP Strategy Report Template.

      ERP Process Prioritization

      Establishing an order of importance can impact vendor selection and implementation roadmap; high priority areas are critical for ERP success.

      A prioritization map placing processes by 'Rigor' and 'Organizational Importance' They are numbered 1-9, 0, A, and B and are split into two colour-coded sets for 'Future (green)' and 'Current(red)'. On the x-axis 'Organizational Importance' ranges from 'Operational' to 'Strategic' and on the y-axis 'Process Rigor' ranges from 'Get the Job Done' to 'Best Practice'. Comparing 'Current' to 'Future', they have all moved up from 'Get the Job Done' into 'Best Practice' territory and a few have migrated over from 'Operational' to 'Strategic'. Processes are 1. Core Finance, 2. Core HR, 3. Workforce Management, 4.Talent Management, 5. Employee Health and Safety, 6. Enterprise Asset Management, 7.Planning & Budgeting, 8. Strategic HR, 9. Procurement Mgmt., 0. CRM, A. Facilities, and B. Project Management.

      Build an ERP Strategy and Roadmap

      Phase 3

      Plan your project

      Phase 1

      • 1.1 Aligning business and IT
      • 1.2 Scope and priorities

      Phase 2

      • 2.1 ERP Business Model
      • 2.2 ERP processes and supporting applications
      • 2.3 Process pains, opportunities & maturity

      Phase 3

      • 3.1 Stakeholders, risk & value
      • 3.2 Project set up

      Phase 4

      • 4.1 Build your roadmap
      • 4.2 Wrap up and present

      This phase will walk you through the following activities:

      • Map out your stakeholders to evaluate their impact on the project
      • Build an initial risk register and ensure the group is aligned
      • Set the initial core project team and their accountabilities and get them started on the project

      This phase involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Step 3.1

      Stakeholders, risk, and value

      Activities
      • 3.1.1 Stakeholder analysis
      • 3.1.2 Potential pitfalls and mitigation strategies
      • 3.1.3 Project value [optional]

      This step will walk you through the following activities:

      • Map out your stakeholders to evaluate their impact on the project
      • Build an initial risk register and ensure the group is aligned

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      • An understanding of the stakeholders and their project influence
      • An initial risk register
      • A consensus on readiness to proceed

      Understand how to navigate the complex web of stakeholders in ERP

      Identify which stakeholders to include and what their level of involvement should be during requirements elicitation based on relevant topic expertise.

      Sponsor End User IT Business
      Description An internal stakeholder who has final sign-off on the ERP project. Front-line users of the ERP technology. Back-end support staff who are tasked with project planning, execution, and eventual system maintenance. Additional stakeholders that will be impacted by any ERP technology changes.
      Examples
      • CEO
      • CIO/CTO
      • COO
      • CFO
      • Warehouse personnel
      • Sales teams
      • HR admins
      • Applications manager
      • Vendor relationship manager(s)
      • Director, Procurement
      • VP, Marketing
      • Manager, HR
      Value Executive buy-in and support is essential to the success of the project. Often, the sponsor controls funding and resource allocation. End users determine the success of the system through user adoption. If the end user does not adopt the system, the system is deemed useless and benefits realization is poor. IT is likely to be responsible for more in-depth requirements gathering. IT possesses critical knowledge around system compatibility, integration, and data. Involving business stakeholders in the requirements gathering will ensure alignment between HR and organizational objectives.

      Large-scale ERP projects require the involvement of many stakeholders from all corners and levels of the organization, including project sponsors, IT, end users, and business stakeholders. Consider the influence and interest of stakeholders in contributing to the requirements elicitation process and involve them accordingly.

      An example stakeholder map, categorizing stakeholders by amount of influence and interest.

      Activity 3.1.1 – Map your stakeholders

      1 hour

      1. As a group, identify all the ERP stakeholders. A stakeholder may be an individual such as the CEO or CFO, or it may be a group such as front-line employees.
      2. Map each stakeholder on the quadrant based on their expected Influence and Involvement in the project
      3. [Optional] Color code the users using the scale below to quickly identify the group that the stakeholder belongs to.
        • Sponsor – An internal stakeholder who has final sign-off on the ERP project.
        • End User – Front-line users of the ERP technology.
        • IT – Back-end support staff who are tasked with project planning, execution, and eventual system maintenance.
        • Business – Additional stakeholders that will be impacted by any ERP technology changes.

      Record this information in the ERP Strategy Report Template.

      Preview of the next slide.

      Download the ERP Strategy Report Template

      Slide titled 'Map the organization's stakeholders with a more in-depth example of a stakeholder map and long 'List of Stakeholders'. The quadrants that stakeholders are sorted into by influence and involvement are labelled 'Keep Satisfied (1)', 'Involve Closely (2)', 'Monitor (3)', and 'Keep Informed (4)'.

      Prepare contingency plans to minimize time spent handling unexpected risks

      Understanding the technical and strategic risks of a project can help you establish contingencies to reduce the likelihood of risk occurrence and devise mitigation strategies to help offset their impact if contingencies are insufficient.

      Risk Impact Likelihood Mitigation Effort
      Inadequate budget for additional staffing resources. 2 1 Use internal transfers and role-sharing rather than external hiring.
      Push-back on an ERP solution. 2 2 Use formal communication plans, an ERP steering committee, and change management to overcome organizational readiness.
      Overworked resources. 1 1 Create a detailed project plan that outlines resources and timelines in advance.
      Rating Scale:
      Impact: 1- High Risk 2- Moderate Risk 3- Minimal Risk
      Likelihood: 1- High/Needs Focus 2- Can Be Mitigated 3- Remote Likelihood

      Remember

      The biggest sources of risk in an ERP strategy are lack of planning, poorly defined requirements, and lack of governance.

      Apply the following mitigation tips to avoid pitfalls and delays.

      Risk Mitigation Tips

      • Upfront planning
      • Realistic timelines
      • Resource support
      • Managing change
      • Executive sponsorship
      • Sufficient funding
      • Setting the right expectations

      Activity 3.1.2 – Identify potential project pitfalls and mitigation strategies

      1-2 hours

      1. Discuss what “Impact” and “Likelihood” mean to your organization. For example, define Impact by what is important to your organization – financial loss, reputational impact, employee loss, and process impairment are all possible factors.
      2. Identify potential risks that may impede the successful completion of each work initiative. Risks may include predictable factors such as low resource capability, or unpredictable factors such as a change in priorities leading to withdrawn buy-in.
      3. For each risk, identify mitigation tactics. In some cases, mitigation tactics might take the form of standalone work initiative. For example, if a risk is lack of end-user buy-in, a work initiative to mitigate that risk might be to build an end-user communication plan.

      Record this information in the ERP Strategy Report Template.

      Preview of the next slide.

      Download the ERP Strategy Report Template

      Risks

      Risk Impact Likelihood Mitigation Effort
      Inadequate budget for additional staffing resources. 2 1 Use internal transfers and role-sharing rather than external hiring.
      Push-back on an ERP solution. 2 2 Use formal communication plans, an ERP steering committee, and change management to overcome organizational readiness.
      Overworked resources. 1 1 Create a detailed project plan that outlines resources and timelines in advance.
      Project approval 1 1 Build a strong business case for project approval and allow adequate time for the approval process
      Software does not work as advertised resulting in custom functionality with associated costs to create/ maintain 1 2 Work with staff to change processes to match the software instead of customizing the system thorough needs analysis prior to RFP creation
      Under estimation of staffing levels required, i.e. staff utilized at 25% for project when they are still 100% on their day job 1 2 Build a proper business case around staffing (be somewhat pessimistic)
      EHS system does not integrate with new HRMS/ERP system 2 2
      Selection of an ERP/HRMS that does not integrate with existing systems 2 3 Be very clear in RFP on existing systems that MUST be integrated to
      Rating Scale:
      Impact: 1- High Risk 2- Moderate Risk 3- Minimal Risk
      Likelihood: 1- High/Needs Focus 2- Can Be Mitigated 3- Remote Likelihood

      Is the organization committed to the ERP project?

      A recent study of critical success factors to an ERP implementation identified top management support and interdepartmental communication and cooperation as the top two success factors.

      By answering the seven questions the key stakeholders are indicating their commitment. While this doesn’t guarantee that the top two critical success factors have been met, it does create the conversation to guide the organization into alignment on whether to proceed.

      A table of example stakeholder questions with options 1-5 for how strongly they agree or disagree. 'Strongly disagree - 1', 'Somewhat disagree - 2', 'Neither agree or disagree - 3', 'Somewhat agree - 4', 'Strongly agree - 5'.

      Activity 3.1.3 – Project value (optional)

      30 minutes

      1. As a group, discuss the seven questions in the table. Ensure everyone agrees on what the questions are asking. If necessary, modify the language so that the meaning is clear to everyone.
      2. Have each stakeholder answer the seven questions on their own. Have someone compile the answers looking for:
        1. Any disagrees, strongly, somewhat, or neither as this indicates a lack of clarity. Endeavour to discover what additional information is required.
        2. [Optional] Have the most positive and most negative respondents present their points of view for the group to discuss. Is someone being overly optimistic, or pessimistic? Did the group miss something?

      There are no wrong answers. It should be okay to disagree with any of these statements. The goal of the exercise is to generate conversation that leads to support of the project and collaboration on the part of the participants.

      Record this information in the ERP Strategy Report Template.

      A preview of the next slide.

      Download the ERP Strategy Report Template

      Ask the right questions now to determine the value of the project to the organization

      Please indicate how much you agree or disagree with each of the following statements.

      Question # Question Strongly disagree Somewhat disagree Neither agree nor disagree Somewhat agree Strongly agree
      1. I have everything I need to succeed. 1 2 3 4 5
      2. The right people are involved in the project. 1 2 3 4 5
      3. I understand the process of ERP selection. 1 2 3 4 5
      4. My role in the project is clear to me. 1 2 3 4 5
      5. I am clear about the vision for this project. 1 2 3 4 5
      6. I am nervous about this project. 1 2 3 4 5
      7. There is leadership support for the project. 1 2 3 4 5

      Step 3.2

      Project set up

      Activities
      • 3.2.1 Create the project team
      • 3.2.2 Set the project RACI

      This step will walk you through the following activities:

      • Set the initial core project team and their accountabilities to the project.

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      • Identify the core team members and their time commitments.
      • Assign responsibility, accountability or communication needs.

      Identify the right stakeholders for your project team

      Consider the core team functions when composing the project team. It is essential to ensure that all relevant perspectives (business, IT, etc.) are evaluated to create a well-aligned and holistic ERP strategy.

      PROJECT TEAM ROLES

      • Project champion
      • Project advisor
      • Steering committee
      • Project manager
      • Project team
      • Subject matter experts
      • Change management specialist

      PROJECT TEAM FUNCTIONS

      • Collecting all relevant inputs from the business.
      • Gathering high-level requirements.
      • Creating a roadmap.

      Info-Tech Insight

      There may be an inclination towards a large project team when trying to include all relevant stakeholders. Carefully limiting the size of the project team will enable effective decision making while still including functional business units like HR and Finance, as well as IT.

      Activity 3.2.1 – Project team

      1 hour

      1. Considering your ERP project scope, discuss the resources and capabilities necessary, and generate a complete list of key stakeholders considering each of the roles indicated on the chart to the right.
      2. Using the list previously generated, identify a candidate(s) for each role and determine their responsibility in the ERP strategy and their expected time commitment.

      Record this information in the ERP Strategy Report Template.

      Preview of the table on the next slide.

      Download the ERP Strategy Report Template

      Project team

      Of particular importance for this table is the commitment column. It is important that the organization understands the level of involvement for all roles. Failure to properly account for the necessary involvement is a major risk factor.

      Role Candidate Responsibility Commitment
      Project champion John Smith
      • Provide executive sponsorship.
      20 hours/week
      Steering committee
      • Establish goals and priorities.
      • Define scope and approve changes.
      • Provide adequate resources and resolve conflict.
      • Monitor project milestones.
      10 hours/week
      Project manager
      • Prepare and manage project plan.
      • Monitor project team progress.
      • Conduct project team meetings.
      40 hours/week
      Project team
      • Drive day-to-day project activities.
      • Coordinate department communication.
      • Make process and design decisions.
      40 hours/week
      Subject matter experts by area
      • Attend meetings as needed.
      • Respond to questions and inquiries.
      5 hours/week

      Define project roles and responsibilities to improve progress tracking

      Build a list of the core ERP strategy team members and then structure a RACI chart with the relevant categories and roles for the overall project.

      • Responsible – Conducts work to achieve the task
      • Accountable – Answerable for completeness of task
      • Consulted – Provides input for the task
      • Informed – Receives updates on the task

      Benefits of assigning RACI early:

      • Improve project quality by assigning the right people to the right tasks.
      • Improve chances of project task completion by assigning clear accountabilities.
      • Improve project buy-in by ensuring stakeholders are kept informed of project progress, risks, and successes.

      Activity 3.2.2 – Project RACI

      1 hour

      1. The ERP strategy will require a cross-functional team within IT and business units. Make sure the responsibilities are clearly communicated to the selected project sponsor.
      2. Modify the left-hand column to match the activities expected in your project.

      Record this information in the ERP Strategy Report Template.

      Preview of the RACI chart on the next slide.

      Download the ERP Strategy Report Template

      3.2.2 – Project RACI

      Project champion Project advisor Project steering committee Project manager Project team Subject matter experts
      Determine project scope & vision I C A R C C
      Document business goals I I A R I C
      Inventory ERP processes I I A C R R
      Map current state I I A R I R
      Assess gaps and opportunities I C A R I I
      Explore alternatives R R A I I R
      Build a roadmap R A R I I R
      Create a communication plan R A R I I R
      Present findings R A R I I R

      Build an ERP Strategy and Roadmap

      Phase 4

      Next steps

      Phase 1

      • 1.1 Aligning business and IT
      • 1.2 Scope and priorities

      Phase 2

      • 2.1 ERP Business Model
      • 2.2 ERP processes and supporting applications
      • 2.3 Process pains, opportunities & maturity

      Phase 3

      • 3.1 Stakeholders, risk & value
      • 3.2 Project set up

      Phase 4

      • 4.1 Build your roadmap
      • 4.2 Wrap up and present

      This phase will walk you through the following activities:

      • Review the different options to solve the identified pain points
      • Build out a roadmap showing how you will get to those solutions
      • Build a communication plan that includes the stakeholder presentation

      This phase involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Step 4.1

      Build your roadmap

      Activities
      • 4.1.1 Pick your path
      • 4.1.2 Build your roadmap
      • 4.1.3 Visualize your roadmap (optional)

      This step will walk you through the following activities:

      • Review the different options to solve the identified pain points then build out a roadmap of how to get to that solution.

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      • A strategic direction is set
      • An initial roadmap is laid out

      Choose the right path for your organization

      There are several different paths you can take to achieve your ideal future state. Make sure to pick the one that suits your needs as defined by your current state.

      A diagram of strategies. At the top is 'Current State', at the bottom is 'Future State', and listed strategies are 'Maintain Current System', 'Augment Current System', 'Optimize', and 'Transform'.

      Explore the options for achieving your ideal future state

      CURRENT STATE STRATEGY
      Your existing application satisfies both functionality and integration requirements. The processes surrounding it likely need attention, but the system should be considered for retention. MAINTAIN CURRENT SYSTEM
      Your existing application is, for the most part, functionally rich, but may need some tweaking. Spend time and effort building and enhancing additional functionalities or consolidating and integrating interfaces. AUGMENT CURRENT SYSTEM
      Your ERP application portfolio consists of multiple apps serving the same functions. Consolidating applications with duplicate functionality is more cost efficient and makes integration and data sharing simpler. OPTIMIZE: CONSOLIDATE AND INTEGRATE SYSTEMS
      Your existing system offers poor functionality and poor integration. It would likely be more cost and time efficient to replace the application and its surrounding processes altogether. TRANSFORM: REPLACE CURRENT SYSTEM

      Option: Maintain your current system

      Resolve your existing process and people pain points

      MAINTAIN CURRENT SYSTEM

      Keep the system, change the process.

      Your existing application satisfies both functionality and integration requirements. The processes surrounding it likely need attention, but the system should be considered for retention.

      Maintaining your current system entails adjusting current processes and/or adding new ones, and involves minimal cost, time, and effort.

      INDICATORS POTENTIAL SOLUTIONS
      People Pain Points
      • Lack of training
      • Low user adoption
      • Lack of change management
      • Contact vendor to inquire about employee training opportunities
      • Build a change management strategy
      Process Pain Points
      • Legacy processes
      • Workarounds and shortcuts
      • Highly specialized processes
      • Inconsistent processes
      • Explore process reengineering and process improvement opportunities
      • Evaluate and standardize processes

      Option: Augment your current system

      Use augmentation to resolve your existing technology and data pain points

      AUGMENT CURRENT SYSTEM

      Add to the system.

      Your existing application is for the most part functionally rich but may need some tweaking. Spend time and effort enhancing your current system.

      You will be able to add functions by leveraging existing system features. Augmentation requires limited investment and less time and effort than a full system replacement.

      INDICATORS POTENTIAL SOLUTIONS
      Technology Pain Points
      • Lack of reporting functions.
      • Lacking functional depth in key process areas.
      • Add point solutions or enable modules to address missing functionality.
      Data Pain Points
      • Poor data quality
      • Lack of data for processing and reporting
      • Single-source data entry
      • Add modules or augment processes to capture data

      Option: Consolidate and integrate

      Consolidate and integrate your current systems to address your technology and data pain points

      CONSOLIDATE AND INTEGRATE SYSTEMS

      Get rid of one system, combine two, or connect many.

      Your ERP application portfolio consists of multiple apps serving the same functions.

      Consolidating your systems eliminates the need to manage multiple pieces of software that provide duplicate functionality. Reducing the number of ERP applications makes integration and data sharing simpler.

      INDICATORS POTENTIAL SOLUTIONS
      Technology Pain Points
      • Disparate and disjointed systems
      • Multiple systems supporting the same function
      • Unused software licenses
      • System consolidation
      • System and module integration
      • Assess usage and consolidate licensing
      Data Pain Points
      • Multiple versions of same data
      • Duplication of data entry in different modules or systems
      • Poor data quality
      • Centralize core records
      • Assign data ownership
      • Single-source data entry

      Option: Replace your current system

      Replace your system to address gaps in your existing processes and various pain points

      REPLACE CURRENT SYSTEM

      Start from scratch.

      You’re transitioning from an end-of-life legacy system. Your existing system offers poor functionality and poor integration. It would likely be more cost and time efficient to replace the application and its surrounding processes all together.

      INDICATORS POTENTIAL SOLUTIONS
      Technology Pain Points
      • Lack of functionality and poor integration.
      • Obsolete technology.
      • Not aligned with technology direction or enterprise architecture plans.
      • Evaluate the ERP technology landscape.
      • Determine if you need to replace the current system with a point solution or an all-in-one solution.
      • Align ERP technologies with enterprise architecture.
      Data Pain Points
      • Limited capability to store and retrieve data.
      • Understand your data requirements.
      Process Pains
      • Insufficient tools to manage workflow.
      • Review end-to-end processes.
      • Assess user satisfaction.

      Activity 4.1.1 – Path to future state

      1+ hour
      1. Discuss the four options and the implications for your organization.
      2. Come to an agreement on your chosen path.

      The same diagram of strategies. At the top is 'Current State', at the bottom is 'Future State', and listed strategies are 'Maintain Current System', 'Augment Current System', 'Optimize', and 'Transform'.

      Activity 4.1.2 – Build a roadmap

      1-2 hours

      1. Start your roadmap with the stakeholder presentation. This is your mark in the sand to launch the project.
      2. For each item on your roadmap assign an owner who will be accountable to the completion of the roadmap item.
      3. Wherever possible, assign a start date, month, or quarter. The more specific you can be the better.
      4. Identify completion dates to create a sense of urgency. If you are struggling with start dates, it can help to start with a finish date and “back in” to a start date based on estimated efforts.

      Record this information in the ERP Strategy Report Template.

      Note:
      Your roadmap should be treated as a living document that is updated and shared with the stakeholders on a regular schedule.

      Preview of the strategy roadmap table on the next slide.

      Download the ERP Strategy Report Template

      ERP Strategy roadmap

      Initiative Owner Start Date Completion Date
      Create final workshop deliverable Info-Tech 16 September, 2021
      Review final deliverable Workshop sponsor
      Present to executive team Oct 2021
      Build business case CFO, CIO, Directors 3 weeks to build
      3-4 weeks process time
      Build an RFI for initial costings 1-2 weeks
      Stage 1 approval for requirements gathering Executive committee Milestone
      Determine and acquire BA support for next step 1 week
      Requirements gathering – level 2 processes Project team 5-6 weeks effort
      Build RFP (based on informal approval) CFO, CIO, Directors 4th calendar quarter 2022 Possible completion January 2023
      2-4 weeks

      Activity 4.1.3 – Build a visual roadmap [optional]

      1 hour

      1. For some, a visual representation of a roadmap is easier to comprehend. Consider taking the roadmap built in 4.1.2 and creating a visual.

      Record this information in the ERP Strategy Report Template.

      Preview of the visual strategy roadmap chart on the next slide.

      Download the ERP Strategy Report Template

      ERP Strategy Roadmap

      A table set up similarly to the previous one, but instead of 'Start Date' and 'Completion Date' columns there are multiple small columns broken up by fiscal quarters (i.e.. FY2022: Q1, Q2, Q3, Q4). There is a key with a light blue diamond shape representing a 'Milestone' and a blue arrow representing a 'Work in progress'; they are placed the Quarters columns according to when each row item reached a milestone or began its progress.

      Step 4.2

      Wrap up and present

      Activities
      • 4.2.1 Communication plan
      • 4.2.2 Stakeholder presentation

      This step will walk you through the following activities:

      • Build a communication plan as part of organizational change management, which includes the stakeholder presentation

      This step involves the following participants:

      • Primary stakeholders in each value stream supported by the ERP
      • ERP Applications support team

      Outcomes of this step

      • An initial communication plan for organizational change management
      • A stakeholder presentation

      Effectively communicate the changes an ERP foundation strategy will impose

      A communication plan is necessary because not everyone will react positively to change. Therefore, you must be prepared to explain the rationale behind any initiatives that are being rolled out.

      Steps:

      1. Start by building a sound communication plan.
      2. The communication plan should address all stakeholders that will be subject to change, including executives and end users.
      3. Communicate how a specific initiative will impact the way employees work and the work they do.
      4. Clearly convey the benefits of the strategy to avoid resistance.

      “The most important thing in project management is communication, communication, communication. You have to be able to put a message into business terms rather than technical terms.” (Lance Foust, I.S. Manager, Plymouth Tube Company)

      Project Goals Communication Goals Required Resources Communication Channels
      Why is your organization embarking on an ERP project? What do you want employees to know about the project? What resources are going to be utilized throughout the ERP strategy? How will your project team communicate project updates to the employees?
      Streamline processes and achieve operational efficiency. We will focus on mapping and gathering requirements for (X) mega-processes. We will be hiring process owners for each mega-process. You will be kept up to date about the project progress via email and intranet. Please feel free to contact the project owner if you have any questions.

      Activity 4.2.1 – Communication plan

      1 hour

      1. List the types of communication events and documents you will need to produce and distribute.
      2. Indicate the purpose of the event or document, who the audience is, and who is responsible for the communication.
      3. Identify who will be responsible for the development and delivery of the communication plan.

      Record this information in the ERP Strategy Report Template.

      Preview of the Communication Plan table on the next slide.

      Download the ERP Strategy Report Template

      Communication plan

      Use the communication planning template to track communication methods needed to convey information regarding ERP initiatives.

      This is designed to help your organization make ERP initiatives visible and create stakeholder awareness.

      Audience Purpose Delivery/ Format Communicator Delivery Date Status/Notes
      Front-line employees Highlight successes Bi-weekly email CEO Mondays
      Entire organization Highlight successes
      Plans for next iteration
      Monthly townhall Senior leadership Last Thursday of every month Recognize top contributors from different parts of the business. Consider giving out prizes such as coffee mugs
      Iteration demos Show completed functionality to key stakeholders Iteration completion web conference Delivery lead Every other Wednesday Record and share the demonstrations to all employees

      Conduct a presentation of the final deliverable for stakeholders

      After completing the activities and exercises within this blueprint, the final step of the process is to present the deliverable to senior management and stakeholders.

      Know Your Audience

      • Decide what needs to be presented and to whom. The purpose and format for communicating initiatives varies based on the audience. Identify the audience first to ensure initiatives are communicated appropriately.
      • IT and the business speak different languages. The business may not have the patience to try to understand IT, so it is up to IT to learn and use the language of business. Failing to put messages into language that resonates with the business will create disengagement and resistance.
      • Effective communication takes preparation to get the right content and tone to convey your real message.

      Learn From Other Organizations

      “When delivering the strategy and next steps, break the project down into consumable pieces. Make sure you deliver quick wins to retain enthusiasm and engagement.

      By making it look like a different project you keep momentum and avoid making it seem unattainable.” (Scott Clark, Innovation Credit Union)

      “To successfully sell the value of ERP, determine what the high-level business problem is and explain how ERP can be the resolution. Explicitly state which business areas ERP is going to touch. The business often has a very narrow view of ERP and perceives it as just a financial system. The key part of the strategy is that the organization sees the broader view of ERP.” (Scott Clark, Innovation Credit Union)

      Activity 4.2.2 – Stakeholder presentation

      1 hour

      1. The following sections of the ERP Strategy Report Template are designed to function as the stakeholder presentation:
        1. Workshop Overview
        2. ERP Models
        3. Roadmap
      2. You can use the Template as your presentation deck or extract the above sections to create a stand-alone stakeholder presentation.
      3. Remember to take your audience into account and anticipate the questions they may have.

      Samples of the ERP Strategy Report Template.

      Download the ERP Strategy Report Template

      Summary of Accomplishment

      Get the Most Out of Your ERP

      ERP technology is critical to facilitating an organization’s flow of information across business units. It allows for seamless integration of systems and creates a holistic view of the enterprise to support decision making. ERP implementation should not be a one-and-done exercise. There needs to be an ongoing optimization to enable business processes and optimal organizational results.

      Build an ERP Strategy and Roadmap allows organizations to proactively implement continuous assessment and optimization of their enterprise resource planning system, including:

      • Alignment and prioritization of key business and technology drivers.
      • Identification of ERP processes, including classification and gap analysis.
      • Measurement of user satisfaction across key departments.
      • Improved vendor relations.
      • Data quality initiatives.

      This formal ERP optimization initiative will drive business-IT alignment, identify IT automation priorities, and dig deep into continuous process improvement.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Research Contributors

      Name Title Organization
      Anonymous Anonymous Software industry
      Anonymous Anonymous Pharmaceutical industry
      Boris Znebel VP of Sales Second Foundation
      Brian Kudeba Director, Administrative Systems Fidelis Care
      David Lawrence Director, ERP Allegheny Technologies Inc.
      Ken Zima CIO Aquarion Water Company
      Lance Foust I.S. Manager Plymouth Tube Company
      Pooja Bagga Head of ERP Strategy & Change Transport for London
      Rob Schneider Project Director, ERP Strathcona County
      Scott Clark Innovation Credit Union
      Tarek Raafat Manager, Application Solutions IDRC
      Tom Walker VP, Information Technology StarTech.com

      Related Info-Tech Research

      Bibliography

      Gheorghiu, Gabriel. "The ERP Buyer’s Profile for Growing Companies." Selecthub. 2018. Accessed 21 Feb. 2021.

      "Maximizing the Emotional Economy: Behavioral Economics." Gallup. n.d. Accessed 21 Feb. 2021.

      Neito-Rodriguez, Antonio. Project Management | How to Prioritize Your Company's Projects. 13 Dec. 2016. Accessed 29 Nov 2021. Web.

      "A&D organization resolves organizational.“ Case Study. Panorama Consulting Group. 2021. PDF. 09 Nov. 2021. Web.

      "Process Frameworks." APQC. n.d. Accessed 21 Feb. 2021.

      Saxena, Deepak and Joe Mcdonagh. "Evaluating ERP Implementations: The Case for a Lifecycle-based Interpretive Approach." The Electronic Journal of Information Systems Evaluation, 29-37. 22 Feb. 2019. Accessed 21 Feb. 2021.

      Modernize Your Corporate Website to Drive Business Value

      • Buy Link or Shortcode: {j2store}524|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: $10,399 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Users are demanding more valuable web functionalities and improved access to your website services. They are expecting development teams to keep up with their changing needs.
      • The criteria of user acceptance and satisfaction involves more than an aesthetically pleasing user interface (UI). It also includes how emotionally attached the user is to the website and how it accommodates user behaviors.

      Our Advice

      Critical Insight

      Complication

      • Organizations are focusing too much on the UI when they optimize the user experience of their websites. The UI is only one of many components involved in successful websites with good user experience.
      • User experience (UX) is often an afterthought in development, risking late and costly fixes to improve end-user reception after deployment.

      Insights

      • Organizations often misinterpret UX as UI. In fact, UX incorporates both the functional and emotional needs of the user, going beyond the website’s UI.
      • Human behaviors and tendencies are commonly left out of the define and design phases of website development, putting user satisfaction and adoption at risk.

      Impact and Result

      • Gain a deep understanding of user needs and behaviors. Become familiar with the human behaviors, emotions, and pain points of your users in order to shortlist the design elements and website functions that will receive the highest user satisfaction.
      • Perform a comprehensive website review. Leverage satisfaction surveys, user feedback, and user monitoring tools (e.g. heat maps) to reveal high-level UX issues. Use these insights to drill down into the execution and composition of your website to identify the root causes of issues.
      • Incorporate modern UX trends in your design. New web technologies are continuously emerging in the industry to enhance user experience. Stay updated on today’s UX trends and validate their fit for the specific needs of your target audience.

      Modernize Your Corporate Website to Drive Business Value Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should modernize your website, review Info-Tech’s methodology, and discover the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define UX requirements

      Reveal the opportunities to heighten the user experience of your website through a deep understanding of the behaviors, emotions, and needs of your end users in order to design a receptive and valuable website.

      • Modernize Your Corporate Website to Drive Business Value – Phase 1: Define UX Requirements
      • Website Design Document Template

      2. Design UX-driven website

      Design a satisfying and receptive website by leveraging industry best practices and modern UX trends and ensuring the website is supported with reliable and scalable data and infrastructure.

      • Modernize Your Corporate Website to Drive Business Value – Phase 2: Design UX-Driven Website
      [infographic]

      Workshop: Modernize Your Corporate Website to Drive Business Value

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Your UX Requirements

      The Purpose

      List the business objectives of your website.

      Describe your user personas, use cases, and user workflow.

      Identify current UX issues through simulations, website design, and system reviews.

      Key Benefits Achieved

      Strong understanding of the business goals of your website.

      Knowledge of the behaviors and needs of your website’s users.

      Realization of the root causes behind the UX issues of your website.

      Activities

      1.1 Define the business objectives for the website you want to optimize

      1.2 Define your end-user personas and map them to use cases

      1.3 Build your website user workflow

      1.4 Conduct a SWOT analysis of your website to drive out UX issues

      1.5 Gauge the UX competencies of your web development team

      1.6 Simulate your user workflow to identify the steps driving down UX

      1.7 Assess the composition and construction of your website

      1.8 Understand the execution of your website with a system architecture

      1.9 Pinpoint the technical reason behind your UX issues

      1.10 Clarify and prioritize your UX issues

      Outputs

      Business objectives

      End-user personas and use cases

      User workflows

      Website SWOT analysis

      UX competency assessment

      User workflow simulation

      Website design assessment

      Current state of web system architecture

      Gap analysis of web system architecture

      Prioritized UX issues

      2 Design Your UX-Driven Website

      The Purpose

      Design wireframes and storyboards to be aligned to high priority use cases.

      Design a web system architecture that can sufficiently support the website.

      Identify UX metrics to gauge the success of the website.

      Establish a website design process flow.

      Key Benefits Achieved

      Implementation of key design elements and website functions that users will find stimulating and valuable.

      Optimized web system architecture to better support the website.

      Website design process aligned to your current context.

      Rollout plan for your UX optimization initiatives.

      Activities

      2.1 Define the roles of your UX development team

      2.2 Build your wireframes and user storyboards

      2.3 Design the target state of your web environment

      2.4 List your UX metrics

      2.5 Draw your website design process flow

      2.6 Define your UX optimization roadmap

      2.7 Identify and engage your stakeholders

      Outputs

      Roles of UX development team

      Wireframes and user storyboards

      Target state of web system architecture

      List of UX metrics

      List of your suppliers, inputs, processes, outputs, and customers

      Website design process flow

      UX optimization rollout roadmap

      IT Diversity & Inclusion Tactics

      • Buy Link or Shortcode: {j2store}517|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Engage
      • Parent Category Link: /engage
      • Although inclusion is key to the success of a diversity and inclusion (D&I) strategy, the complexity of the concept makes it a daunting pursuit.
      • This is further complicated by the fact that creating inclusion is not a one-and-done exercise. Rather, it requires the ongoing commitment of employees and managers to reassess their own behaviors and to drive a cultural shift.

      Our Advice

      Critical Insight

      Realize the benefits of a diverse workforce by embedding inclusion into work practices, behaviors, and values, ensuring accountability throughout the department.

      Impact and Result

      Understand what it means to be inclusive: reassess work practices and learn how to apply leadership behaviors to create an inclusive environment

      IT Diversity & Inclusion Tactics Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Mobilize inclusion efforts

      Learn, evaluate, and understand what it means to be inclusive, examine biases, and apply inclusive leadership behaviors.

      • Diversity & Inclusion Initiatives Catalog
      • Inclusive IT Work Practices Examples
      • Inclusive Work Practices Template
      • Equip Managers to Adopt Inclusive Leadership Behaviors
      • Workbook: Equip Managers to Adopt Inclusive Leadership Behaviors
      • Standard Focus Group Guide
      [infographic]

      Build a Data Integration Strategy

      • Buy Link or Shortcode: {j2store}125|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $11,677 Average $ Saved
      • member rating average days saved: 7 Average Days Saved
      • Parent Category Name: Enterprise Integration
      • Parent Category Link: /enterprise-integration
      • As organizations process more information at faster rates, there is increased pressure for faster and more efficient data integration.
      • Data integration is becoming more and more critical for downstream functions of data management and for business operations to be successful. Poor integration holds back these critical functions.

      Our Advice

      Critical Insight

      • Every IT project requires data integration. Regardless of the current problem and the solution being implemented, any change in the application and database ecosystem requires you to solve a data integration problem.
      • Data integration problem solving needs to start with business activity. After understanding the business activity, move to application and system integration to drive the optimal data integration activities.
      • Data integration improvement needs to be backed by solid requirements that depend on the use case. Info-Tech’s use cases will help you identify your organization’s requirements and integration architecture for its ideal data integration solution.

      Impact and Result

      • Create a data integration solution that supports the flow of data through the organization and meets the organization’s requirements for data latency, availability, and relevancy.
      • Build your data integration practice with a firm foundation in governance and reference architecture; use best-fit reference architecture patterns and the related technology and resources to ensure that your process is scalable and sustainable.
      • The business’ uses of data are constantly changing and evolving, and as a result, the integration processes that ensure data availability must be frequently reviewed and repositioned in order to continue to grow with the business.

      Build a Data Integration Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why your organization should improve its data integration, review Info-Tech’s methodology, and understand how we can help you create a loosely coupled integration architecture.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Collect integration requirements

      Identify data integration pains and needs and use them to collect effective business requirements for the integration solution.

      • Break Down Data Silos With a Data-Centric Integration Strategy – Phase 1: Collect Integration Requirements
      • Data Integration Requirements Gathering Tool

      2. Analyze integration requirements

      Determine technical requirements for the integration solution based on the business requirement inputs.

      • Break Down Data Silos With a Data-Centric Integration Strategy – Phase 2: Analyze Integration Requirements
      • Data Integration Trends Presentation
      • Data Integration Pattern Selection Tool

      3. Design the data-centric integration solution

      Determine your need for a data integration proof of concept, and then design the data model for your integration solution.

      • Break Down Data Silos With a Data-Centric Integration Strategy – Phase 3: Design the Data-Centric Integration Solution
      • Data Integration POC Template
      • Data Integration Mapping Tool
      [infographic]

      Workshop: Build a Data Integration Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Collect Integration Requirements

      The Purpose

      Explain approach and value proposition.

      Review the common business drivers and how the organization is driving a need to optimize data integration.

      Understand Info-Tech’s approach to data integration.

      Key Benefits Achieved

      Current integration architecture is understood.

      Priorities for tactical initiatives in the data architecture practice related to integration are identified.

      Target state for data integration is defined.

      Activities

      1.1 Discuss the current data integration environment and the pains that are felt by the business and IT.

      1.2 Determine what the problem statement and business case look like to kick-start a data integration improvement initiative.

      1.3 Understand data integration requirements from the business.

      Outputs

      Data Integration Requirements Gathering Tool

      2 Analyze Integration Requirements

      The Purpose

      Understand what the business requires from the integration solution.

      Identify the common technical requirements and how they relate to business requirements.

      Review the trends in data integration to take advantage of new technologies.

      Brainstorm how the data integration trends can fit within your environment.

      Key Benefits Achieved

      Business-aligned requirements gathered for the integration solution.

      Activities

      2.1 Understand what the business requires from the integration solution.

      2.2 Identify the common technical requirements and how they relate to business requirements.

      Outputs

      Data Integration Requirements Gathering Tool

      Data Integration Trends Presentation

      3 Design the Data-Centric Integration Solution

      The Purpose

      Learn about the various integration patterns that support organizations’ data integration architecture.

      Determine the pattern that best fits within your environment.

      Key Benefits Achieved

      Improvement initiatives are defined.

      Improvement initiatives are evaluated and prioritized to develop an improvement strategy.

      A roadmap is defined to depict when and how to tackle the improvement initiatives.

      Activities

      3.1 Learn about the various integration patterns that support organizations’ data integration architecture.

      3.2 Determine the pattern that best fits within your environment.

      Outputs

      Integration Reference Architecture Patterns

      Data Integration POC Template

      Data Integration Mapping Tool

      Further reading

      Build a Data Integration Strategy

      Integrate your data or disintegrate your business.

      ANALYST PERSPECTIVE

      Integrate your data or disintegrate your business.

      "Point-to-point integration is an evil that builds up overtime due to ongoing business changes and a lack of integration strategy. At the same time most businesses are demanding consistent, timely, and high-quality data to fuel business processes and decision making.

      A good recipe for successful data integration is to discover the common data elements to share across the business by establishing an integration platform and a canonical data model.

      Place yourself in one of our use cases and see how you fit into a common framework to simplify your problem and build a data-centric integration environment to eliminate your data silos."

      Rajesh Parab, Director, Research & Advisory Services

      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • Data engineers feeling the pains of poor integration from inaccuracies and inefficiencies during the data integration lifecycle.
      • Business analysts communicating the need for improved integration of data.
      • Data architects looking to design and facilitate improvements in the holistic data environment.
      • Data architects putting high-level architectural design changes into action.

      This Research Will Also Assist:

      • CIOs concerned with the costs, benefits, and the overall structure of their organization’s data flow.
      • Enterprise architects trying to understand how improved integration will affect overall organizational architecture.

      This Research Will Help You:

      • Understand what integration is, and how it fits into your organization.
      • Identify opportunities for leveraging improved integration for data-driven insights.
      • Design a loosely coupled integration architecture that is flexible to changing needs.
      • Determine the needs of the business for integration and design solutions for the gaps that fit the requirements.

      This Research Will Help Them:

      • Get a handle on the current data situation and how data interacts within the organization.
      • Understand how data architecture affects operations within the enterprise.

      Executive summary

      Situation

      • As organizations process more information at faster rates, there is increased pressure for faster and more efficient data integration.
      • Data integration is becoming more and more critical for downstream functions of data management and for business operations to be successful. Poor integration holds back these critical functions.

      Complication

      • Investments in integration can be a tough sell for the business, and it is difficult to get support for integration as a standalone project.
      • Evolving business models and uses of data are growing rapidly at rates that often exceed the investment in data management and integration tools. As a result, there is often a gap between data availability and the business’ latency demands.

      Resolution

      • Create a data-centric integration solution that supports the flow of data through the organization and meets the organization’s requirements for data accuracy, relevance, availability, and timeliness.
      • Build your data-centric integration practice with a firm foundation in governance and reference architecture; use best-fit reference architecture patterns and the related technology and resources to ensure that your process is scalable and sustainable.
      • The business’ uses of data are constantly changing and evolving, and as a result the integration processes that ensure data availability must be frequently reviewed and repositioned to continue to grow with the business.

      Info-Tech Insight

      1. Every IT project requires data integration.Any change in the application and database ecosystem requires you to solve a data integration problem.
      2. Integration problem solving needs to start with business activity. After understanding the business activity, move to application and system integration to drive optimal data integration activities.
      3. Integration initiatives need to be backed by requirements that depend on use cases. Info-Tech’s use cases will help identify organizational requirements and the ideal data-centric integration solution.

      Your data is the foundation of your organization’s knowledge and ability to make decisions

      Integrate the Data, Not the Applications

      Data is one of the most important assets in a modern organization. Contained within an organization’s data are the customers, the products, and the operational details that make an organization function. Every organization has data, and this data might serve the needs of the business today.

      However, the only constant in the world is change. Changes in addresses, amounts, product details, partners, and more occur at a rapid rate. If your data is isolated, it will quickly become stale. Getting up-to-date data to the right place at the right time is where data-centric integration comes in.

      "Data is the new oil." – Clive Humby, Chief Data Scientist Source: Medium, 2016

      The image shows two graphics. The top shows two sets of circles with an arrow pointing to the right between them: on the left, there is a large centre circle with the word APP in it, and smaller circles surrounding it that read DATA. On the right, the large circle reads DATA, and the smaller circles, APP. On the lower graphic, there are also two sets of circles, with an arrow pointing to the right between them. This time, the largest circle envelopes the smaller circles. The circle on the right has a larger circle in the centre that reads Apple Watch Heart Monitoring App, and smaller circles around it labelled with types of data. The circle on the right contains a larger circle in the centre that reads Heart Data, and the smaller circles are labelled with types of apps.

      Organizations are having trouble keeping up with the rapid increases in data growth and complexity

      To keep up with increasing business demands and profitability targets and decreasing cost targets, organizations are processing and exchanging more data than ever before.

      To get more value from their information, organizations are relying on more and more complex data sources. These diverse data sources have to be properly integrated to unlock the full potential of your data:

      The most difficult integration problems are caused by semantic heterogeneity (Database Research Technology Group, n.d.).

      80% of business decisions are made using unstructured data (Concept Searching, 2015).

      85% of businesses are struggling to implement the correct integration solution to accurately interpret their data (KPMG, 2014).

      Break Down Your Silos

      Integrating large volumes of data from the many varied sources in an organization has incredible potential to yield insights, but many organizations struggle with creating the right structure for that blending to take place, and data silos form.

      Data-centric integration capabilities can break down organizational silos. Once data silos are removed and all the information that is relevant to a given problem is available, problems with operational and transactional efficiencies can be solved, and value from business intelligence (BI) and analytics can be fully realized.

      Data-centric integration is the solution you need to bring data together to break down data silos

      On one hand…

      Data has massive potential to bring insight to an organization when combined and analyzed in creative ways.

      On the other hand…

      It is difficult to bring data together from different sources to generate insights and prevent stale data.

      How can these two ideas be reconciled?

      Answer: Info-Tech’s Data Integration Onion Framework summarizes an organization’s data environment at a conceptual level, and is used to design a common data-centric integration environment.

      Info-Tech’s Data Integration Onion Framework

      The image shows Info Tech's Data Integration Onion Framework. It is a circular graphic, with a series on concentric rings, each representing a category and containing specific examples of items within those categories.

      Poor integration will lead to problems felt by the business and IT

      The following are pains reported by the business due to poor integration:

      59% Of managers said they experience missing data every day due to poor distribution results in data sets that are valuable to their central work functions. (Experian, 2016)

      42% Reported accidentally using the wrong information, at least once a week. (Computerworld, 2017)

      37% Of the 85% of companies trying to be more data driven, only 37% achieved their goal. (Information Age, 2019)

      "I never guess. It is a capital mistake to theorize before one has data. Insensibly one begins to twist facts to suit theories, instead of theories to suit facts." – Sir Arthur Conan Doyle, Sherlock Holmes

      Poor integration can make IT less efficient as well:

      90% Of all company generated data is “dark.” Getting value out of dark data is not difficult or costly. (Deloitte Insights, 2017)

      5% As data sits in a database, up to 5% of customer data changes per month. (Data.com, 2016)

      "Most traditional machine learning techniques are not inherently efficient or scalable enough to handle the data. Machine learning needs to reinvent itself for big data processing primarily in pre-processing of data." – J. Qiu et al., ‎2016

      Understand the common challenges of integration to avoid the pains

      There are three types of challenges that organizations face when integrating data:

      1. Disconnect from the business

      Poor understanding of the integration problem and requirements lead to integrations being built that are not effective for quality data.

      50% of project rework is attributable to problems with requirements. (Info-Tech Research Group)

      45% of IT professionals admit to being “fuzzy” about the details of a project’s business objectives. (Blueprint Software Systems Inc., 2012)

      2. Lack of strategy

      90% Of organizations will lack an integration strategy through to 2018. (Virtual Logistics, 2017)

      Integrating data without a long-term plan is a recipe for point-to-point integration spaghettification:

      The image shows two columns of rectangles, each with the word Application Services. Between them are arrows, matching boxes in one column to the other. The lines of the arrows are curvy.

      3. Data complexity

      Data architects and other data professionals are increasingly expected to be able to connect data using whatever interface is provided, at any volume, and in any format – all without affecting the quality of the data.

      36% Of developers report problems integrating data due to different standards interpretations. (DZone, 2015)

      These challenges lead to organizations building a data architecture and integration environment that is tightly coupled.

      A loose coupling integration strategy helps mitigate the challenges and realize the benefits of well-connected data

      Loose Coupling

      Most organizations don’t have the foresight to design their architecture correctly the first time. In a perfect world, organizations would design their application and data architecture to be scalable, modular, and format-neutral – like building blocks.

      Benefits of a loosely coupled architecture:

      • Increased ability to support business needs by adapting easily to changes.
      • Added ability to incorporate new vendors and new technology due to increased flexibility.
      • Potential for automated, real-time integration.
      • Elimination of re-keying/manual entry of data.
      • Federation of data.

      Vs. Tight Coupling

      However, this is rarely the case. Most architectures are more like a brick wall – permanent, hard to add to and subtract from, and susceptible to weathering.

      Problems with a tightly coupled architecture:

      • Delays in combining data for analysis.
      • Manual/Suboptimal DI in the face of changing business needs.
      • Lack of federation.
      • Lack of flexibility.
      • Fragility of integrated platforms.
      • Limited ability to explore new functionalities.

      2020 Applications Priorities Report

      • Buy Link or Shortcode: {j2store}159|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization
      • Although IT may have time to look at trends, it does not have the capacity to analyze the trends and turn them into initiatives.
      • IT does not have time to parse trends for initiatives that are relevant to them.
      • The business complains that if IT does not pursue trends the organization will get left behind by cutting-edge competitors. At the same time, when IT pursues trends, the business feels that IT is unable to deal with the basic issues.

      Our Advice

      Critical Insight

      • Take advantage of a trend by first understanding why it is happening and how it is actionable. Build momentum now. Breaking a trend into bite-sized initiatives and building them into your IT foundations enables the organization to maintain pace with competitors and make the technological leap.
      • The concepts of shadow IT and governance are critical. As it becomes easier for the business to purchase its own applications, it will be essential for IT to embrace this form of user empowerment. With a diminished focus on vendor selection, IT will drive the most value by directing its energy toward data and integration governance.

      Impact and Result

      • Determine how to explore, adopt, and optimize the technology and practice initiatives in this report by understanding which core objective(s) each initiative serves:
        • Optimize the effectiveness of the IT organization.
        • Boost the productivity of the enterprise.
        • Enable business growth through technology.

      2020 Applications Priorities Report Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief for a summary of the priorities and themes that an IT organization should focus on this year.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Read the 2020 Applications Priorities Report

      Use Info-Tech's 2020 Applications Priorities Report to learn about the five initiatives that IT should prioritize for the coming year.

      • 2020 Applications Priorities Report Storyboard
      [infographic]

      Data Quality

      • Buy Link or Shortcode: {j2store}19|cart{/j2store}
      • Related Products: {j2store}19|crosssells{/j2store}
      • Teaser Video: Visit Website
      • Teaser Video Title: Big data after pandemic
      • member rating overall impact: 8.3/10
      • member rating average dollars saved: $5,100
      • member rating average days saved: 8
      • Parent Category Name: Data and Business Intelligence
      • Parent Category Link: /data-and-business-intelligence
      Restore trust in your data by aligning your data management approach to the business strategy

      Enhance Your Solution Architecture Practices

      • Buy Link or Shortcode: {j2store}157|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $33,359 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • In today’s world, business agility is essential to stay competitive. Quick responses to business needs through efficient development and deployment practices is critical for business value delivery.
      • A mature solution architecture practice is the basic necessity for a business to have technical agility.

      Our Advice

      Critical Insight

      Don’t architect for normal situations. That is a shallow approach and leads to decisions that may seem “right” but will not be able to stand up to system elasticity needs.

      Impact and Result

      • Understand the different parts of a continuous security architecture framework and how they may apply to your decisions.
      • Develop a solution architecture for upcoming work (or if there is a desire to reduce tech debt).

      Enhance Your Solution Architecture Practices Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Solution Architecture Practices Deck – A deck to help you develop an approach for or validate existing solution architecture capability.

      Translate stakeholder objectives into architecture requirements, solutions, and changes. Incorporate architecture quality attributes in decisions to increase your architecture’s life. Evaluate your solution architecture from multiple views to obtain a holistic perspective of the range of issues, risks, and opportunities.

      • Enhance Your Solution Architecture Practices – Phases 1-3

      2. Solution Architecture Template – A template to record the results from the exercises to help you define, detail, and make real your digital product vision.

      Identify and detail the value maps that support the business, and discover the architectural quality attribute that is most important for the value maps. Brainstorm solutions for design decisions for data, security, scalability, and performance.

      • Solution Architecture Template
      [infographic]

      Workshop: Enhance Your Solution Architecture Practices

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Vision and Value Maps

      The Purpose

      Document a vision statement for the solution architecture practice (in general) and/or a specific vision statement, if using a single project as an example.

      Document business architecture and capabilities.

      Decompose capabilities into use cases.

      Key Benefits Achieved

      Provide a great foundation for an actionable vision and goals that people can align to.

      Develop a collaborative understanding of business capabilities.

      Develop a collaborative understanding of use cases and personas that are relevant for the business.

      Activities

      1.1 Develop vision statement.

      1.2 Document list of value stream maps and their associated use cases.

      1.3 Document architectural quality attributes needed for use cases using SRME.

      Outputs

      Solution Architecture Template with sections filled out for vision statement canvas and value maps

      2 Continue Vision and Value Maps, Begin Phase 2

      The Purpose

      Map value stream to required architectural attributes.

      Prioritize architecture decisions.

      Discuss and document data architecture.

      Key Benefits Achieved

      An understanding of architectural attributes needed for value streams.

      Conceptual understanding of data architecture.

      Activities

      2.1 Map value stream to required architectural attributes.

      2.2 Prioritize architecture decisions.

      2.3 Discuss and document data architecture.

      Outputs

      Solution Architecture Template with sections filled out for value stream and architecture attribute mapping; a prioritized list of architecture design decisions; and data architecture

      3 Continue Phase 2, Begin Phase 3

      The Purpose

      Discuss security and threat assessment.

      Discuss resolutions to threats via security architecture decisions.

      Discuss system’s scalability needs.

      Key Benefits Achieved

      Decisions for security architecture.

      Decisions for scalability architecture.

      Activities

      3.1 Discuss security and threat assessment.

      3.2 Discuss resolutions to threats via security architecture decisions.

      3.3 Discuss system’s scalability needs.

      Outputs

      Solution Architecture Template with sections filled out for security architecture and scalability design

      4 Continue Phase 3, Start and Finish Phase 4

      The Purpose

      Discuss performance architecture.

      Compile all the architectural decisions into a solutions architecture list.

      Key Benefits Achieved

      A complete solution architecture.

      A set of principles that will form the foundation of solution architecture practices.

      Activities

      4.1 Discuss performance architecture.

      4.2 Compile all the architectural decisions into a solutions architecture list.

      Outputs

      Solution Architecture Template with sections filled out for performance and a complete solution architecture

      Further reading

      Enhance Your Solution Architecture Practice

      Ensure your software systems solution is architected to reflect stakeholders’ short- and long-term needs.

      Analyst Perspective

      Application architecture is a critical foundation for supporting the growth and evolution of application systems. However, the business is willing to exchange the extension of the architecture’s life with quality best practices for the quick delivery of new or enhanced application functionalities. This trade-off may generate immediate benefits to stakeholders, but it will come with high maintenance and upgrade costs in the future, rendering your system legacy early.

      Technical teams know the importance of implementing quality attributes into architecture but are unable to gain approval for the investments. Overcoming this challenge requires a focus of architectural enhancements on specific problem areas with significant business visibility. Then, demonstrate how quality solutions are vital enablers for supporting valuable application functionalities by tracing these solutions to stakeholder objectives and conducting business and technical risk and impact assessments through multiple business and technical perspectives.

      this is a picture of Andrew Kum-Seun

      Andrew Kum-Seun
      Research Manager, Applications
      Info-Tech Research Group

      Enhance Your Solution Architecture

      Ensure your software systems solution is architected to reflect stakeholders’ short- and long-term needs.

      EXECUTIVE BRIEF

      Executive Summary

      Your Challenge

      • Most organizations have some form of solution architecture; however, it may not accurately and sufficiently support the current and rapidly changing business and technical environments.
      • To enable quick delivery, applications are built and integrated haphazardly, typically omitting architecture quality practices.

      Common Obstacles

      • Failing to involve development and stakeholder perspectives in design can lead to short-lived architecture and critical development, testing, and deployment constraints and risks being omitted.
      • Architects are experiencing little traction implementing solutions to improve architecture quality due to the challenge of tracing these solutions back to the right stakeholder objectives.

      Info-Tech's Approach

      • Translate stakeholder objectives into architecture requirements, solutions, and changes. Incorporate architecture quality attributes in decisions to increase your architecture’s life.
      • Evaluate your solution architecture from multiple views to obtain a holistic perspective of the range of issues, risks, and opportunities.
      • Regularly review and recalibrate your solution architecture so that it accurately reflects and supports current stakeholder needs and technical environments.

      Info-Tech Insight

      Well-received applications can have poor architectural qualities. Functional needs often take precedence over quality architecture. Quality must be baked into design, execution, and decision-making practices to ensure the right tradeoffs are made.

      A badly designed solution architecture is the root of all technical evils

      A well-thought-through and strategically designed solution architecture is essential for the long-term success of any software system, and by extension, the organization because:

      1. It will help achieve quality attribute requirements (security, scalability, performance, usability, resiliency, etc.) for a software system.
      2. It can define and refine architectural guiding principles. A solution architecture is not only important for today but also a vision for the future of the system’s ability to react positively to changing business needs.
      3. It can help build usable (and reusable) services. In a fast-moving environment, the convenience of having pre-made plug-and-play architectural objects reduces the risk incurred from knee-jerk reactions in response to unexpected demands.
      4. It can be used to create a roadmap to an IT future state. Architectural concerns support transition planning activities that can lead to the successful implementation of a strategic IT plan.

      Demand for quick delivery makes teams omit architectural best practices, increasing downstream risks

      In its need for speed, a business often doesn’t see the value in making sure architecture is maintainable, reusable, and scalable. This demand leads to an organizational desire for development practices and the procurement of vendors that favor time-to-market over long-term maintainability. Unfortunately, technical teams are pushed to omit design quality and validation best practices.

      What are the business impacts of omitting architecture design practices?

      Poor quality application architecture impedes business growth opportunities, exposes enterprise systems to risks, and consumes precious IT budgets in maintenance that could otherwise be used for innovation and new projects.

      Previous estimations indicate that roughly 50% of security problems are the result of software design. […] Flaws in the architecture of a software system can have a greater impact on various security concerns in the system, and as a result, give more space and flexibility for malicious users.(Source: IEEE Software)

      Errors in software requirements and software design documents are more frequent than errors in the source code itself according to Computer Finance Magazine. Defects introduced during the requirements and design phase are not only more probable but also more severe and more difficult to remove. (Source: iSixSigma)

      Design a solution architecture that can be successful within the constraints and complexities set before you

      APPLICATION ARCHITECTURE…

      … describes the dependencies, structures, constraints, standards, and development guidelines to successfully deliver functional and long-living applications. This artifact lays the foundation to discuss the enhancement of the use and operations of your systems considering existing complexities.

      Good architecture design practices can give you a number of benefits:

      Lowers maintenance costs by revealing key issues and risks early. The Systems Sciences Institute at IBM has reported that the cost to fix an error found after product release was 4 to 5 times as much as one uncovered during design.(iSixSigma)

      Supports the design and implementation activities by providing key insights for project scheduling, work allocation, cost analysis, risk management, and skills development.(IBM: developerWorks)

      Eliminates unnecessary creativity and activities on the part of designers and implementers, which is achieved by imposing the necessary constraints on what they can do and making it clear that deviation from constraints can break the architecture.(IBM: developerWorks)

      Use Info-Tech’s Continuous Solution Architecture (CSA) Framework for designing adaptable systems

      Solution architecture is not a one-size-fits-all conversation. There are many design considerations and trade-offs to keep in mind as a product or services solution is conceptualized, evaluated, tested, and confirmed. The following is a list of good practices that should inform most architecture design decisions.

      Principle 1: Design your solution to have at least two of everything.

      Principle 2: Include a “kill switch” in your fault-isolation design. You should be able to turn off everything you release.

      Principle 3: If it can be monitored, it should be. Use server and audit logs where possible.

      Principle 4: Asynchronous is better than synchronous. Asynchronous design is more complex but worth the processing efficiency it introduces.

      Principle 5: Stateless over stateful: State data should only be used if necessary.

      Principle 6: Go horizonal (scale out) over vertical (scale up).

      Principle 7: Good architecture comes in small packages.

      Principle 8: Practice just-in-time architecture. Delay finalizing an approach for as long as you can.

      Principle 9: X-ilities over features. Quality of an architecture is the foundation over which features exist. A weak foundation can never be obfuscated through shiny features.

      Principle 10: Architect for products not projects. A product is an ongoing concern, while a project is short lived and therefore only focused on what is. A product mindset forces architects to think about what can or should be.

      Principle 11: Design for rollback: When all else fails, you should be able to stand up the previous best state of the system.

      Principle 12: Test the solution architecture like you test your solution’s features.

      CSA should be used for every step in designing a solution’s architecture

      Solution architecture is a technical response to a business need, and like all complex evolutionary systems, must adapt its design for changing circumstances.

      The triggers for changes to existing solution architectures can come from, at least, three sources:

      1. Changing business goals
      2. Existing backlog of technical debt
      3. Solution architecture roadmap

      A solution’s architecture is cross-cutting and multi-dimensional and at the minimum includes:

      • Product Portfolio Strategy
      • Application Architecture
      • Data Architecture
      • Information Architecture
      • Operational Architecture

      along with several qualitative attributes (also called non-functional requirements).

      This image contains a chart which demonstrates the relationship between changing hanging business goals, Existing backlog of technical debt, Solution architecture roadmap, and Product Portfolio Strategy, Application Architecture, Data Architecture, Information Architecture and, Operational Architecture

      Related Research: Product Portfolio Strategy

      Integrate Portfolios to Create Exceptional Customer Value

      • Define an organizing principle that will structure your projects and applications in a way that matters to your stakeholders.
      • Bridge application and project portfolio data using the organizing principle that matters to communicate with stakeholders across the organization.
      • Create a dashboard that brings together the benefits of both project and application portfolio management to improve visibility and decision making.

      Deliver on Your Digital Portfolio Vision

      • Recognize that a vision is only as good as the data that backs it up. Lay out a comprehensive backlog with quality built in that can be effectively communicated and understood through roadmaps.
      • Your intent is only a dream if it cannot be implemented ; define what goes into a release plan via the release canvas.
      • Define a communication approach that lets everyone know where you are heading.

      Related Research: Data, Information & Integration Architecture

      Build a Data Architecture Roadmap

      • Have a framework in place to identify the appropriate solution for the challenge at hand. Our three-phase practical approach will help you build a custom and modernized data architecture.
      • Identify and prioritize the business drivers in which data architecture changes would create the largest overall benefit and determine the corresponding data architecture tiers that need to be addressed.
      • Discover the best-practice trends, measure your current state, and define the targets for your data architecture tactics.
      • Build a cohesive and personalized roadmap for restructuring your data architecture. Manage your decisions and resulting changes.

      Build a Data Pipeline for Reporting and Analytics

      • Understand your high-level business capabilities and interactions across them – your data repositories and flows should be just a digital reflection thereof.
      • Divide your data world in logical verticals overlaid with various speed data progression lanes, i.e. build your data pipeline – and conquer it one segment at a time.
      • Use the most appropriate database design pattern for a given phase/component in your data pipeline progression.

      Related Research:Operational Architecture

      Optimize Application Release Management

      • Acquire release management ownership. Ensure there is appropriate accountability for the speed and quality of the releases passing through the entire pipeline.
      • A release manager has oversight over the entire release process and facilitates the necessary communication between business stakeholders and various IT roles.
      • Instill holistic thinking. Release management includes all steps required to push release and change requests to production along with the hand-off to Operations and Support. Increase the transparency and visibility of the entire pipeline to ensure local optimizations do not generate bottlenecks in other areas.
      • Standardize and lay a strong release management foundation. Optimize the key areas where you are experiencing the most pain and continually improve.

      Build Your Infrastructure Roadmap

      • Increased communication. More information being shared to more people who need it.
      • Better planning. More accurate information being shared.
      • Reduced lead times. Less due diligence or discovery work required as part of project implementations.
      • Faster delivery times. Less low-value work, freeing up more time for project work.

      Related Research:Security Architecture

      Identify Opportunities to Mature the Security Architecture

      • A right-sized security architecture can be created by assessing the complexity of the IT department, the operations currently underway for security, and the perceived value of a security architecture within the organization. This will bring about a deeper understanding of the organizational infrastructure.
      • Developing a security architecture should also result in a list of opportunities (i.e. initiatives) that an organization can integrate into a roadmap. These initiatives will seek to improve security operations and strengthen the IT department’s understanding of security’s role within the organization.
      • A better understanding of the infrastructure will help to save time on determining the correct technologies required from vendors, and therefore, cut down on the amount of vendor noise.
      • Creating a defensible roadmap will assist with justifying future security spend.

      Key deliverable:

      Solution Architecture Template
      Record the results from the exercises to help you define, detail, and make real your digital product vision.

      Blueprint Deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      This image contains screenshots of the deliverables which will be discussed later in this blueprint

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.

      Guided Implementation

      Our team knows that we need to fix a process, but we need assistance to determine where to focus. some check-ins along the way would help keep us on track

      Workshop

      We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place

      Consulting

      Our team does not have the time or the knowledge to take this project on. we need assistance through the entirety of this project.

      Diagnostics and consistent frameworks are used throughout all four options

      Workshop Overview

      Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4
      Exercises
      1. Articulate an architectural vision
      2. Develop dynamic value stream maps
      1. Create a conceptual map between the value stream, use case, and required architectural attribute
      2. Create a prioritized list of architectural attributes
      3. Develop a data architecture that supports transactional and analytical needs
      1. Document security architecture risks and mitigations
      2. Document scalability architecture
      1. Document performance-enhancing architecture
      2. Bring it all together
      Outcomes
      1. Architecture vision
      2. Dynamic value stream maps (including user stories/personas)
      1. List of required architectural attributes
      2. Architectural attributes prioritized
      3. Data architecture design decisions
      1. Security threat and risk analysis
      2. Security design decisions
      3. Scalability design decisions
      1. Performance design decisions
      2. Finalized decisions

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.
      This GI is between 8 to 10 calls over the course of approximately four to six months.

      Phase 1 Phase 2 Phase 2
      Call #1:
      Articulate an architectural vision.
      Call #4:
      Continue discussion on value stream mapping and related use cases.
      Call #6:
      Document security design decisions.
      Call #2:
      Discuss value stream mapping and related use cases.
      Call #5:
      • Map the value streams to required architectural attribute.
      • Create a prioritized list of architectural attributes.
      Call #7:
      • Document scalability design decisions.
      • Document performance design decisions.
      Call #3:
      Continue discussion on value stream mapping and related use cases.
      Call #8:
      Bring it all together.

      Phase 1: Visions and Value Maps

      Phase 1

      1.1 Articulate an Architectural Vision
      1.2 Develop Dynamic Value Stream Maps
      1.3 Map Value Streams, Use Cases, and Required Architectural Attributes
      1.4 Create a Prioritized List of Architectural Attributes

      Phase 2

      2.1 Develop a Data Architecture That Supports Transactional and Analytical Needs
      2.2 Document Security Architecture Risks and Mitigations

      Phase 3

      3.1 Document Scalability Architecture
      3.2 Document Performance Enhancing Architecture
      3.3 Combine the Different Architecture Design Decisions Into a Unified Solution Architecture

      This phase will walk you through the following activities:

      • Determine a vision for architecture outcomes
      • Draw dynamic value stream maps
      • Derive architectural design decisions
      • Prioritize design decisions

      This phase involves the following participants:

      • Business Architect
      • Product Owner
      • Application Architect
      • Integration Architect
      • Database Architect
      • Enterprise Architect

      Enhance Your Solution Architecture Practice

      Let’s get this straight: You need an architectural vision

      If you start off by saying I want to architect a system, you’ve already lost. Remember what a vision is for!

      An architectural vision...

      … is your North Star

      Your product vision serves as the single fixed point for product development and delivery.

      … aligns stakeholders

      It gets everyone on the same page.

      … helps focus on meaningful work

      There is no pride in being a rudderless ship. It can also be very expensive.

      And eventually...

      … kick-starts your strategy

      We know where to go, we know who to bring along, and we know the steps to get there. Let’s plan this out.

      An architectural vision is multi-dimensional

      Who is the target customer (or customers)?

      What is the key benefit a customer can get from using our service or product?

      Why should they be engaged with you?

      What makes our service or product better than our competitors?

      (Adapted from Crossing the Chasm)

      Info-Tech Insight

      It doesn’t matter if you are delivering value to internal or external stakeholders, you need a product vision to ensure everyone understands the “why.”

      Use a canvas as the dashboard for your architecture

      The solution architecture canvas provides a single dashboard to quickly define and communicate the most important information about the vision. A canvas is an effective tool for aligning teams and providing an executive summary view.

      This image contains a sample canvas for you to use as the dashboard for your architecture. The sections are: Solution Name, Tracking Info, Vision, Business Goals, Metrics, Personas, and Stakeholders.

      Leverage the solution architecture canvas to state and inform your architecture vision

      This image contains the sample canvas from the previous section, with annotations explaining what to do for each of the headings.

      1.1 Craft a vision statement for your solution’s architecture

      1. Use the product canvas template provided for articulating your solution’s architecture.

      *If needed, remove or add additional data points to fit your purposes.

      There are different statement templates available to help form your product vision statements. Some include:

      • For [our target customer], who [customer’s need], the [product] is a [product category or description] that [unique benefits and selling points]. Unlike [competitors or current methods], our product [main differentiators].
      • We believe (in) a [noun: world, time, state, etc.] where [persona] can [verb: do, make, offer, etc.], for/by/with [benefit/goal].
      • To [verb: empower, unlock, enable, create, etc.] [persona] to [benefit, goal, future state].
      • Our vision is to [verb: build, design, provide] the [goal, future state] to [verb: help, enable, make it easier to...] [persona].

      (Adapted from Crossing the Chasm)

      Download the Solution Architecture Template and document your vision statement.

      Input

      • Business Goals
      • Product Portfolio Vision

      Output

      • Solution Architecture Vision

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Product Owner
      • IT Leadership
      • Business Leadership

      Solution Architecture Canvas: Refine your vision statement

      This image contains a screenshot of the canvas from earlier in the blueprint, with only the annotation for Solution Name: Vision, unique value proposition, elevator pitch, or positioning statement.

      Understand your value streams before determining your solution’s architecture

      Business Strategy

      Sets and communicates the direction of the entire organization.

      Value Stream

      Segments, groups, and creates a coherent narrative as to how an organization creates value.

      Business Capability Map

      Decomposes an organization into its component parts to establish a common language across the organization.

      Execution

      Implements the business strategy through capability building or improvement projects.

      Identify your organization’s goals and define the value streams that support them

      Goal

      Revenue Growth

      Value Streams

      Stream 1- Product Purchase
      Stream 2- Customer Acquisition
      stream 3- Product Financing

      There are many techniques that help with constructing value streams and their capabilities.

      Domain-driven design is a technique that can be used for hypothesizing the value maps, their capabilities, and associated solution architecture.

      Read more about domain-driven design here.

      Value streams can be external (deliver value to customers) or internal (support operations)

        External Perspective

      1. Core value streams are mostly externally facing: they deliver value to either an external/internal customer and they tie to the customer perspective of the strategy map.
      • E.g. customer acquisition, product purchase, product delivery

      Internal Perspective

    • Support value streams are internally facing: they provide the foundational support for an organization to operate.
      • E.g. employee recruitment to retirement

      Key Questions to Ask While Evaluating Value Streams

      • Who are your customers?
      • What benefits do we deliver to them?
      • How do we deliver those benefits?
      • How does the customer receive the benefits?
      This image contains an example of value streams. The main headings are: Customer Acquisitions, Product Purchase, Product Delivery, Confirm Order, Product Financing, and Product Release.

      Value streams highlight the what, not the how

      Value chains set a high-level context, but architectural decisions still need to be made to deal with the dynamism of user interaction and their subsequent expectations. User stories (and/or use cases) and themes are great tools for developing such decisions.

      Product Delivery

      1. Order Confirmation
      2. Order Dispatching
      3. Warehouse Management
      4. Fill Order
      5. Ship Order
      6. Deliver Order

      Use Case and User Story Theme: Confirm Order

      This image shows the relationship between confirming the customer's order online, and the Online Buyer, the Online Catalog, the Integrated Payment, and the Inventory Lookup.

      The use case Confirming Customer’s Online Order has four actors:

      1. An Online Buyer who should be provided with a catalog of products to purchase from.
      2. An Online Catalog that is invoked to display its contents on demand.
      3. An Integrated Payment system for accepting an online form of payment (credit card, Bitcoins, etc.) in a secure transaction.
      4. An Inventory Lookup module that confirms there is stock available to satisfy the Online Buyer’s order.

      Info-Tech Insight

      Each use case theme links back to a feature(s) in the product backlog.

      Related Research

      Deliver on Your Digital Portfolio Vision

      • Recognize that a vision is only as good as the data that backs it up. Lay out a comprehensive backlog with quality built in that can be effectively communicated and understood through roadmaps.
      • Your intent is only a dream if it cannot be implemented – define what goes into a release plan via the release canvas.
      • Define a communication approach that lets everyone know where you are heading.

      Document Your Business Architecture

      • Recognize the opportunity for architecture work, analyze the current and target states of your business strategy, and identify and engage the right stakeholders.
      • Model the business in the form of architectural blueprints.
      • Apply business architecture techniques such as strategy maps, value streams, and business capability maps to design usable and accurate blueprints of the business.
      • Drive business architecture forward to promote real value to the organization.
      • Assess your current projects to determine if you are investing in the right capabilities. Conduct business capability assessments to identify opportunities and to prioritize projects.

      1.2 Document dynamic value stream maps

      1. Create value stream maps that support your business objectives.
      • The value stream maps could belong to existing or new business objectives.
    • For each value stream map:
      • Determine use case(s), the actors, and their expected activity.

      *Refer to the next slide for an example of a dynamic value stream map.

      Download the Solution Architecture Template for documentation of dynamic value stream map

      Input

      • Business Goals
      • Some or All Existing Business Processes
      • Some or All Proposed New Business Processes

      Output

      • Dynamic Value Stream Maps for Multiple Use Roles and Use Cases

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Product Owner
      • Application Architect
      • Integration Architect

      Example: Dynamic value stream map

      Loan Provision*

      *Value Stream Name: Usually has the same name as the capability it illustrates.

      Loan Application**; Disbursement of Fund**; Risk Management**; Service Accounts**

      **Value Stream Components: Specific functions that support the successful delivery of a value stream.

      Disbursement of Funds

      This image shows the relationship between depositing the load into the applicant's bank account, and the Applicant's bank, the Loan Applicant, and the Loan Supplier.

      Style #1:

      The use case Disbursement of Funds has three actors:

      1. A Loan Applicant who applied for a loan and got approved for one.
      2. A Loan Supplier who is the source for the funds.
      3. The Applicant’s Bank that has an account into which the funds are deposited.

      Style # 2:

      Loan Provision: Disbursement of Funds
      Use Case Actors Expectation
      Deposit Loan Into Applicant’s Bank Account
      1. Loan Applicant
      2. Loan Supplier
      3. Applicant’s Bank
      1. Should be able to see deposit in bank account
      2. Deposit funds into account
      3. Accept funds into account

      Mid-Phase 1 Checkpoint

      By now, the following items are ideally completed:

      • Mid-Phase 1 Checkpoint

      Start with an investigation of your architecture’s qualitative needs

      Quality attributes can be viewed as the -ilities (e.g. scalability, usability, reliability) that a software system needs to provide. A system not meeting any of its quality attribute requirements will likely not function as required. Examples of quality attributes are:

      1. Slow system response time
      2. Security breaches that result in loss of personal data
      3. A product feature upgrade that is not compatible with previous versions
      Examples of Qualitative Attributes
      Performance Compatibility Usability Reliability Security Maintainability
      • Response Time
      • Resource Utilization
      • System Capacity
      • Interoperability
      • Accessibility
      • User Interface
      • Intuitiveness
      • Availability
      • Fault Tolerance
      • Recoverability
      • Integrity
      • Non-Repudiation
      • Modularity
      • Reusability
      • Modifiability
      • Testability

      Focus on quality attributes that are architecturally significant.

      • Not every system requires every quality attribute.
      • Pay attention to those attributes without which the solution will not be able to satisfy a user’s abstract* expectation.
      • This set can be considered Architecturally Significant Requirements (ASR). ASR concern scenarios have the most impact on the architecture of the software system.
      • ASR are fundamental needs of the system and changing them in the future can be a costly and difficult exercise.

      *Abstract since attributes like performance and reliability are not directly measurable by a user.

      Stimulus Response Measurement Environmental Context

      For applicable use cases: (*Adapted from S Carnegie Mellon University, 2000)

      1. Determine the Stimulus (temporal, external, or internal) that puts stress on the system. For example, a VPN-accessed hospital management system is used for nurses to login at 8am every weekday.
      2. Describe how the system should Respond to the stimulus. For example, the hospital management system should complete a nurse login under 10ms on initiation of the HTTPS request.
      3. Set a Measurement criteria for determining the success of the response to the stimulus. For example, the system should be able to successfully respond to 98% of the HTTPS requests the first time.
      4. Note the environmental context under which the stimulus occurs, including any unusual conditions in effect.
      • The hospital management system needs to respond in under 10ms under typical load or peak load?
      • What is the time variance of peak loads, for example, an e-commerce system during a Black Friday sale?
      • How big is the peak load?

      Info-Tech Insight

      Three out of four is bad. Don’t architect for normal situations because the solution will be fragile and prone to catastrophic failure under unexpected events.
      Read article: Retail sites crash under weight of online Black Friday shoppers.

      Discover and evaluate the qualitative attributes needed for use cases or user stories

      Deposit Loan Into Applicant’s Bank Account

      Assume analysis is being done for a to-be developed system.

      User Loan Applicant
      Expectations On login to the web system, should be able to see accurate bank balance after loan funds are deposited.
      User signs into the online portal and opens their account balance page.
      Expected Response From System System creates a connection to the data source and renders it on the screen in under 10ms.
      Measurement Under Normal Loads:
      • Response in 10ms or less
      • Data should not be stale
      Under Peak Loads:
      • Response in 15ms or less
      • Data should not be stale
      Quality Attribute Required Required Attribute # 1: Performance
      • Design Decision: Reduce latency by placing authorization components closer to user’s location.
      Required Attribute # 2: Data Reliability
      • Design Decision: Use event-driven ETL pipelines.
      Required Attribute # 3: Scalability
      • Design Decision: Following Principle # 4 of the CSA (JIT Architecture), delay decision until necessary.

      Use cases developed in Phase 1.2 should be used here. (Adapted from the ATAM Utility Tree Method for Quality Attribute Engineering)

      Reduce technical debt while you are at it

      Deposit Loan Into Applicant’s Bank Account

      Assume analysis is being done for a to-be developed system.

      UserLoan Applicant
      ExpectationsOn login to the web system, should be able to see accurate bank balance after loan funds are deposited.
      User signs into the online portal and opens their account balance page.
      Expected Response From SystemSystem creates a connection to the data source and renders it on the screen in under 10ms.
      MeasurementUnder Normal Loads:
      • Response in 10ms or less
      • Data should not be stale
      Under Peak Loads:
      • Response in 15ms or less
      • Data should not be stale
      Quality Attribute RequiredRequired Attribute # 1: Performance
      • Design Decision: Reduce latency by placing authorization components closer to user’s location.

      Required Attribute # 2: Data Reliability

      • Expected is 15ms or less under peak loads, but average latency is 21ms.
      • Design Decision: Use event-driven ETL pipelines.

      Required Attribute # 3: Scalability

      • Data should not be stale and should sync instantaneously, but in some zip codes data synchronization is taking 8 hours.
      • Design Decision: Investigate integrations and flows across application, database, and infrastructure. (Note: A dedicated section for discussing scalability is presented in Phase 2.)

      1.3 Create a conceptual map between the value streams, use cases, and required architectural attributes

      1. For selected use cases completed in Phase 1.2:
      • Map the value stream to its associated use cases.
      • For each use case, list the required architectural quality attributes.

      Download the Solution Architecture Template for mapping value stream components to their required architectural attribute.

      Input

      • Use Cases
      • User Roles
      • Stimulus to System
      • Response From System
      • Response Measurement

      Output

      • List of Architectural Quality Attributes

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      Example for Phase 1.3

      Loan Provision

      Loan Application → Disbursement of Funds → Risk Management → Service Accounts

      Value Stream Component Use Case Required Architectural Attribute
      Loan Application UC1: Submit Loan Application
      UC2: Review Loan Application
      UC3: Approve Loan Application
      UCn: ……..
      UC1: Resilience, Data Reliability
      UC2: Data Reliability
      UC3: Scalability, Security, Performance
      UCn: …..
      Disbursement of Funds UC1: Deposit Funds Into Applicant’s Bank Account
      UCn: ……..
      UC1: Performance, Scalability, Data Reliability
      Risk Management ….. …..
      Service Accounts ….. …..

      1.2 Document dynamic value stream maps

      1. Create value stream maps that support your business objectives.
      • The value stream maps could belong to existing or new business objectives.
    • For each value stream map:
      • Determine use case(s), the actors, and their expected activity.

      *Refer to the next slide for an example of a dynamic value stream map.

      Download the Solution Architecture Template for documentation of dynamic value stream map

      Input

      • Business Goals
      • Some or All Existing Business Processes
      • Some or All Proposed New Business Processes

      Output

      • Dynamic Value Stream Maps for Multiple Use Roles and Use Cases

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Product Owner
      • Application Architect
      • Integration Architect

      Example: Dynamic value stream map

      Loan Provision*

      *Value Stream Name: Usually has the same name as the capability it illustrates.

      Loan Application**; Disbursement of Fund**; Risk Management**; Service Accounts**

      **Value Stream Components: Specific functions that support the successful delivery of a value stream.

      Disbursement of Funds

      This image shows the relationship between depositing the load into the applicant's bank account, and the Applicant's bank, the Loan Applicant, and the Loan Supplier.

      Style #1:

      The use case Disbursement of Funds has three actors:

      1. A Loan Applicant who applied for a loan and got approved for one.
      2. A Loan Supplier who is the source for the funds.
      3. The Applicant’s Bank that has an account into which the funds are deposited.

      Style # 2:

      Loan Provision: Disbursement of Funds
      Use Case Actors Expectation
      Deposit Loan Into Applicant’s Bank Account
      1. Loan Applicant
      2. Loan Supplier
      3. Applicant’s Bank
      1. Should be able to see deposit in bank account
      2. Deposit funds into account
      3. Accept funds into account

      Mid-Phase 1 Checkpoint

      By now, the following items are ideally completed:

      • Mid-Phase 1 Checkpoint

      Start with an investigation of your architecture’s qualitative needs

      Quality attributes can be viewed as the -ilities (e.g. scalability, usability, reliability) that a software system needs to provide. A system not meeting any of its quality attribute requirements will likely not function as required. Examples of quality attributes are:

      1. Slow system response time
      2. Security breaches that result in loss of personal data
      3. A product feature upgrade that is not compatible with previous versions
      Examples of Qualitative Attributes
      Performance Compatibility Usability Reliability Security Maintainability
      • Response Time
      • Resource Utilization
      • System Capacity
      • Interoperability
      • Accessibility
      • User Interface
      • Intuitiveness
      • Availability
      • Fault Tolerance
      • Recoverability
      • Integrity
      • Non-Repudiation
      • Modularity
      • Reusability
      • Modifiability
      • Testability

      Focus on quality attributes that are architecturally significant.

      • Not every system requires every quality attribute.
      • Pay attention to those attributes without which the solution will not be able to satisfy a user’s abstract* expectation.
      • This set can be considered Architecturally Significant Requirements (ASR). ASR concern scenarios have the most impact on the architecture of the software system.
      • ASR are fundamental needs of the system and changing them in the future can be a costly and difficult exercise.

      *Abstract since attributes like performance and reliability are not directly measurable by a user.

      Stimulus Response Measurement Environmental Context

      For applicable use cases: (*Adapted from S Carnegie Mellon University, 2000)

      1. Determine the Stimulus (temporal, external, or internal) that puts stress on the system. For example, a VPN-accessed hospital management system is used for nurses to login at 8am every weekday.
      2. Describe how the system should Respond to the stimulus. For example, the hospital management system should complete a nurse login under 10ms on initiation of the HTTPS request.
      3. Set a Measurement criteria for determining the success of the response to the stimulus. For example, the system should be able to successfully respond to 98% of the HTTPS requests the first time.
      4. Note the environmental context under which the stimulus occurs, including any unusual conditions in effect.
      • The hospital management system needs to respond in under 10ms under typical load or peak load?
      • What is the time variance of peak loads, for example, an e-commerce system during a Black Friday sale?
      • How big is the peak load?

      Info-Tech Insight

      Three out of four is bad. Don’t architect for normal situations because the solution will be fragile and prone to catastrophic failure under unexpected events.
      Read article: Retail sites crash under weight of online Black Friday shoppers.

      Discover and evaluate the qualitative attributes needed for use cases or user stories

      Deposit Loan Into Applicant’s Bank Account

      Assume analysis is being done for a to-be developed system.

      User Loan Applicant
      Expectations On login to the web system, should be able to see accurate bank balance after loan funds are deposited.
      User signs into the online portal and opens their account balance page.
      Expected Response From System System creates a connection to the data source and renders it on the screen in under 10ms.
      Measurement Under Normal Loads:
      • Response in 10ms or less
      • Data should not be stale
      Under Peak Loads:
      • Response in 15ms or less
      • Data should not be stale
      Quality Attribute Required Required Attribute # 1: Performance
      • Design Decision: Reduce latency by placing authorization components closer to user’s location.
      Required Attribute # 2: Data Reliability
      • Design Decision: Use event-driven ETL pipelines.
      Required Attribute # 3: Scalability
      • Design Decision: Following Principle # 4 of the CSA (JIT Architecture), delay decision until necessary.

      Use cases developed in Phase 1.2 should be used here. (Adapted from the ATAM Utility Tree Method for Quality Attribute Engineering)

      Reduce technical debt while you are at it

      Deposit Loan Into Applicant’s Bank Account

      Assume analysis is being done for a to-be developed system.

      UserLoan Applicant
      ExpectationsOn login to the web system, should be able to see accurate bank balance after loan funds are deposited.
      User signs into the online portal and opens their account balance page.
      Expected Response From SystemSystem creates a connection to the data source and renders it on the screen in under 10ms.
      MeasurementUnder Normal Loads:
      • Response in 10ms or less
      • Data should not be stale
      Under Peak Loads:
      • Response in 15ms or less
      • Data should not be stale
      Quality Attribute RequiredRequired Attribute # 1: Performance
      • Design Decision: Reduce latency by placing authorization components closer to user’s location.

      Required Attribute # 2: Data Reliability

      • Expected is 15ms or less under peak loads, but average latency is 21ms.
      • Design Decision: Use event-driven ETL pipelines.

      Required Attribute # 3: Scalability

      • Data should not be stale and should sync instantaneously, but in some zip codes data synchronization is taking 8 hours.
      • Design Decision: Investigate integrations and flows across application, database, and infrastructure. (Note: A dedicated section for discussing scalability is presented in Phase 2.)

      1.3 Create a conceptual map between the value streams, use cases, and required architectural attributes

      1. For selected use cases completed in Phase 1.2:
      • Map the value stream to its associated use cases.
      • For each use case, list the required architectural quality attributes.

      Download the Solution Architecture Template for mapping value stream components to their required architectural attribute.

      Input

      • Use Cases
      • User Roles
      • Stimulus to System
      • Response From System
      • Response Measurement

      Output

      • List of Architectural Quality Attributes

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      Prioritize architectural quality attributes to ensure a right-engineered solution

      Trade-offs are inherent in solution architecture. Scaling systems may impact performance and weaken security, while fault-tolerance and redundancy may improve availability but at higher than desired costs. In the end, the best solution is not always perfect, but balanced and right-engineered (versus over- or under-engineered).

      Loan Provision

      Loan Application → Disbursement of Funds → Risk Management → Service Accounts

      1. Map architecture attributes against the value stream components.
      • Use individual use cases to determine which attributes are needed for a value stream component.
      This image contains a screenshot of the table showing the importance of scalability, resiliance, performance, security, and data reliability for loan application, disbursement of funds, risk management, and service accounts.

      In our example, the prioritized list of architectural attributes are:

      • Security (4 votes for Very Important)
      • Data Reliability (2 votes for Very Important)
      • Scalability (1 vote for Very Important and 1 vote for Fairly Important) and finally
      • Resilience (1 vote for Very Important, 0 votes for Fairly Important and 1 vote for Mildly Important)
      • Performance (0 votes for Very Important, 2 votes for Fairly Important)

      1.4 Create a prioritized list of architectural attributes (from 1.3)

      1. Using the tabular structure shown on the previous slide:
      • Map each value stream component against architectural quality attributes.
      • For each mapping, indicate its importance using the green, blue, and yellow color scheme.

      Download the Solution Architecture Template and document the list of architectural attributes by priority.

      Input

      • List of Architectural Attributes From 1.3

      Output

      • Prioritized List of Architectural Attributes

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      End of Phase 1

      At the end of this Phase, you should have completed the following activities:

      • Documented a set of dynamic value stream maps along with selected use cases.
      • Using the SRME framework, identified quality attributes for the system under investigation.
      • Prioritized quality attributes for system use cases.

      Phase 2: Multi-Purpose Data and Security Architecture

      Phase 1

      1.1 Articulate an Architectural Vision
      1.2 Develop Dynamic Value Stream Maps
      1.3 Map Value Streams, Use Cases, and Required Architectural Attributes
      1.4 Create a Prioritized List of Architectural Attributes

      Phase 2

      2.1 Develop a Data Architecture That Supports Transactional and Analytical Needs
      2.2 Document Security Architecture Risks and Mitigations

      Phase 3

      3.1 Document Scalability Architecture
      3.2 Document Performance Enhancing Architecture
      3.3 Combine the Different Architecture Design Decisions Into a Unified Solution Architecture

      This phase will walk you through the following activities:

      • Understand the scalability, performance, resilience, and security needs of the business.

      This phase involves the following participants:

      • Business Architect
      • Product Owner
      • Application Architect
      • Integration Architect
      • Database Architect
      • Enterprise Architect

      Enhance Your Solution Architecture Practice

      Fragmented data environments need something to sew them together

      • A full 93% of enterprises have a multi-cloud strategy, with 87% having a hybrid-cloud environment in place.
      • On average, companies have data stored in 2.2 public and 2.2 private clouds as well as in various on-premises data repositories.
      This image contains a breakdown of the cloud infrastructure, including single cloud versus multi-cloud.

      Source: Flexera

      In addition, companies are faced with:

      • Access and integration challenges (Who is sending the data? Who is getting it? Can we trust them?)
      • Data format challenges as data may differ for each consumer and sender of data
      • Infrastructure challenges as data repositories/processors are spread out over public and private clouds, are on premises, or in multi-cloud and hybrid ecosystems
      • Structured vs. unstructured data

      A robust and reliable integrated data architecture is essential for any organization that aspires to be relevant and impactful in its industry.

      Data’s context and influence on a solution’s architecture cannot be overestimated

      Data used to be the new oil. Now it’s the life force of any organization that has serious aspirations of providing profit-generating products and services to customers. Architectural decisions about managing data have a significant impact on the sustainability of a software system as well as on quality attributes such as security, scalability, performance, and availability.

      Storage and Processing go hand in hand and are the mainstay of any data architecture. Due to their central position of importance, an architecture decision for storage and processing must be well thought through or they become the bottleneck in an otherwise sound system.

      Ingestion refers to a system’s ability to accept data as an input from heterogenous sources, in different formats, and at different intervals.

      Dissemination is the set of architectural design decisions that make a system’s data accessible to external consumers. Major concerns involve security for the data in motion, authorization, data format, concurrent requests for data, etc.

      Orchestration takes care of ensuring data is current and reliable, especially for systems that are decentralized and distributed.

      Data architecture requires alignment with a hybrid data management plan

      Most companies have a combination of data. They have data they own using on-premises data sources and on the cloud. Hybrid data management also includes external data, such as social network feeds, financial data, and legal information amongst many others.

      Data integration architectures have typically been put in one of two major integration patterns:

      Application to Application Integration (or “speed matters”) Analytical Data Integrations (or “send it to me when its all done”)
      • This domain is concerned with ensuring communication between processes.
      • Examples include patterns such as Service-Oriented Architecture, REST, Event Hubs and Enterprise Service Buses.
      • This domain is focused on integrating data from transactional processes towards enterprise business intelligence. It supports activities that require well-managed data to generate evidence-based insights.
      • Examples of this pattern are ELT, enterprise data warehouses, and data marts.

      Sidebar

      Difference between real-time, batch, and streaming data movements

      Real-Time

      • Reacts to data in seconds or even quicker.
      • Real-time systems are hard to implement.

      Batch

      • Batch processing deals with a large volume of data all at once and data-related jobs are typically completed simultaneously in non-stop, sequential order.
      • Batch processing is an efficient and low-cost means of data processing.
      • Execution of batch processing jobs can be controlled manually, providing further control over how the system treats its data assets.
      • Batch processing is only useful if there are no requirements for data to be fresh and current. Real-time systems are suited to processing data that requires these attributes.

      Streaming

      • Stream processing allows almost instantaneous analysis of data as it streams from one device to another.
      • Since data is analyzed quickly, storage may not be a concern (since only computed data is stored while raw data can be dispersed).
      • Streaming requires the flow of data into the system to equal the flow of data computing, otherwise issues of data storage and performance can rise.

      Modern data ingestion and dissemination frameworks keep core data assets current and accessible

      Data ingestion and dissemination frameworks are critical for keeping enterprise data current and relevant.

      Data ingestion/dissemination frameworks capture/share data from/to multiple data sources.

      Factors to consider when designing a data ingestion/dissemination architecture

      What is the mode for data movement?

      • The mode for data movement is directly influenced by the size of data being moved and the downstream requirements for data currency.
      • Data can move in real-time, as a batch, or as a stream.

      What is the ingestion/dissemination architecture deployment strategy?

      • Outside of critical security concerns, hosting on the cloud vs. on premises leads to a lower total cost of ownership (TCO) and a higher return on investment (ROI).

      How many different and disparate data sources are sending/receiving data?

      • Stability comes if there is a good idea about the data sources/recipient and their requirements.

      What are the different formats flowing through?

      • Is the data in the form of data blocks? Is it structured, semi-unstructured, or unstructured?

      What are expected performance SLAs as data flow rate changes?

      • Data change rate is defined as the size of changes occurring every hour. It helps in selecting the appropriate tool for data movement.
      • Performance is a derivative of latency and throughput, and therefore, data on a cloud is going to have higher latency and lower throughput then if it is kept on premises.
      • What is the transfer data size? Are there any file compression and/or file splits applied on the data? What is the average and maximum size of a block object per ingestion/dissemination operation?

      What are the security requirements for the data being stored?

      • The ingestion/dissemination framework should be able to work through a secure tunnel to collect/share data if needed.

      Sensible storage and processing strategy can improve performance and scalability and be cost-effective

      The range of options for data storage is staggering...

      … but that’s a good thing because the range of data formats that organizations must deal with is also richer than in the past.

      Different strokes for different workloads.

      The data processing tool to use may depend upon the workloads the system has to manage.

      Expanding upon the Risk Management use case (as part of the Loan Provision Capability), one of the outputs for risk assessment is a report that conducts a statistical analysis of customer profiles and separates those that are possibly risky. The data for this report is spread out across different data systems and will need to be collected in a master data management storage location. The business and data architecture team have discussed three critical system needs, noted below:

      Data Management Requirements for Risk Management Reporting Data Design Decision
      Needs to query millions of relational records quickly
      • Strong indexing
      • Strong caching
      • Message queue
      Needs a storage space for later retrieval of relational data
      • Data storage that scales as needed
      Needs turnkey geo-replication mechanism with document retrieval in milliseconds
      • Add NoSQL with geo-replication and quick document access

      Keep every core data source on the same page through orchestration

      Data orchestration, at its simplest, is the combination of data integration, data processing, and data concurrency management.

      Data pipeline orchestration is a cross-cutting process that manages the dependencies between your data integration tasks and scheduled data jobs.

      A task or application may periodically fail, and therefore, as a part of our data architecture strategy, there must be provisions for scheduling, rescheduling, replaying, monitoring, retrying, and debugging the entire data pipeline in a holistic way.

      Some of the functionality provided by orchestration frameworks are:

      • Job scheduling
      • Job parametrization
      • SLAs tracking, alerting, and notification
      • Dependency management
      • Error management and retries
      • History and audit
      • Data storage for metadata
      • Log aggregation
      Data Orchestration Has Three Stages
      Organize Transform Publicize
      Organizations may have legacy data that needs to be combined with new data. It’s important for the orchestration tool to understand the data it deals with. Transform the data from different sources into one standard type. Make transformed data easily accessible to stakeholders.

      2.1 Discuss and document data architecture decisions

      1. Using the value maps and associated use cases from Phase 1, determine the data system quality attributes.
      2. Use the sample tabular layout on the next slide or develop one of your own.

      Download the Solution Architecture Template for documenting data architecture decisions.

      Input

      • Value Maps and Use Cases

      Output

      • Initial Set of Data Design Decisions

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      Example: Data Architecture

      Data Management Requirements for Risk Management Reporting Data Design Decision
      Needs to query millions of relational records quickly
      • Strong indexing
      • Strong caching
      • Message queue
      Needs a storage space for later retrieval of relational data
      • Data storage that scales as needed
      Needs turnkey geo-replication mechanism with document retrieval in milliseconds
      • Add NoSQL with geo-replication and quick document access

      There is no free lunch when making the most sensible security architecture decision; tradeoffs are a necessity

      Ensuring that any real system is secure is a complex process involving tradeoffs against other important quality attributes (such as performance and usability). When architecting a system, we must understand:

      • Its security needs.
      • Its security threat landscape.
      • Known mitigations for those threats to ensure that we create a system with sound security fundamentals.

      The first thing to do when determining security architecture is to conduct a threat and risk assessment (TRA).

      This image contains a sample threat and risk assessment. The steps are Understand: Until we thoroughly understand what we are building, we cannot secure it. Structure what you are building, including: System boundary, System structure, Databases, Deployment platform; Analyze: Use techniques like STRIDE and attack trees to analyze what can go wrong and what security problems this will cause; Mitigate: The security technologies to use, to mitigate your concerns, are discussed here. Decisions about using single sign-on (SSO) or role-based access control (RBAC), encryption, digital signatures, or JWT tokens are made. An important part of this step is to consider tradeoffs when implementing security mechanisms; validate: Validation can be done by experimenting with proposed mitigations, peer discussion, or expert interviews.

      Related Research

      Optimize Security Mitigation Effectiveness Using STRIDE

      • Have a clear picture of:
        • Critical data and data flows
        • Organizational threat exposure
        • Security countermeasure deployment and coverage
      • Understand which threats are appropriately mitigated and which are not.
      • Generate a list of initiatives to close security gaps.
      • Create a quantified risk and security model to reassess program and track improvement.
      • Develop measurable information to present to stakeholders.

      The 3A’s of strong security: authentication, authorization, and auditing

      Authentication

      Authentication mechanisms help systems verify that a user is who they claim to be.

      Examples of authentication mechanisms are:

      • Two-Factor Authentication
      • Single Sign-On
      • Multi-Factor Authentication
      • JWT Over OAUTH

      Authorization

      Authorization helps systems limit access to allowed features, once a user has been authenticated.

      Examples of authentication mechanisms are:

      • RBAC
      • Certificate Based
      • Token Based

      Auditing

      Securely recording security events through auditing proves that our security mechanisms are working as intended.

      Auditing is a function where security teams must collaborate with software engineers early and often to ensure the right kind of audit logs are being captured and recorded.

      Info-Tech Insight

      Defects in your application software can compromise privacy and integrity even if cryptographic controls are in place. A security architecture made after thorough TRA does not override security risk introduced due to irresponsible software design.

      Examples of threat and risk assessments using STRIDE and attack trees

      STRIDE is a threat modeling framework and is composed of:

      • Spoofing or impersonation of someone other than oneself
      • Tampering with data and destroying its integrity
      • Repudiation by bypassing system identity controls
      • Information disclosure to unauthorized persons
      • Denial of service that prevents system or parts of it from being used
      • Elevation of privilege so that attackers get rights they should not have
      Example of using STRIDE for a TRA on a solution using a payment system This image contains a sample attack tree.
      Spoofing PayPal Bad actor can send fraudulent payment request for obtaining funds.
      Tampering PayPal Bad actor accesses data base and can resend fraudulent payment request for obtaining funds.
      Repudiation PayPal Customer claims, incorrectly, their account made a payment they did not authorize.
      Disclosure PayPal Private service database has details leaked and made public.
      Denial of Service PayPal Service is made to slow down through creating a load on the network, causing massive build up of requests
      Elevation of Privilege PayPal Bad actor attempts to enter someone else’s account by entering incorrect password a number of times.

      2.2 Document security architecture risks and mitigations

      1. Using STRIDE, attack tree, or any other framework of choice:
      • Conduct a TRA for use cases identified in Phase 1.2
    • For each threat identified through the TRA, think through the implications of using authentication, authorization, and auditing as a security mechanism.
    • Download the Solution Architecture Template for documenting data architecture decisions.

      Input

      • Dynamic Value Stream Maps

      Output

      • Security Architecture Risks and Mitigations

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Product Owner
      • Security Team
      • Application Architect
      • Integration Architect

      Examples of threat and risk assessments using STRIDE

      Example of using STRIDE for a TRA on a solution using a payment system
      Threat System Component Description Quality Attribute Impacted Resolution
      Spoofing PayPal Bad actor can send fraudulent payment request for obtaining funds. Confidentiality Authorization
      Tampering PayPal Bad actor accesses data base and can resend fraudulent payment request for obtaining funds. Integrity Authorization
      Repudiation PayPal Customer claims, incorrectly, their account made a payment they did not authorize. Integrity Authentication and Logging
      Disclosure PayPal Private service database has details leaked and made public. Confidentiality Authorization
      Denial of Service PayPal Service is made to slow down through creating a load on the network, causing massive build up of requests Availability N/A
      Elevation of Privilege PayPal Bad actor attempts to enter someone else’s account by entering incorrect password a number of times. Confidentiality, Integrity, and Availability Authorization

      Phase 3: Upgrade Your System’s Availability

      Phase 1

      1.1 Articulate an Architectural Vision
      1.2 Develop Dynamic Value Stream Maps
      1.3 Map Value Streams, Use Cases, and Required Architectural Attributes
      1.4 Create a Prioritized List of Architectural Attributes

      Phase 2

      2.1 Develop a Data Architecture That Supports Transactional and Analytical Needs
      2.2 Document Security Architecture Risks and Mitigations

      Phase 3

      3.1 Document Scalability Architecture
      3.2 Document Performance Enhancing Architecture
      3.3 Combine the Different Architecture Design Decisions Into a Unified Solution Architecture

      This phase will walk you through the following activities:

      • Examine architecture for scalable and performant system designs
      • Integrate all design decisions made so far into a solution design decision log

      This phase involves the following participants:

      • Business Architect
      • Product Owner
      • Application Architect
      • Integration Architect
      • Database Architect
      • Enterprise Architect

      Enhance Your Solution Architecture Practice

      In a cloud-inspired system architecture, scalability takes center stage as an architectural concern

      Scale and scope of workloads are more important now than they were, perhaps, a decade and half back. Architects realize that scalability is not an afterthought. Not dealing with it at the outset can have serious consequences should an application workload suddenly exceed expectations.

      Scalability is …

      … the ability of a system to handle varying workloads by either increasing or decreasing the computing resources of the system.

      An increased workload could include:

      • Higher transaction volumes
      • A greater number of users

      Architecting for scalability is …

      … not easy since organizations may not be able to accurately judge, outside of known circumstances, when and why workloads may unexpectedly increase.

      A scalable architecture should be planned at the:

      • Application Level
      • Infrastructure Level
      • Database Level

      The right amount and kind of scalability is …

      … balancing the demands of the system with the supply of attributes.

      If demand from system > supply from system:

      • Services and products are not useable and deny value to customers.

      If supply from system > demand from system:

      • Excess resources have been paid for that are not being used.

      When discussing the scalability needs of a system, investigate the following, at a minimum:

      • In case workloads increase due to higher transaction volumes, will the system be able to cope with the additional stress?
      • In situations where workloads increase, will the system be able to support the additional stress without any major modifications being made to the system?
      • Is the cost associated with handling the increased workloads reasonable for the benefit it provides to the business?
      • Assuming the system doesn’t scale, is there any mechanism for graceful degradation?

      Use evidence-based decision making to ensure a cost-effective yet appropriate scaling strategy

      The best input for an effective scaling strategy is previously gathered traffic data mapped to specific circumstances.

      In some cases, either due to lack of monitoring or the business not being sure of its needs, scalability requirements are hard to determine. In such cases, use stated tactical business objectives to design for scalability. For example, the business might state its desire to achieve a target revenue goal. To accommodate this, a certain number of transactions would need to be conducted, assuming a particular conversion rate.

      Scaling strategies can be based on Vertical or Horizontal expansion of resources.
      Pros Cons
      Vertical
      Scale up through use of more powerful but limited number of resources
      • May not require frequent upgrades.
      • Since data is managed through a limited number of resources, it is easier to share and keep current.
      • Costly upfront.
      • Application, database, and infrastructure may not be able to make optimal use of extra processing power.
      • As the new, more powerful resource is provisioned, systems may experience downtime.
      • Lacks redundancy due to limited points of failure.
      • Performance is constrained by the upper limits of the infrastructure involved.
      Horizontal
      Scale out through use of similarly powered but larger quantity of resources
      • Cost-effective upfront.
      • System downtime is minimal, when scaling is being performed.
      • More redundance and fault-tolerance is possible since there are many nodes involved, and therefore, can replace failed nodes.
      • Performance can scale out as more nodes are added.
      • Upgrades may occur more often than in vertical scaling.
      • Increases machine footprints and administrative costs over time.
      • Data may be partitioned on multiple nodes, leading to administrative and data currency challenges.

      Info-Tech Insight

      • Scalability is the one attribute that sparks a lot of trade-off discussions. Scalable solutions may have to compromise on performance, cost, and data reliability.
      • Horizontal scalability is mostly always preferable over vertical scalability.

      Sidebar

      The many flavors of horizontal scaling

      Traffic Shard-ing

      Through this mechanism, incoming traffic is partitioned around a characteristic of the workload flowing in. Examples of partitioning characteristics are user groups, geo-location, and transaction type.

      Beware of:

      • Lack of data currency across shards.

      Copy and Paste

      As the name suggests, clone the compute resources along with the underlying databases. The systems will use a load balancer as the first point of contact between itself and the workload flowing in.

      Beware of:

      • Though this is a highly scalable model, it does introduce risks related to data currency across all databases.
      • In case master database writes are frequent, it could become a bottleneck for the entire system.

      Productization Through Containers

      This involves breaking up the system into specific functions and services and bundling their business rules/databases into deployable containers.

      Beware of:

      • Too many containers introduce the need to orchestrate the distributed architecture that results from a service-oriented approach.

      Start a scalability overview with a look at the database(s)

      To know where to go, you must know where you are. Before introducing architectural changes to database designs, use the right metrics to get an insight into the root cause of the problem(s).

      In a nutshell, the purpose of scaling solutions is to have the technology stack do less work for the most requested services/features or be able to effectively distribute the additional workload across multiple resources.

      For databases, to ensure this happens, consider these techniques:

      • Reuse data through caching on the server and/or the client. This eliminates the need for looking up already accessed data. Examples of caching are:
        • In-memory caching of data
        • Caching database queries
      • Implement good data retrieval techniques like indexes.
      • Divide labor at the database level.
        • Through setting up primary-secondary distribution of data. In such a setup, the primary node is involved in writing data to itself and passes on requests to secondary nodes for fulfillment.
        • Through setting up database shards (either horizontally or vertically).
          • In a horizontal shard, a data table is broken into smaller pieces with the same data model but unique data in it. The sum total of the shared databases contains all the data in the primary data table.
          • In a vertical shard, a data table is broken into smaller pieces, but each piece may have a subset of the data columns. The data’s corresponding columns are put into the table where the column resides.

      Info-Tech Insight

      A non-scalable architecture has more than just technology-related ramifications. Hoping that load balancers or cloud services will manage scalability-related issues is bound to have economic impacts as well.

      Sidebar

      Caching Options

      CSA PRINCIPLE 5 applies to any decision that supports system scalability.
      “X-ilities Over Features”

      Database Caching
      Fetches and stores result of database queries in memory. Subsequent requests to the database for the same queries will investigate the cache before making a connection with the database.
      Tools like Memcached or Redis are used for database caching.

      Precompute Database Caching
      Unlike database caching, this style of caching precomputes results of queries that are popular and frequently used. For example, a database trigger could execute several predetermined queries and have them ready for consumption. The precomputed results may be stored in a database cache.

      Application Object Caching
      Stores computed results in a cache for later retrieval. For data sources, which are not changing frequently and are part of a computation output, application caching will remove the need to connect with a database.

      Proxy Caching
      Caches retrieved web pages on a proxy server and makes them available for the next time the page is requested.

      The intra- and inter-process communication of the systems middle tier can become a bottleneck

      To synchronize or not to synchronize?

      A synchronous request (doing one thing at a time) means that code execution will wait for the request to be responded to before continuing.

      • A synchronous request is a blocking event and until it is completed, all following requests will have to wait for getting their responses.
      • An increasing workload on a synchronous system may impact performance.
      • Synchronous interactions are less costly in terms of design, implementation, and maintenance.
      • Scaling options include:
      1. Vertical scale up
      2. Horizontal scale out of application servers behind a load balancer and a caching technique (to minimize data retrieval roundtrips)
      3. Horizonal scale out of database servers with data partitioning and/or data caching technique

      Use synchronous requests when…

      • Each request to a system sets the necessary precondition for a following request.
      • Data reliability is important, especially in real-time systems.
      • System flows are simple.
      • Tasks that are typically time consuming, such as I/O, data access, pre-loading of assets, are completed quickly.

      Asynchronous requests (doing many things at the same time) do not block the system they are targeting.

      • It is a “fire and forget” mechanism.
      • Execution on a server/processor is triggered by the request, however, additional technical components (callbacks) for checking the state of the execution must be designed and implemented.
      • Asynchronous interactions require additional time to be spent on implementation and testing.
      • With asynchronous interactions, there is no guarantee the request initiated any processing until the callbacks check the status of the executed thread.

      Use asynchronous requests when…

      • Tasks are independent in nature and don’t require inter-task communication.
      • Systems flows need to be efficient.
      • The system is using event-driven techniques for processing.
      • Many I/O tasks are involved.
      • The tasks are long running.

      Sidebar

      Other architectural tactics for inter-process communication

      STATELESS SERVICES VERSUS STATEFUL SERVICES
      • Does not require any additional data, apart from the bits sent through with the request.
      • Without implementing a caching solution, it is impossible to access the previous data trail for a transaction session.
      • In addition to the data sent through with the request, require previous data sent to complete processing.
      • Requires server memory to store the additional state data. With increasing workloads, this could start impacting the server’s performance.
      It is generally accepted that stateless services are better for system scalability, especially if vertical scaling is costly and there is expectation that workloads will increase.
      MICROSERVICES VERSUS SERVERLESS FUNCTIONS
      • Services are designed as small units of code with a single responsibility and are available on demand.
      • A microservices architecture is easily scaled horizontally by adding a load balancer and a caching mechanism.
      • Like microservices, these are small pieces of code designed to fulfill a single purpose.
      • Are provided only through cloud vendors, and therefore, there is no need to worry about provisioning of infrastructure as needs increase.
      • Stateless by design but the life cycle of a serverless function is vendor controlled.
      Serverless function is an evolving technology and tightly controlled by the vendor. As and when vendors make changes to their serverless products, your own systems may need to be modified to make the best use of these upgrades.

      A team that does not measure their system’s scalability is a team bound to get a 5xx HTTP response code

      A critical aspect of any system is its ability to monitor and report on its operational outcomes.

      • Using the principle of continuous testing, every time an architectural change is introduced, a thorough load and stress testing cycle should be executed.
      • Effective logging and use of insightful metrics helps system design teams make data-driven decisions.
      • Using principle of site reliability engineering and predictive analytics, teams can be prepared for any unplanned exaggerated stimulus on the system and proactively set up remedial steps.

      Any system, however well architected, will break one day. Strategically place kill-switches to counter any failures and thoroughly test their functioning before releasing to production.

      • Using Principles 2 and 9 of the CSA, (include kill-switches and architect for x-ilities over features), introduce tactics at the code and higher levels that can be used to put a system in its previous best state in case of failure.
      • Examples of such tactics are:
        • Feature flags for turning on/off code modules that impact x-ilities.
        • Implement design patterns like throttling, autoscaling, and circuit breaking.
        • Writing extensive log messages that bubble up as exceptions/error handling from the code base. *Logging can be a performance drag. Use with caution as even logging code is still code that needs CPU and data storage.

      Performance is a system’s ability to satisfy time-bound expectations

      Performance can also be defined as the ability for a system to achieve its timing requirements, using available resources, under expected full-peak load:

      (International Organization for Standardization, 2011)

      • Performance and scalability are two peas in a pod. They are related to each other but are distinct attributes. Where scalability refers to the ability of a system to initiate multiple simultaneous processes, performance is the system’s ability to complete the processes within a mandated average time period.
      • Degrading performance is one of the first red flags about a system’s ability to scale up to workload demands.
      • Mitigation tactics for performance are very similar to the tactics for scalability.

      System performance needs to be monitored and measured consistently.

      Measurement Category 1: System performance in terms of end-user experience during different load scenarios.

      • Response time/latency: Length of time it takes for an interaction with the system to complete.
      • Turnaround time: Time taken to complete a batch of tasks.
      • Throughput: Amount of workload a system is capable of handling in a unit time period.

      Measurement Category 2: System performance in terms of load managed by computational resources.

      • Resource utilization: The average usage of a resource (like CPU) over a period. Peaks and troughs indicate excess vs. normal load times.
      • Number of concurrent connections: Simultaneous user requests that a resource like a server can successfully deal with at once.
      • Queue time: The turnaround time for a specific interaction or category of interactions to complete.

      Architectural tactics for performance management are the same as those used for system scalability

      Application Layer

      • Using a balanced approach that combines CSA Principle 7 (Good architecture comes in small packages) and Principle 10 (Architect for products, not projects), a microservices architecture based on domain-driven design helps process performance. Microservices use lightweight HTTP protocols and have loose coupling, adding a degree of resilience to the system as well. *An overly-engineered microservices architecture can become an orchestration challenge.
      • The code design must follow standards that support performance. Example of standards is SOLID*.
      • Serverless architectures can run application code from anywhere – for example, from edge servers close to an end user – thereby reducing latency.

      Database Layer

      • Using the right database technologies for persistence. Relational databases have implicit performance bottlenecks (which get exaggerated as data size grows along with indexes), and document store database technologies (key-value or wide-column) can improve performance in high-read environments.
      • Data sources, especially those that are frequently accessed, should ideally be located close to the application servers. Hybrid infrastructures (cloud and on premises mixed) can lead to latency when a cloud-application is accessing on-premises data.
      • Using a data partitioning strategy, especially in a domain-driven design architecture, can improve the performance of a system.

      Performance modeling and continuous testing makes the SRE a happy engineer

      Performance modeling and testing helps architecture teams predict performance risks as the solution is being developed.
      (CSA Principle 12: Test the solution architecture like you test your solution’s features)

      Create a model for your system’s hypothetical performance testing by breaking an end-to-end process or use case into its components. *Use the SIPOC framework for decomposition.

      This image contains an example of modeled performance, showing the latency in the data flowing from different data sources to the processing of the data.

      In the hypothetical example of modeled performance above:

      • The longest period of latency is 15ms.
      • The processing of data takes 30ms, while the baseline was established at 25ms.
      • Average latency in sending back user responses is 21ms – 13ms slower than expected.

      The model helps architects:

      • Get evidence for their assumptions
      • Quantitatively isolate bottlenecks at a granular level

      Model the performance flow once but test it periodically

      Performance testing measures the performance of a software system under normal and abnormal loads.

      Performance testing process should be fully integrated with software development activities and as automated as possible. In a fast-moving Agile environment, teams should attempt to:

      • Shift-left performance testing activities.
      • Use performance testing to pinpoint performance bottlenecks.
      • Take corrective action, as quickly as possible.

      Performance testing techniques

      • Normal load testing: Verifies the system’s behavior under the expected normal load to ensure that its performance requirements are met. Load testing can be used to measure response time, responsiveness, turnaround time, and throughput.
      • Expected maximum load testing: Like the normal load testing process, ensures system meets its performance requirements under expected maximum load.
      • Stress testing: Evaluates system behavior when processing loads beyond the expected maximum.

      *In a real production scenario, a combination of these tests are executed on a regular basis to monitor the performance of the system over a given period.

      3.1-3.2 Discuss and document initial decisions made for architecture scalability and performance

      1. Use the outcomes from either or both Phases 1.3 and 1.4.
      • For each value stream component, list the architecture decisions taken to ensure scalability and performance at client-facing and/or business-rule layers.

      Download the Solution Architecture Template for documenting data architecture decisions.

      Input

      • Output From Phase 1.3 and/or From Phase 1.4

      Output

      • Initial Set of Design Decisions Made for System Scalability and Performance

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      Example: Architecture decisions for scalability and performance

      Value Stream Component Design Decision for User Interface Layer Design Decisions for Middle Processing Layer
      Loan Application Scalability: N/A
      Resilience: Include circuit breaker design in both mobile app and responsive websites.
      Performance: Cache data client.
      Scalability: Scale vertically (up) since loan application processing is very compute intensive.
      Resilience: Set up fail-over replica.
      Performance: Keep servers in the same geo-area.
      Disbursement of Funds *Does not have a user interface Scalability: Scale horizontal when traffic reaches X requests/second.
      Resilience: Create microservices using domain-driven design; include circuit breakers.
      Performance: Set up application cache; synchronous communication since order of data input is important.
      …. …. ….

      3.3 Combine the different architecture design decisions into a unified solution architecture

      Download the Solution Architecture Template for documenting data architecture decisions.

      Input

      • Output From Phase 1.3 and/or From Phase 1.4
      • Output From Phase 2.1
      • Output From Phase 2.2
      • Output From 3.1 and 3.2

      Output

      • List of Design Decisions for the Solution

      Materials

      • Whiteboard/Flip Charts

      Participants

      • Business Architect
      • Application Architect
      • Integration Architect
      • Database Architect
      • Infrastructure Architect

      Putting it all together is the bow that finally ties this gift

      This blueprint covered the domains tagged with the yellow star.

      This image contains a screenshot of the solution architecture framework found earlier in this blueprint, with stars next to Data Architecture, Security, Performance, and Stability.

      TRADEOFF ALERT

      The right design decision is never the same for all perspectives. Along with varying opinions, comes the “at odds with each other set” of needs (scalability vs. performance, or access vs. security).

      An evidence-based decision-making approach using a domain-driven design strategy is a good mix of techniques for creating the best (right?) solution architecture.

      This image contains a screenshot of a table that summarizes the themes discussed in this blueprint.

      Summary of accomplishment

      • Gained understanding and clarification of the stakeholder objectives placed on your application architecture.
      • Completed detailed use cases and persona-driven scenario analysis and their architectural needs through SRME.
      • Created a set of design decisions for data, security, scalability, and performance.
      • Merged the different architecture domains dealt with in this blueprint to create a holistic view.

      Bibliography

      Ambysoft Inc. “UML 2 Sequence Diagrams: An Agile Introduction.” Agile Modeling, n.d. Web.

      Bass, Len, Paul Clements, and Rick Kazman. Software Architecture in Practices: Third Edition. Pearson Education, Inc. 2003.

      Eeles, Peter. “The benefits of software architecting.” IBM: developerWorks, 15 May 2006. Web.

      Flexera 2020 State of the Cloud Report. Flexera, 2020. Web. 19 October 2021.

      Furdik, Karol, Gabriel Lukac, Tomas Sabol, and Peter Kostelnik. “The Network Architecture Designed for an Adaptable IoT-based Smart Office Solution.” International Journal of Computer Networks and Communications Security, November 2013. Web.

      Ganzinger, Matthias, and Petra Knaup. “Requirements for data integration platforms in biomedical research networks: a reference model.” PeerJ, 5 February 2015. (https://peerj.com/articles/755/).

      Garlan, David, and Mary Shaw. An Introduction to Software Architecture. CMU-CS-94-166, School of Computer Science Carnegie Mellon University, January 1994.

      Gupta, Arun. “Microservice Design Patterns.” Java Code Geeks, 14 April 2015. Web.

      How, Matt. The Modern Data Warehouse in Azure. O’Reilly, 2020.

      ISO/IEC 17788:2014: Information technology – Cloud computing, International Organization for Standardization, October 2014. Web.

      ISO/IEC 18384-1:2016: Information technology – Reference Architecture for Service Oriented Architecture (SOA RA), International Organization for Standardization, June 2016. Web.

      ISO/IEC 25010:2011(en) Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — System and software quality models. International Organization for Standardization, March 2011. Web.

      Kazman, R., M. Klein, and P. Clements. ATAM: Method for Architecture Evaluation. S Carnegie Mellon University, August 2000. Web.

      Microsoft Developer Network. “Chapter 16: Quality Attributes.” Microsoft Application Architecture Guide. 2nd Ed., 13 January 2010. Web.

      Microsoft Developer Network. “Chapter 2: Key Principles of Software Architecture.” Microsoft Application Architecture Guide. 2nd Ed., 13 January 2010. Web.

      Microsoft Developer Network. “Chapter 3: Architectural Patterns and Styles.” Microsoft Application Architecture Guide. 2nd Ed., 14 January 2010. Web.

      Microsoft Developer Network. “Chapter 5: Layered Application Guidelines.” Microsoft Application Architecture Guide. 2nd Ed., 13 January 2010. Web.

      Mirakhorli, Mehdi. “Common Architecture Weakness Enumeration (CAWE).” IEEE Software, 2016. Web.

      Moore, G. A. Crossing the Chasm, 3rd Edition: Marketing and Selling Disruptive Products to Mainstream Customers (Collins Business Essentials) (3rd ed.). Harper Business, 2014.

      OASIS. “Oasis SOA Reference Model (SOA RM) TC.” OASIS Open, n.d. Web.

      Soni, Mukesh. “Defect Prevention: Reducing Costs and Enhancing Quality.” iSixSigma, n.d. Web.

      The Open Group. TOGAF 8.1.1 Online, Part IV: Resource Base, Developing Architecture Views. TOGAF, 2006. Web.

      The Open Group. Welcome to the TOGAF® Standard, Version 9.2, a standard of The Open Group. TOGAF, 2018. Web.

      Watts, S. “The importance of solid design principles.” BMC Blogs, 15 June 2020. 19 October 2021.

      Young, Charles. “Hexagonal Architecture–The Great Reconciler?” Geeks with Blogs, 20 Dec 2014. Web.

      APPENDIX A

      Techniques to enhance application architecture.

      Consider the numerous solutions to address architecture issues or how they will impact your application architecture

      Many solutions exist for improving the layers of the application stack that may address architecture issues or impact your current architecture. Solutions range from capability changes to full stack replacement.

      Method Description Potential Benefits Risks Related Blueprints
      Business Capabilities:
      Enablement and enhancement
      • Introduce new business capabilities by leveraging unused application functionalities or consolidate redundant business capabilities.
      • Increase value delivery to stakeholders.
      • Lower IT costs through elimination of applications.
      • Increased use of an application could overload current infrastructure.
      • IT cannot authorize business capability changes.
      Use Info-Tech’s Document Your Business Architecture blueprint to gain better understanding of business and IT alignment.
      Removal
      • Remove existing business capabilities that don’t contribute value to the business.
      • Lower operational costs through elimination of unused and irrelevant capabilities.
      • Business capabilities may be seen as relevant or critical by different stakeholder groups.
      • IT cannot authorize business capability changes.
      Use Info-Tech’s Build an Application Rationalization Framework to rationalize your application portfolio.
      Business Process:
      Process integration and consolidation
      • Combine multiple business processes into a single process.
      • Improved utilization of applications in each step of the process.
      • Reduce business costs through efficient business processes.
      • Minimize number of applications required to execute a single process.
      • Significant business disruption if an application goes down and is the primary support for business processes.
      • Organizational pushback if process integration involves multiple business groups.
      Business Process (continued):
      Process automation
      • Automate manual business processing tasks.
      • Reduce manual processing errors.
      • Improve speed of delivery.
      • Significant costs to implement automation.
      • Automation payoffs are not immediate.
      Lean business processes
      • Eliminate redundant steps.
      • Streamline existing processes by focusing on value-driven steps.
      • Improve efficiency of business process through removal of wasteful steps.
      • Increase value delivered at the end of the process.
      • Stakeholder pushback from consistently changing processes.
      • Investment from business is required to fit documentation to the process.
      Outsource the process
      • Outsource a portion of or the entire business process to a third party.
      • Leverage unavailable resources and skills to execute the business process.
      • Loss of control over process.
      • Can be costly to bring the process back into the business if desired in the future.
      Business Process (continued):
      Standardization
      • Implement standards for business processes to improve uniformity and reusability.
      • Consistently apply the same process across multiple business units.
      • Transparency of what is expected from the process.
      • Improve predictability of process execution.
      • Process bottlenecks may occur if a single group is required to sign off on deliverables.
      • Lack of enforcement and maintenance of standards can lead to chaos if left unchecked.
      User Interface:
      Improve user experience (UX)
      • Eliminate end-user emotional, mechanical, and functional friction by improving the experience of using the application.
      • UX encompasses both the interface and the user’s behavior.
      • Increase satisfaction and adoption rate from end users.
      • Increase brand awareness and user retention.
      • UX optimizations are only focused on a few user personas.
      • Current development processes do not accommodate UX assessments
      Code:
      Update coding language
      Translate legacy code into modern coding language.
      • Coding errors in modern languages can have lesser impact on the business processes they support.
      • Modern languages tend to have larger pools of coders to hire.
      • Increase availability of tools to support modern languages.
      • Coding language changes can create incompatibilities with existing infrastructure.
      • Existing coding translation tools do not offer 100% guarantee of legacy function retention.
      Code (continued):
      Open source code
      • Download pre-built code freely available in open source communities.
      • Code is rapidly evolving in the community to meet current business needs.
      • Avoid vendor lock-in from proprietary software
      • Community rules may require divulgence of work done with open source code.
      • Support is primarily provided through community, which may not address specific concerns.
      Update the development toolchain
      • Acquire new or optimize development tools with increased testing, build, and deployment capabilities.
      • Increase developer productivity.
      • Increase speed of delivery and test coverage with automation.
      • Drastic IT overhauls required to implement new tools such as code conversion, data migration, and development process revisions.
      Update source code management
      • Optimize source code management to improve coding governance, versioning, and development collaboration.
      • Ability to easily roll back to previous build versions and promote code to other environments.
      • Enable multi-user development capabilities.
      • Improve conflict management.
      • Some source code management tools cannot support legacy code.
      • Source code management tools may be incompatible with existing development toolchain.
      Data:
      Outsource extraction
      • Outsource your data analysis and extraction to a third party.
      • Lower costs to extract and mine data.
      • Leverage unavailable resources and skills to translate mined data to a usable form.
      • Data security risks associated with off-location storage.
      • Data access and control risks associated with a third party.
      Update data structure
      • Update your data elements, types (e.g. transactional, big data), and formats (e.g. table columns).
      • Standardize on a common data definition throughout the entire organization.
      • Ease data cleansing, mining, analysis, extraction, and management activities.
      • New data structures may be incompatible with other applications.
      • Implementing data management improvements may be costly and difficult to acquire stakeholder buy-in.
      Update data mining and data warehousing tools
      • Optimize how data is extracted and stored.
      • Increase the speed and reliability of the data mined.
      • Perform complex analysis with modern data mining and data warehousing tools.
      • Data warehouses are regularly updated with the latest data.
      • Updating data mining and warehousing tools may create incompatibilities with existing infrastructure and data sets.
      Integration:
      Move from point-to-point to enterprise service bus (ESB)
      • Change your application integration approach from point-to-point to an ESB.
      • Increase the scalability of enterprise services by exposing applications to a centralized middleware.
      • Reduce the number of integration tests to complete with an ESB.
      • Single point of failure can cripple the entire system.
      • Security threats arising from centralized communication node.
      Leverage API integration
      • Leverage application programming interfaces (APIs) to integrate applications.
      • Quicker and more frequent transfers of lightweight data compared to extract, load, transfer (ETL) practices.
      • Increase integration opportunities with other modern applications and infrastructure (including mobile devices).
      • APIs are not as efficient as ETL when handling large data sets.
      • Changing APIs can break compatibility between applications if not versioned properly.

      Manage Poor Performance While Working From Home

      • Buy Link or Shortcode: {j2store}599|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $1,600 Average $ Saved
      • member rating average days saved: 18 Average Days Saved
      • Parent Category Name: Manage & Coach
      • Parent Category Link: /manage-coach
      • For many, emergency WFH comes with several new challenges such as additional childcare responsibilities, sudden changes in role expectations, and negative impacts on wellbeing. These new challenges, coupled with previously existing ones, can result in poor performance. Owing to the lack of physical presence and cues, managers may struggle to identify that an employee’s performance is suffering. Even after identifying poor performance, it can be difficult to address remotely when such conversations would ideally be held in person.

      Our Advice

      Critical Insight

      • Poor performance must be managed, despite the pandemic. Evaluating root causes of performance issues is more important than ever now that personal factors such as lack of childcare and eldercare for those working from home are complicating the issue.

      Impact and Result

      • Organizations need to have a clear process for improving performance for employees working remotely during the COVID-19 pandemic. Provide managers with resources to help them identify performance issues and uncover their root causes as part of addressing overall performance. This will allow managers to connect employees with the required support while working with them to improve performance.

      Manage Poor Performance While Working From Home Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Follow the remote performance improvement process

      Determine how managers can identify poor performance remotely and help them navigate the performance improvement process while working from home.

      • Manage Poor Performance While Working From Home Storyboard
      • Manage Poor Performance While Working From Home: Manager Guide
      • Manage Poor Performance While Working From Home: Infographic

      2. Clarify roles and leverage resources

      Clarify roles and responsibilities in the performance improvement process and tailor relevant resources.

      • Wellness and Working From Home
      [infographic]

      Further reading

      Manage Poor Performance While Working From Home

      Assess and improve remote work performance with our ready-to-use tools.

      Executive Summary

      McLean & Company Insight

      Poor performance must be managed, despite the pandemic. Evaluating root causes of performance issues is more important than ever now that personal factors such as lack of childcare and eldercare for those working from home are complicating the issue.

      Situation

      COVID-19 has led to a sudden shift to working from home (WFH), resulting in a 72% decline in in-office work (Ranosa, 2020). While these uncertain times have disrupted traditional work routines, employee performance remains critical, as it plays a role in determining how organizations recover. Managers must not turn a blind eye to performance issues but rather must act quickly to support employees who may be struggling.

      Complication

      For many, emergency WFH comes with several new challenges such as additional childcare responsibilities, sudden changes in role expectations, and negative impacts on wellbeing. These new challenges, coupled with previously existing ones, can result in poor performance. Owing to the lack of physical presence and cues, managers may struggle to identify that an employee’s performance is suffering. Even after identifying poor performance, it can be difficult to address remotely when such conversations would ideally be held in person.

      Solution

      Organizations need to have a clear process for improving performance for employees working remotely during the COVID-19 pandemic. Provide managers with resources to help them identify performance issues and uncover their root causes as part of addressing overall performance. This will allow managers to connect employees with the required support while working with them to improve performance.

      Manage Poor Performance While Working From Home is made up of the following resources:

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Storyboard

      This storyboard is organized by the four steps of the performance improvement process: identify, initiate, deploy, and follow up/decide. These will appear on the left-hand side of the slides as a roadmap.

      The focus is on how HR can design the process for managing poor performance remotely and support managers through it while emergency WFH measures are in place. Key responsibilities, email templates, and relevant resources are included at the end.

      Adapt the process as necessary for your organization.

      Manager Guide

      The manager guide contains detailed advice for managers on navigating the process and focuses on the content of remote performance discussions.

      It consists of the following sections:

      • Identifying poor performance.
      • Conducting performance improvement discussions.
      • Uncovering and addressing root causes of poor performance.
      Manager Infographic

      The manager infographic illustrates the high-level steps of the performance improvement process for managers in a visually appealing and easily digestible manner.

      This can be used to easily outline the process, providing managers with a resource to quickly reference as they navigate the process with their direct reports.

      In this blueprint, “WFH” and “remote working” are used interchangeably.

      This blueprint will not cover the performance management framework; it is solely focused on managing performance issues.

      For information on adjusting the regular performance management process during the pandemic, see Performance Management for Emergency Work-From-Home.

      Identify how low performance is normally addressed

      A process for performance improvement is not akin to outlining the steps of a performance improvement plan (PIP). The PIP is a development tool used within a larger process for performance improvement. Guidance on how to structure and use a PIP will be provided later in this blueprint.

      Evaluate how low performance is usually brought to the attention of HR in a non-remote situation:
      • Do managers approach HR for an employee transfer or PIP without having prior performance conversations with the employee?
      • Do managers come to HR when they need support in developing an employee in order to meet expectations?
      • Do managers proactively reach out to HR to discuss appropriate L&D for staff who are struggling?
      • Do some departments engage with the process while others do not?
      Poor performance does not signal the immediate need to terminate an employee. Instead, managers should focus on helping the struggling employee to develop so that they may succeed.
      Evaluate how poor performance is determined:
      • Do managers use performance data or concrete examples?
      • Is it based on a subjective assessment by the manager?
      Keep in mind that “poor performance” now might look different than it did before the pandemic. Employees must be aware of the current expectations placed on them before they can be labeled as underperforming – and the performance expectations must be assessed to ensure they are realistic.

      For information on adjusting performance expectations during the pandemic, see Performance Management for Emergency Work-From-Home.

      The process for non-union and union employees will likely differ. Make sure your process for unionized employees aligns with collective agreements.

      Determine how managers can identify poor performance of staff working remotely

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Identify: Determine how managers can identify poor performance.
      In person, it can be easy to see when an employee is struggling by glancing over at their desk and observing body language. In a remote situation, this can be more difficult, as it is easy to put on a brave face for the half-hour to one-hour check-in. Advise managers on how important frequent one-one-ones and open communication are in helping identify issues when they arise rather than when it’s too late.

      Managers must clearly document and communicate instances where employees aren’t meeting role expectations or are showing other key signs that they are not performing at the level expected of them.

      What to look for:
      • PM data/performance-related assessments
      • Continual absences
      • Decreased quality or quantity of output
      • Frequent excuses (e.g. repeated internet outages)
      • Lack of effort or follow-through
      • Missed deadlines
      • Poor communication or lack of responsiveness
      • Failure to improve
      It’s crucial to acknowledge an employee might have an “off week” or need time to adjust to working from home, which can be addressed with performance management techniques. Managers should move into the process for performance improvement when:
      • Performance fluctuates frequently or significantly.
      • Performance has dropped for an extended period of time.
      • Expectations are consistently not being met.

      While it’s important for managers to keep an eye out for decreased performance, discourage them from over-monitoring employees, as this can lead to a damaging environment of distrust.

      Support managers in initiating performance conversations and uncovering root causes

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Initiate: Require that managers have several conversations about low performance with the employee.
      Before using more formal measures, ensure managers take responsibility for connecting with the employee to have an initial performance conversation where they will make the performance issue known and try to diagnose the root cause of the issue.

      Coach managers to recognize behaviors associated with the following performance inhibitors:

      Personal Factors

      Personal factors, usually outside the workplace, can affect an employee’s performance.

      Lack of clarity

      Employees must be clear on performance expectations before they can be labeled as a poor performer.

      Low motivation

      Lack of motivation to complete work can impact the quality of output and/or amount of work an employee is completing.

      Inability

      Resourcing, technology, organizational change, or lack of skills to do the job can all result in the inability of an employee to perform at their best.

      Poor people skills

      Problematic people skills, externally with clients or internally with colleagues, can affect an employee’s performance or the team’s engagement.

      Personal factors are a common performance inhibitor due to emergency WFH measures. The decreased divide between work and home life and the additional stresses of the pandemic can bring up new cases of poor performance or exacerbate existing ones. Remind managers that all potential root causes should still be investigated rather than assuming personal factors are the problem and emphasize that there can be more than one cause.

      Ensure managers continue to conduct frequent performance conversations

      Once an informal conversation has been initiated, the manager should schedule frequent one-on-one performance conversations (above and beyond performance management check-ins).

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Explain to managers the purpose of these discussions is to:
      • Continue to probe for root causes.
      • Reinforce role expectations and performance targets.
      • Follow up on any improvements.
      • Address the performance issue and share relevant resources (e.g. HR or employee assistance program [EAP]).
      Given these conversations will be remote, require managers to:
      • Use video whenever possible to read physical cues and body language.
      • Bookend the conversation. Starting each meeting by setting the context for the discussion and finishing with the employee reiterating the key takeaways back will ensure there are no misunderstandings.
      • Document the conversation and share with HR. This provides evidence of the conversations and helps hold managers accountable.
      What is HR’s role? HR should ensure that the manager has had multiple conversations with the employee before moving to the next step. Furthermore, HR is responsible for ensuring manages are equipped to have the conversations through coaching, role-playing, etc.

      For more information on the content of these conversations or for material to leverage for training purposes, see Manage Poor Performance While Working From Home: Manager Guide.

      McLean & Company Insight

      Managers are there to be coaches, not therapists. Uncovering the root cause of poor performance will allow managers to pinpoint supports needed, either within their expertise (e.g. coaching, training, providing flexible hours) or by directing the employee to proper external resources such as an EAP.

      Help managers use formal performance improvement tools with remote workers

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Deploy: Use performance improvement tools.
      If initial performance conversations were unsuccessful and performance does not improve, refer managers to performance improvement tools:
      • Suggest any other available support and resources they have not yet recommended (e.g. EAP).
      • Explore options for co-creation of a development plan to increase employee buy-in. If the manager has been diligent about clarifying role expectations, invite the employee to put together their own action plan for meeting performance goals. This can then be reviewed and finalized with the manager.
      • Have the manager use a formal PIP for development and to get the employee back on track. Review the development plan or PIP with the manager before they share it with the employee to ensure it is clear and has time bound, realistic goals for improvement.
      Using a PIP solely to avoid legal trouble and terminate employees isn’t true to its intended purpose. This is what progressive discipline is for.In the case of significant behavior problems, like breaking company rules or safety violations, the manager will likely need to move to progressive discipline. HR should advise managers on the appropriate process.

      When does the issue warrant progressive discipline? If the action needs to stop immediately, (e.g. threatening or inappropriate behavior) and/or as outlined in the collective agreement.

      Clarify remote PIP stages and best practices

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Sample Stages:
      1. Written PIP
      • HR reviews and signs off on PIP
      • Manager holds meeting to provide employee with PIP
      • Employee reviews the PIP
      • Manager and employee provide e-signatures
      • Signed PIP is given to HR
      2. Possible Extension
      3. Final Notice
      • Manager provides employee with final notice if there has been no improvement in agreed time frame
      • Copy of signed final notice letter given to HR

      Who is involved?

      The manager runs the meeting with the employee. HR should act as a support by:

      • Ensuring the PIP is clear, aligned with the performance issue, and focused on development, prior to the meeting.
      • Pointing to resources and making themselves available prior to, during, and after the meeting.
        • When should HR be involved? HR should be present in the meeting if the manager has requested it or if the employee has approached HR beforehand with concerns about the manager. Keep in mind that if the employee sees HR has been unexpectedly invited to the video call, it could add extra stress for them.
      • Reviewing documentation and ensuring expectations and the action plan are reasonable and realistic.

      Determine the length of the PIP

      • The length of the initial PIP will often depend on the complexity of the employee’s role and how long it will reasonably take to see improvements. The minimum (before a potential extension) should be 30-60 days.
      • Ensure the action plan takes sustainment into account. Employees must be able to demonstrate improvement and sustain improved performance in order to successfully complete a PIP.

      Timing of delivery

      Help the manager determine when the PIP meeting will occur (what day, time of day). Take into account the schedule of the employee they will be meeting with (e.g. avoid scheduling right before an important client call).

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide

      Follow up: If the process escalated to step 3 and is successful.

      What does success look like? Performance improvement must be sustained after the PIP is completed. It’s not enough to simply meet performance improvement goals and expectations; the employee must continue to perform.

      Have the manager schedule a final PIP review with the employee. Use video, as this enables the employee and manager to read body language and minimize miscommunication/misinterpretation.

      • If performance expectations have been met, instruct managers to document this in the PIP, inform the employee they are off the PIP, and provide it to HR.

      The manager should also continue check-ins with the employee to ensure sustainment and as part of continued performance management.

      • Set a specific timeline, e.g. every two weeks or every month. Choose a cadence that works best for the manager and employee.

      OR

      Decide: Determine action steps if the process is unsuccessful.

      If at the end of step 3 performance has not sufficiently improved, the organization (HR and the manager) should either determine if the employee could/should be temporarily redeployed while the emergency WFH is still in place, if a permanent transfer to a role that is a better fit is an option, or if the employee should be let go.

      See the Complete Manual for COVID-19 Layoffs blueprint for information on layoffs in remote environments.

      Managers, HR, and employees all have a role to play in performance improvement

      Managers
      • Identify the outcomes the organization is looking for and clearly outline and communicate the expectations for the employee’s performance.
      • Diagnose root cause(s) of the performance issue.
      • Support employee through frequent conversations and feedback.
      • Coach for improved performance.
      • Visibly recognize and broadcast employee achievements.
      Employees
      • Have open and honest conversations with their manager, acknowledge their accountability, and be receptive to feedback.
      • Set performance goals to meet expectations of the role.
      • Prepare for frequent check-ins regarding improvement.
      • Seek support from HR as required.
      HR
      • Provide managers with a process, training, and support to improve employee performance.
      • Coach managers to ensure employees have been made aware of their role expectations and current performance and given specific recommendations on how to improve.
      • Reinforce the process for improving employee performance to ensure that adequate coaching conversations have taken place before the formal PIP.
      • Coach employees on how to approach their manager to discuss challenges in meeting expectations.

      HR should conduct checkpoints with both managers and employees in cases where a formal PIP was initiated to ensure the process for performance improvement is being followed and to support both parties in improving performance.

      Email templates

      Use the templates found on the next slides to draft communications to employees who are underperforming while working from home.

      Customize all templates with relevant information and use them as a guide to further tailor your communication to a specific employee.

      Customization Recommendations

      Review all slides and adjust the language or content as needed to suit the needs of the employee, the complexity of their role, and the performance issue.

      • The pencil icon to the left denotes slides requiring customization of the text. Customize text in grey font and be sure to convert all font to black when you are done.

      Included Templates

      1. Performance Discussion Follow-Up
      2. PIP Cover Letter

      This template is not a substitute for legal advice. Ensure you consult with your legal counsel, labor relations representative, and union representative to align with collective agreements and relevant legislation.

      Sample Performance Discussion Follow-Up

      Hello [name],

      Thank you for the commitment and eagerness in our meeting yesterday.

      I wanted to recap the conversation and expectations for the month of [insert month].

      As discussed, you have been advised about your recent [behavior, performance, attendance, policy, etc.] where you have demonstrated [state specific issue with detail of behavior/performance of concern]. As per our conversation, we’ll be working on improvement in this area in order to meet expectations set out for our employees.

      It is expected that employees [state expectations]. Please do not hesitate to reach out to me if there is further clarification needed or you if you have any questions or concerns. The management team and I are committed to helping you achieve these goals.

      We will do a formal check-in on your progress every [insert day] from [insert time] to review your progress. I will also be available for daily check-ins to support you on the right track. Additionally, you can book me in for desk-side coaching outside of my regular desk-side check-ins. If there is anything else I can do to help support you in hitting these goals, please let me know. Other resources we discussed that may be helpful in meeting these objectives are [summarize available support and resources]. By working together through this process, I have no doubt that you can be successful. I am here to provide support and assist you through this.

      If you’re unable to show improvements set out in our discussion by [date], we will proceed to a formal performance measure that will include a performance improvement plan. Please let me know if you have any questions or concerns; I am here to help.

      Please acknowledge this email and let me know if you have any questions.

      Thank you,

      PIP Cover Letter

      Hello [name] ,

      This is to confirm our meeting on [date] in which we discussed your performance to date and areas that need improvement. Please find the attached performance improvement plan, which contains a detailed action plan that we have agreed upon to help you meet role expectations over the next [XX days]. The aim of this plan is to provide you with a detailed outline of our performance expectations and provide you the opportunity to improve your performance, with our support.

      We will check in every [XX days] to review your progress. At the end of the [XX]-day period, we will review your performance against the role expectations set out in this performance improvement plan. If you don’t meet the performance requirements in the time allotted, further action and consequences will follow.

      Should you have any questions about the performance improvement plan or the process outlined in this document, please do not hesitate to discuss them with me.

      [Employee name], it is my personal objective to help you be a fully productive member of our team. By working together through this performance improvement plan, I have no doubt that you can be successful. I am here to provide support and assist you through the process. At this time, I would also like to remind you about the [additional resources available at your organization, for example, employee assistance program or HR].

      Please acknowledge this email and let me know if you have any questions.

      Thank you,

      Prepare and customize manager guide and resources

      Sample of Manage Poor Performance While Working From Home: Manager Guide. Manage Poor Performance While Working From Home: Manager Guide

      This tool for managers provides advice on navigating the process and focuses on the content of remote performance discussions.

      Sample of Set Meaningful Employee Performance Measures. Set Meaningful Employee Performance Measures

      See this blueprint for information on setting holistic measures to inspire employee performance.

      Sample of Manage Poor Performance While Working From Home: Infographic. Manage Poor Performance While Working From Home: Infographic

      This tool illustrates the high-level steps of the performance improvement process.

      Sample of Wellness and Working From Home: Infographic. Wellness and Working From Home: Infographic

      This tool highlights tips to manage physical and mental health while working from home.

      Sample of Build a Better Manager: Team Essentials. Build a Better Manager: Team Essentials

      See this solution set for more information on kick-starting the effectiveness of first-time IT managers with essential management skills.

      Sample of Leverage Agile Goal Setting for Improved Employee Engagement & Performance. Leverage Agile Goal Setting for Improved Employee Engagement & Performance

      See this blueprint for information on dodging the micromanaging foul and scoring with agile short-term goal setting.

      Bibliography

      Arringdale, Chris. “6 Tips For Managers Trying to Overcome Performance Appraisal Anxiety.” TLNT. 18 September 2015. Accessed 2018.

      Borysenko, Karlyn. “What Was Management Thinking? The High Cost of Employee Turnover.” Talent Management and HR. 22 April 2015. Accessed 2018.

      Cook, Ian. “Curbing Employee Turnover Contagion in the Workplace.” Visier. 20 February 2018. Accessed 2018.

      Cornerstone OnDemand. Toxic Employees in the Workplace. Santa Monica, California: Cornerstone OnDemand, 2015. Web.

      Dewar, Carolyn and Reed Doucette. “6 elements to create a high-performing culture.” McKinsey & Company. 9 April 2018. Accessed 2018.

      Eagle Hill. Eagle Hill National Attrition Survey. Washington, D.C.: Eagle Hill, 2015. Web.

      ERC. “Performance Improvement Plan Checklist.” ERC. 21 June 2017. Accessed 2018.

      Foster, James. “The Impact of Managers on Workplace Engagement and Productivity.” Interact. 16 March 2017. Accessed 2018.

      Godwins Solicitors LLP. “Employment Tribunal Statistics for 2015/2016.” Godwins Solicitors LLP. 8 February 2017. Accessed 2018.

      Mankins, Michael. “How to Manage a Team of All-Stars.” Harvard Business Review. 6 June 2017. Accessed 2018.

      Maxfield, David, et al. The Value of Stress-Free Productivity. Provo, Utah: VitalSmarts, 2017. Web.

      Murphy, Mark. “Skip Your Low Performers When Starting Performance Appraisals.” Forbes. 21 January 2015. Accessed 2018.

      Quint. “Transforming into a High Performance Organization.” Quint Wellington Redwood. 16 November 2017. Accessed 2018.

      Ranosa, Rachel. "COVID -19: Canadian Productivity Booms Despite Social Distancing." Human Resources Director, 14 April 2020. Accessed 2020.

      Service Desk

      • Buy Link or Shortcode: {j2store}11|cart{/j2store}
      • Related Products: {j2store}11|crosssells{/j2store}
      • Up-Sell: {j2store}11|upsells{/j2store}
      • member rating overall impact: 9.4/10
      • member rating average dollars saved: $22,900
      • member rating average days saved: 20
      • Parent Category Name: Infra and Operations
      • Parent Category Link: /infra-and-operations
      The service desk is typically the first point of contact for clients and staff who need something. Make sure your team is engaged, involved, knowledgeable, and gives excellent customer service.

      Requirements Gathering

      • Buy Link or Shortcode: {j2store}49|cart{/j2store}
      • Related Products: {j2store}49|crosssells{/j2store}
      • member rating overall impact: 9.5/10
      • member rating average dollars saved: $33,901
      • member rating average days saved: 23
      • Parent Category Name: Project Portfolio Management and Projects
      • Parent Category Link: /ppm-and-projects

      The challenge

      • The number reason projects fail because from the outset, what people wanted was not clear.
      • Without proper due diligence, IT will deliver projects that fail to meet business expectations and fail to provide business value.
      • If you failed to accurately capture the needs and desires, your projects are set up for costly rework. That will hurt your business's financial performance and result in damage to your relationship with your business partners.
      • Even with requirements gathering processes in place, your business analysts may not have the required competencies to execute them.

      Our advice

      Insight

      • You need to gather requirements with your organizations' end-state in mind. That requires IT and business alignment.
      • You would be good to create a set of standard operating procedures around requirements gathering. But many companies fail to do so.
      • Bring standardization and conformity to your requirements gathering processes via a centralized center of excellence. That brings cohesion and uniformity to your practice.
      • It is critical that your business analysts have the necessary competencies to execute your processes and that they ask the right questions.

      Impact and results 

      • Better requirements analysis will result in shorter cycle timed and reduced project rework and overhead.
      • You will enjoy better relationships with your business partners, greater stakeholder satisfaction, and gradually a better standing of IT.
      • Most importantly, the applications and systems you deliver will contain all must-haves and some nice-to-haves. Your minimal viable deliverable will start to create business value immediately.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand why you should invest in optimizing requirements gathering in your company. We show you how we can support you.

      Build the target state

      Fully understand the target needs of the requirements gathering process.

      • Build a Strong Approach to Business Requirements Gathering – Phase 1: Build the Target State for the Requirements Gathering Process (ppt)
      • Requirements Gathering SOP and BA Playbook (doc)
      • Requirements Gathering Maturity Assessment (xls)
      • Project Level Selection Tool (xls)
      • Business Requirements Analyst (doc)
      • Requirements Gathering Communication Tracking Template (xls)

      Develop best practices to gather business requirements

      • Build a Strong Approach to Business Requirements Gathering – Phase 2: Define the Elicitation Process (ppt)
      • Business Requirements Document Template (xls)
      • Scrum Documentation Template (doc)

      Analyze and validate requirements

      Standardize your frameworks for analysis and validation of the business requirements

      • Build a Strong Approach to Business Requirements Gathering – Phase 3: Analyze and Validate Requirements (ppt)
      • Requirements Gathering Documentation Tool (xls)
      • Requirements Gathering Testing Checklist (doc)

      Build your requirements gathering governance action plan

      Formalize governance.

      • Build a Strong Approach to Business Requirements Gathering – Phase 4: Create a Requirements Governance Action Plan (ppt)
      • Requirements Traceability Matrix (xls)

       

       

      Manage Exponential Value Relationships

      • Buy Link or Shortcode: {j2store}210|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      Implementing exponential IT will require businesses to work with external vendors to facilitate the rapid adoption of cutting-edge technologies such as generative artificial intelligence. IT leaders must:

      These challenges require new skills which build trust and collaboration among vendors.

      Our Advice

      Critical Insight

      Outcome-based relationships require a higher degree of trust than traditional vendor relationships. Build trust by sharing risks and rewards.

      Impact and Result

      • Assess your readiness to take on the new types of vendor relationships that will help you succeed.
      • Identify where you need to build your capabilities in order to successfully manage relationships.
      • Successfully manage outcomes, financials, risk, and relationships in complex vendor relationships.

      Manage Exponential Value Relationships Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Manage Exponential Value Relationships Storyboard – Learn about the new era of exponential vendor relationships and the capabilities needed to succeed.

      This research walks you through how to assess your capabilities to undertake a new model of vendor relationships and drive exponential IT.

      • Manage Exponential Value Relationships Storyboard

      2. Exponential Relationships Readiness Assessment – Assess your readiness to engage in exponential vendor partnerships.

      This tool will facilitate your readiness assessment.

      • Exponential Relationships Readiness Assessment
      [infographic]

      Further reading

      Manage Exponential Value Relationships

      Are you ready to manage outcome-based agreements?

      Analyst Perspective

      Outcome-based agreements require a higher degree of mutual trust.

      Kim Osborne Rodriguez

      Exponential IT brings with it an exciting new world of cutting-edge technology and increasingly accelerated growth of business and IT. But adopting and driving change through this paradigm requires new capabilities to grow impactful and meaningful partnerships with external vendors who can help implement technologies like artificial intelligence and virtual reality.

      Building outcome-based partnerships involves working very closely with vendors who, in many cases, will have just as much to lose as the organizations implementing these new technologies. This requires a greater degree of trust between parties than a standard vendor relationship. It also drastically increases the risks to both organizations; as each loses some control over data and outcomes, they must trust that the other organization will follow through on commitments and obligations.

      Outcome-based partnerships build upon traditional vendor management practices and create the potential for organizations to embrace emerging technology in new ways.

      Kim Osborne Rodriguez
      Research Director, CIO Advisory
      Info-Tech Research Group

      Executive Summary

      Exponential IT drives change

      Vendor relationships must evolve

      To deliver exponential value

      Implementing exponential IT will require businesses to work with external vendors to facilitate the rapid adoption of cutting-edge technologies such as generative artificial intelligence. IT leaders must:

      • Build strategic relationships with external entities to support the autonomization of the enterprise.
      • Procure, operate, and manage contracts and performance in outcome-based relationships.
      • Build relationships with new vendors.

      These challenges require new skills which build trust and collaboration with vendors.

      Traditional vendor management approaches are still important for organizations to develop and maintain. But exponential relationships bring new challenges:

      • A shift from managing technology service agreements to managing business capability agreements
      • Increased vendor access to intellectual property, confidential information, and customers

      IT leaders must adapt traditional vendor management capabilities to successfully lead this change.

      Outcome-based relationships should not be undertaken lightly as they can significantly impact the risk profile of the organization. Use this research to:

      • Assess your foundational vendor management capabilities as well as the transformative capabilities you need to manage outcome-based relationships.
      • Identify where you need to build your capabilities in order to successfully manage relationships.
      • Successfully manage outcomes, financials, risk, and relationships in complex vendor partnerships.

      Exponential value relationships will help drive exponential IT and autonomization of the enterprise.

      Info-Tech Insight

      Outcome-based partnerships require a higher degree of trust than traditional vendor relationships. Build trust by sharing risks and rewards.

      Vendor relationships can be worth billions of dollars

      Positive vendor relationships directly impact the bottom line, sometimes to the tune of billions of dollars annually.

      • Organizations typically spend 40% to 80% of their total budget on external suppliers.
      • Greater supplier trust translates directly to greater business profits, even in traditional vendor relationships.1
      • Based on over a decade of data from vehicle manufacturers, greater supplier relationships nearly doubled the unit profit margin on vehicles, contributing over $20 billion to Toyota’s annual profits based on typical sales volume.2
      • Having positive vendor relationships can be instrumental in times of crisis – when scarcity looms, vendors often choose to support their best customers.3,4 For example, Toyota protected itself from the losses many original equipment manufacturers (OEMs) faced in 2020 and showed improved profitability that year due to increased demand for vehicles which it was able to supply as a result of top-ranked vendor relationships.
      1 PR Newswire, 2022.
      2 Based on 10 years of data comparing Toyota and Nissan, every 1-point increase in the company’s Working Relations Index was correlated with a $15.77 net profit increase per unit. Impact on Toyota annual profits is based on 10.5 million units sold in 2021 and 2022.
      3 Interview with Renee Stanley, University of Texas at Arlington. Conducted 17 May 2023.
      4 Plante Moran, 2020.

      Supplier Trust Impacts OEM Profitability

      Sources: Macrotrends, Plante Moran 2022, Nissan 2022 and 2023, and Toyota 2022. Profit per car is based on total annual profit divided by total annual sales volume.

      Outcome-based relationships are a new paradigm

      In a new model where organizations are procuring autonomous capabilities, outcomes will govern vendor relationships.

      An outcome-based relationship requires a higher level of mutual trust than traditional vendor relationships. This requires shared reward and shared risk.

      Don’t forget about traditional vendor management relationships! Not all vendor relationships can (or should) be outcome-based.

      Managing Exponential Value Relationships.

      Case study

      INDUSTRY: Technology

      SOURCE: Press Release

      Microsoft and OpenAI partner on Azure, Teams, and Microsoft Office suite

      In January 2023, Microsoft announced a $10 billion investment in OpenAI, allowing OpenAI to continue scaling its flagship large language model, ChatGPT, and giving Microsoft first access to deploy OpenAI’s products in services like GitHub, Microsoft Office, and Microsoft Teams.

      Shared risk

      Issues with OpenAI’s platforms could have a debilitating effect on Microsoft’s own reputation – much like Google’s $100 billion stock loss following a blunder by its AI platform Bard – not to mention the financial loss if the platform does not live up to the hype.

      Shared reward

      This was a particularly important strategic move by Microsoft, as its main competitors develop their own AI models in a race to the top. This investment also gave OpenAI the resources to continue scaling and evolving its services much faster than it would be capable of on its own. If OpenAI’s products succeed, there is a significant upside for both companies.

      The image contains a graph that demonstrates time to reach 1 million users.

      Adapt your approach to vendor relationships

      Both traditional vendors and exponential relationships are important.

      Traditional

      procurement

      Vendor

      management

      Exponential vendor relationships

      • Ideal for procuring a product or service
      • Typically evaluates vendors based on their capabilities and track record of success
      • Focuses on metrics, KPIs, and contracts to deliver success to the organization purchasing the product or service
      • Vendors typically only have access to company data showing what is required to deliver their product or service
      • Ideal for managing vendors supplying products or services
      • Typically evaluates vendors based on the value and the criticality of a vendor to drive VM-resource allocation
      • External vendors do not generally participate in sharing of risks or rewards outside of payment for services or incentives/penalties
      • Vendors typically have limited access to company data
      • Ideal for procuring an autonomous capability
      • Typically evaluated based on the total possible value creation for both parties
      • External vendors share in substantial portions of the risks and rewards of the relationship
      • Vendors typically have significant access to company data, including proprietary methods, intellectual property, and customer lists

      Use this research to successfully
      manage outcome-based relationships.

      Use Info-Tech’s research to Jump Start Your Vendor Management Initiative.

      Common obstacles

      Exponential relationships require new approaches to vendor management as businesses autonomize:

      • Autonomization refers to the shift toward autonomous business capabilities which leverage technologies such as AI and quantum computing to operate independently of human interaction.
      • The speed and complexity of technology advancement requires that businesses move quickly and confidently to develop strong relationships and deliver value.
      • We are seeing businesses shift from procuring products and services to procuring autonomous business capabilities (sometimes called “as a service,” or aaS). This shift can drive exponential value but also increases complexity and risk.
      • Exponential IT requires a shift in emphasis toward more mature relationship and risk management strategies, compared to traditional vendor management.

      The shift from technology service agreements to business capability agreements needs a new approach

      Eighty-seven percent of organizations are currently experiencing talent shortages or expect to within a few years.

      Source: McKinsey, “Mind the [skills] gap”, 2021.

      Sixty-three percent of IT leaders plan to implement AI in their organizations by the end of 2023.

      Source: Info-Tech Research Group survey, 2022

      Insight summary

      Build trust

      Successfully managing exponential relationships requires increased trust and the ability to share both risks and rewards. Outcome-based vendors typically have greater access to intellectual property, customer data, and proprietary methods, which can pose a risk to the organization if this information is used to benefit competitors. Build mutual trust by sharing both risks and rewards.

      Manage risk

      Outcome-based relationships with external vendors can drastically affect an organization’s risk profile. Carefully consider third-party risk and shared risk, including ESG risk, as well as the business risk of losing control over capabilities and assets. Qualified risk specialists (such as legal, regulatory, contract, intellectual property law) should be consulted before entering outcome-based relationships.

      Drive outcomes

      Fostering strategic relationships can be instrumental in times of crisis, when being the customer of choice for key vendors can push your organization up the line from the vendor’s side – but be careful about relying on this too much. Vendor objectives may not align with yours, and in the end, everyone needs to protect themselves.

      Assess your readiness for exponential value relationships

      Key deliverable:

      Exponential Relationships Readiness Assessment

      Determine your readiness to build exponential value relationships.

      Measure the value of this blueprint

      Save thousands of dollars by leveraging this research to assess your readiness, before you lose millions from a relationship gone bad.

      Our research indicates that most organizations would take months to prepare this type of assessment without using our research. That’s over 80 person-hours spent researching and gathering data to support due diligence, for a total cost of thousands of dollars. Doesn’t your staff have better things to do?

      Start by answering a few brief questions, then return to this slide at the end to see how much your answers have changed.

      Establish Baseline Metrics

      Use Info-Tech’s research to Exponential Relationships Readiness Assessment.

      Estimated time commitment without Info-Tech’s research (person-hours)

      Establish a baseline

      Gauge the effectiveness of this research by asking yourself the following questions before and after completing your readiness assessment:

      Questions

      Before

      After

      To what extent are you satisfied with your current vendor management approach?

      How many of your current vendors would you describe as being of strategic importance?

      How much do you spend on vendors annually?

      How much value do you derive from your vendor relationships annually?

      Do you have a vendor management strategy?

      What outcomes are you looking to achieve through your vendor relationships?

      How well do you understand the core capabilities needed to drive successful vendor management?

      How well do you understand your current readiness to engage in outcome-based vendor relationships?

      Do you feel comfortable managing the risks when working with organizations to implement artificial intelligence and other autonomous capabilities?

      How to use this research

      Five tips to get the most out of your readiness assessment.

      1. Each category consists of five competencies, with a maximum of five points each. The maximum score on this assessment is 100 points.
      2. Effectiveness levels range from basic (level 1) to advanced (level 5). Level 1 is generally considered the baseline for most effectively operating organizations. If your organization is struggling with level 1 competencies, it is recommended to improve maturity in those areas before pursuing exponential relationships.
      3. This assessment is qualitative; complete the assessment to the best of your ability, based on the scoring rubric provided. If you fall between levels, use the lower one in your assessment.
      4. The scoring rubric may not perfectly fit the processes and practices within every organization. Consider the spirit of the description and score accordingly.
      5. Other industry- and region-specific competencies may be required to succeed at exponential relationships. The competencies in this assessment are a starting point, and internal validation and assessments should be conducted to uncover additional competencies and skills.

      Financial management

      Manage your budget and spending to stay on track throughout your relationship.

      “Most organizations underestimate the amount of time, money, and skill required to build and maintain a successful relationship with another organization. The investment in exponential relationships is exponential in itself – as are the returns.”

      – Jennifer Perrier, Principal Research Director,
      Info-Tech Research Group

      This step involves the following participants:

      • Executive leadership team, including CIO
      • CFO
      • Vendor management leader
      • Other internal stakeholders of vendor relationships

      Activities:

      • Assess your ability to manage scope and budget in exponential IT relationships.

      Successfully manage complex finances

      Stay on track and keep your relationship running smoothly.

      Why is this important?

      • Finance is at the core of most business – it drives decision making, acts as a constraint for innovation and optimization, and plays a key role in assessing options (such as return on investment or payback period).
      • Effectively managing finances is a critical success factor in developing strong relationships. Each organization must be able to manage their own budget and spending in order to balance the risk and reward in the relationship. Often, these risks and rewards will come in the form of profit and loss or revenue and spend.

      Build it into your practice:

      1. Ensure your financial decision-making practices are aligned with the organizational and relationship strategy. Do metrics and criteria reflect the organization’s goals?
      2. Develop strong accounting and financial analysis practices – this includes the ability to conduct financial due diligence on potential vendors.
      3. Develop consistent methodology to track and report on the desired outcomes on a regular basis.

      Build your ability to manage finances

      The five competencies needed to manage finances in exponential value relationships are:

      Budget procedures

      Financial alignment

      Adaptability

      Financial analysis

      Reporting & compliance

      Clearly articulate and communicate budgets, with proactive analysis and reporting.

      There is a strong, direct alignment between financial outcomes and organizational strategy and goals.

      Financial structures can manage many different types of relationships and structures without major overhaul.

      Proactive financial analysis is conducted regularly, with actionable insights.

      This exceeds legal requirements and includes proactive and actionable reporting.

      Relationship management

      Drive exponential value by becoming a customer of choice.

      “The more complex the business environment becomes — for instance, as new technologies emerge or as innovation cycles get faster — the more such relationships make sense. And the better companies get at managing individual relationships, the more likely it is that they will become “partners of choice” and be able to build entire portfolios of practical and value-creating partnerships.”

      (“Improving the management of complex business partnerships.” McKinsey, 2019)

      This step involves the following participants:

      • Executive leadership team, including CIO
      • Vendor management leader
      • Other internal stakeholders of vendor relationships

      Activities:

      • Assess your ability to manage relationships in exponential IT relationships.

      Take your relationships to the next level

      Maintaining positive relationships is key to building trust.

      Why is this important?

      • All relationships will experience challenges, and the ability to resolve these issues will rely heavily on the relationship management skills and soft skills of the leadership within each organization.
      • Based on a 20-year study of vendor relationships in the automotive sector, business-to-business trust is a function of reasonable demands, follow-through, and information sharing.
      (Source: Plante Moran, 2020)

      Build it into your practice:

      1. Develop the soft skills necessary to promote psychological safety, growth mindset, and strong and open communication channels.
      2. Be smart about sharing information – you don’t need to share everything, but being open about relevant information will enhance trust.
      3. Both parties need to work hard to develop trust necessary to build a true relationship. This will require increased access to decision-makers, clearly defined guardrails, and the ability for unsatisfied parties to leave.

      Build your ability to manage relationships

      The five competencies needed to manage relationships in exponential partnerships are:

      Strategic alignment

      Follow-through

      Information sharing

      Shared risk & rewards

      Communication

      Work with vendors to create roadmaps and strategies to drive mutual success.

      Ensure demands are reasonable and consistently follow through on commitments.

      Proactively and freely share relevant information between parties.

      Equitably share responsibility for outcomes and benefits from success.

      Ensure clear, proactive, and frequent communication occurs between parties.

      Performance management

      Outcomes management focuses on results, not methods.

      According to Jennifer Robinson, senior editor at Gallup, “This approach focuses people and teams on a concrete result, not the process required to achieve it. Leaders define outcomes and, along with managers, set parameters and guidelines. Employees, then, have a high degree of autonomy to use their own unique talents to reach goals their own way.” (Forbes, 2023)

      In the context of exponential relationships, vendors can be given a high degree of autonomy provided they meet their objectives.

      This step involves the following participants:

      • Executive leadership team, including CIO
      • Vendor management leader
      • Other internal stakeholders of vendor relationships

      Activities:

      • Assess your ability to manage outcomes in exponential IT relationships.

      Manage outcomes to drive mutual success

      Build trust by achieving shared objectives.

      Why is this important?

      • Relationships are based on shared risk and shared reward for all parties. In order to effectively communicate the shared rewards, you must first understand and communicate your objectives for the relationship, then measure outcomes to ensure all parties are benefiting.
      • Effectively managing outcomes reduces the risk that one party will choose to leave based on a perception of benefits not being achieved. Parties may still leave the agreement, but decisions should be based on shared facts and issues should be communicated and addressed early.

      Build it into your practice:

      1. Clearly articulate what you hope to achieve by entering an outcome-based relationship. Each party should outline and agree to the goals, objectives, and desired outcomes from the relationship.
      2. Document how rewards will be shared among parties. What type of rewards are anticipated? Who will benefit and how?
      3. Develop consistent methodology to track and report on the desired outcomes on a regular basis. This might consist of a vendor scorecard or a monthly meeting.

      Build your ability to manage outcomes

      The five competencies needed to manage outcomes in exponential value relationships are:

      Goal setting

      Negotiation

      Performance tracking

      Issue
      resolution

      Scope management

      Set specific, measurable and actionable goals, and communicate them with stakeholders.

      Clearly articulate and agree upon measurable outcomes between all parties.

      Proactively track progress toward goals/outcomes and discuss results with vendors regularly.

      Openly discuss potential issues and challenges on a regular basis. Find collaborative solutions to problems.

      Proactively manage scope and discuss with vendors on a regular basis.

      Risk management

      Exponential IT means exponential risk – and exponential rewards.

      One of the key differentiators between traditional vendor relationships and exponential relationships is the degree to which risk is shared between parties. This is not possible in all industries, which may limit companies’ ability to participate in this type of exponential relationship.

      This step involves the following participants:

      • Executive leadership team, including CIO
      • Vendor management leader
      • Risk management leader
      • Other internal stakeholders of vendor relationships

      Activities:

      • Assess your ability to manage risk in exponential IT relationships.

      Relationships come with a lot of hidden risks

      Successfully managing complex risks can be the difference between a spectacular success and company-ending failure.

      Why is this important?

      • Relationships inherently involve a loss of control. You are relying on another party to fulfill their part of the agreement, and you depend on the success of the outcome. Loss of control comes with significant risks.
      • Sharing in risk is what differentiates an outcome-based relationship from a traditional vendor relationship; vendors must have skin in the game.
      • Organizations must consider many different types of risk when considering a relationship with a vendor: fraud, security, human rights, labor relations, ESG, and operational risks. Remember that risk is not inherently bad; some risk is necessary.

      Build it into your practice:

      1. Build or hire the necessary risk expertise needed to properly assess and evaluate the risks of potential vendor relationships. This includes intellectual property, ESG, legal/regulatory, cybersecurity, data security, and more.
      2. Develop processes and procedures which clearly communicate and report on risk on a regular basis.

      Info-Tech Insight

      Some highly regulated industries (such as finance) are prevented from transferring certain types of risk. In these industries, it may be much more difficult to form vendor relationships.

      Don’t forget about third-party ESG risk

      Customers care about ESG. You should too.

      Protect yourself against third-party ESG risks by considering the environmental and social impacts of your vendors.

      Third-party ESG risks can include the following:

      • Environmental risk: Vendors with unsustainable practices such as carbon emissions or waste generation of natural resource depletion can negatively impact the organization’s environmental goals.
      • Social risk: Unsafe or illegal labor practices, human rights violations, and supply chain management issues can reflect negatively on organizations that choose to work with vendors who engage in such practices.
      • Governance risk: Vendors who engage in illegal or unethical behaviors, including bribery and corruption or data and privacy breaches can impact downstream customers.

      Working with vendors that have a poor record of ESG carries a very real reputational risk for organizations who do not undertake appropriate due diligence.

      A global survey of nearly 14,000 customers revealed that…

      Source: EY Future Consumer Index, 2021

      Seventy-seven percent of customers believe companies have a responsibility to manufacture sustainably.

      Sixty-eight percent of customers believe businesses should ensure their suppliers meet high social and environmental standards.

      Fifty-five percent of customers consider the environmental impact of production in their purchasing decisions.

      Build your ability to manage risk

      The five competencies needed to manage risk in exponential value relationships are:

      Third-party risk

      Value chain

      Data management

      Regulatory & compliance

      Monitoring & reporting

      Understand and assess third-party risk, including ESG risk, in potential relationships.

      Assess risk throughout the value chain for all parties and balance risk among parties.

      Proactively assess and manage potential data risks, including intellectual property and strategic data.

      Manage regulatory and compliance risks, including understanding risk transfer and ultimate risk holder.

      Proactive and open monitoring and reporting of risks, including regular communication among stakeholders.

      Contract management

      Contract management is a critical part of vendor management.

      Well-managed contracts include clearly defined pricing, performance-based outcomes, clear roles and responsibilities, and appropriate remedies for failure to meet requirements. In outcome-based relationships, contracts are generally used as a secondary method of enforcing performance, with relationship management being the primary method of addressing challenges and ensuring performance.

      This step involves the following participants:

      • Executive leadership team, including CIO
      • Vendor management leader
      • Risk management leader
      • Other internal stakeholders of vendor relationships

      Activities:

      • Assess your ability to manage risk in exponential IT relationships.

      Build your ability to manage contracts

      The five competencies needed to manage contracts in exponential value relationships are:

      Pricing

      Performance outcomes

      Roles and responsibilities

      Remedies

      Payment

      Pricing is clearly defined in contracts so that the total cost is understood including all fees, optional pricing, and set caps on increases.

      Contracts are performance-based whenever possible, including deliverables, milestones, service levels, due dates, and outcomes.

      Each party's roles and responsibilities are clearly defined in the contract documents with adequate detail.

      Contracts contain appropriate remedies for a vendor's failure to meet SLAs, due dates, and other obligations.

      Payment is made after performance targets are met, approved, or accepted.

      Activity 1: Assess your readiness for exponential relationships

      1-3 hours

      1. Gather key stakeholders from across your organization to participate in the readiness assessment exercise.
      2. As a group, review the core competencies from the previous four sections and determine where your organization’s effectiveness lies for each competency. Record your responses in the Exponential Relationships Readiness Assessment tool.

      Download the Exponential Relationships Readiness Assessment tool.

      Input Output
      • Core competencies
      • Knowledge of internal processes and capabilities
      • Readiness assessment
      Materials Participants
      • Exponential
        Relationships Readiness Assessment
        tool
      • Whiteboard/flip charts
      • Executive leadership team, including CIO
      • Vendor management leader
      • Other internal stakeholders of vendor relationships

      Understand your assessment

      This step involves the following participants:

      • Executive leadership team, including CIO
      • Vendor management leader
      • Other internal stakeholders of vendor relationships

      Activities:

      • Create an action plan.

      Understand the results of your assessment

      Consider the following recommendations based on your readiness assessment scores:

      • The chart to the right shows sample results. The bars indicate the recommended scores, and the line indicates the readiness score.
      • Three or more categories below the recommended scores, or any categories more than five points below the recommendation: outcome-based relationships are not recommended at this time.
      • Two or more categories below the recommended scores: Proceed with caution and limit outcome-based relationships to low-risk areas. Continue to mature capabilities.
      • One category below the recommended scores: Evaluate the risks and benefits before engaging in higher-risk vendor relationships. Continue to mature capabilities.
      • All categories at or above the recommended scores: You have many of the core capabilities needed to succeed at exponential relationships! Continue to evaluate and refine your vendor relationships strategy, and identify any additional competencies needed based on your industry or region.

      Acme Corp Exponential Relationships Readiness.

      Activity 2: Create an action plan

      1 hour

      1. Gather the stakeholders who participated in the readiness assessment exercise.
      2. As a group, review the results of the readiness assessment. Where there any surprise? Do the results reflect your understanding of the organization’s maturity?
      3. Determine which areas are likely to limit the organization’s relationship capability, based on lowest scoring areas and relative importance to the organization.
      4. Break out into groups and have each group identify three actions the organization could take to mature the lowest scoring areas.
      5. Bring the group back together and prioritize the actions. Note who will be accountable for each next step.
      InputOutput
      • Readiness assessment
      • Action plan to improve maturity of capabilities
      MaterialsParticipants
      • Exponential
        Relationship Readiness Assessment
        tool
      • Whiteboard/flip charts
      • Executive leadership team, including CIO
      • Vendor management leader
      • Other internal stakeholders of vendor relationships

      Related Info-Tech Research

      Jump Start Your Vendor Management Initiative
      Create and implement a vendor management framework to begin obtaining measurable results in 90 days.

      Elevate Your Vendor Management Initiative
      Transform your VMI from tactical to strategic to maximize its impact and value

      Evaluate Your Vendor Account Team to Optimize Vendor Relations
      Understand the value of knowing your account team’s influence in the organization, and your influence, to drive results.

      Related Info-Tech Research

      Build an IT Risk Management Program
      Mitigate the IT risks that could negatively impact your organization.

      Build an IT Budget
      Effective IT budgets are more than a spreadsheet. They tell a story.

      Adopt an Exponential IT Mindset
      Thrive through the next paradigm shift..

      Author

      Kim Osborne Rodriguez

      Kim Osborne Rodriguez
      Research Director, CIO Advisory
      Info-Tech Research Group

      Kim is a professional engineer and Registered Communications Distribution Designer (RCDD) with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach, with a track record of supporting successful projects.

      Kim holds a Bachelor’s degree in Honours Mechatronics Engineering and an option in Management Sciences from the University of Waterloo.

      Research Contributors and Experts

      Jack Hakimian

      Jack Hakimian
      Senior Vice President
      Info-Tech Research Group

      Jack has more than 25 years of technology and management consulting experience. He has served multibillion-dollar organizations in multiple industries including financial services and telecommunications. Jack also served several large public sector institutions.

      He is a frequent speaker and panelist at technology and innovation conferences and events and holds a Master’s degree in Computer Engineering as well as an MBA from the ESCP-EAP European School of Management.

      Michael Tweedie

      Michael Tweedie
      Practice Lead, CIO Strategy
      Info-Tech Research Group

      Mike Tweedie brings over 25 years as a technology executive. He’s led several large transformation projects across core infrastructure, application and IT services as the head of Technology at ADP Canada. He was also the Head of Engineering and Service Offerings for a large French IT services firm, focused on cloud adoption and complex ERP deployment and management.

      Mike holds a Bachelor’s degree in Architecture from Ryerson University.

      Scott Bickley

      Scott Bickley
      Practice Lead, VCCO
      Info-Tech Research Group

      Scott Bickley is a Practice Lead & Principal Research Director at Info-Tech Research Group, focused on Vendor Management and Contract Review. He also has experience in the areas of IT Asset Management (ITAM), Software Asset Management (SAM), and technology procurement along with a deep background in operations, engineering, and quality systems management.

      Scott holds a B.S. in Justice Studies from Frostburg State University. He also holds active IAITAM certification designations of CSAM and CMAM and is a Certified Scrum Master (SCM).

      Donna Bales

      Donna Bales
      Principal Research Director
      Info-Tech Research Group

      Donna Bales is a Principal Research Director in the CIO Practice at Info-Tech Research Group, specializing in research and advisory services in IT risk, governance, and compliance. She brings over 25 years of experience in strategic consulting and product development and has a history of success in leading complex, multistakeholder industry initiatives.

      Donna has a bachelor’s degree in economics from the University of Western Ontario.

      Research Contributors and Experts

      Jennifer Perrier

      Jennifer Perrier
      Principal Research Director
      Info-Tech Research Group

      Jennifer has 25 years of experience in the information technology and human resources research space, joining Info-Tech in 1998 as the first research analyst with the company. Over the years, she has served as a research analyst and research manager, as well as in a range of roles leading the development and delivery of offerings across Info-Tech’s product and service portfolio, including workshops and the launch of industry roundtables and benchmarking. She was also Research Lead for McLean & Company, the HR advisory division of Info-Tech, during its start-up years.

      Jennifer’s research expertise spans the areas of IT strategic planning, governance, policy and process management, people management, leadership, organizational change management, performance benchmarking, and cross-industry IT comparative analysis. She has produced and overseen the development of hundreds of publications across the full breadth of both the IT and HR domains in multiple industries. In 2022, Jennifer joined Info-Tech’s IT Financial Management Practice with a focus on developing financial transparency to foster meaningful dialogue between IT and its stakeholders and drive better technology investment decisions.

      Phil Bode

      Phil Bode
      Principal Research Director
      Info-Tech Research Group

      Phil has 30+ years of experience with IT procurement-related topics: contract drafting and review, negotiations, RFXs, procurement processes, and vendor management. Phil has been a frequent speaker at conferences, a contributor to magazine articles in CIO Magazine and ComputerWorld, and quoted in many other magazines. He is a co-author of the book The Art of Creating a Quality RFP.

      Phil has a Bachelor of Science in Business Administration with a double major of Finance and Entrepreneurship and a Bachelor of Science in Business Administration with a major of Accounting, both from the University of Arizona.

      Research Contributors

      Erin Morgan

      Erin Morgan
      Assistant Vice President, IT Administration
      University of Texas at Arlington

      Renee Stanley

      Renee Stanley
      Assistant Director IT Procurement and Vendor Management
      University of Texas at Arlington

      Note: Additional contributors did not wish to be identified.

      Bibliography

      Andrea, Dave. “Plante Moran’s 2022 Working Relations Index® (WRI) Study shows supplier relations can improve amid industry crisis.” Plante Moran, 25 Aug 2022. Accessed 18 May 2023.
      Andrea, Dave. “Trust between suppliers and OEMs can better prepare you for the next crisis.” Plante Moran, 9 Sept 2020. Accessed 17 May 2023.
      Cleary, Shannon, and Carolan McLarney. “Organizational Benefits of an Effective Vendor Management Strategy.” IUP Journal of Supply Chain Management, Vol. 16, Issue 4, Dec 2019.
      De Backer, Ruth, and Eileen Kelly Rinaudo. “Improving the management of complex business partnerships.” McKinsey, 21 March 2019. Accessed 9 May 2023 .
      Dennean, Kevin et al. “Let's chat about ChatGPT.” UBS, 22 Feb 2023. Accessed 26 May 2023.
      F&I Tools. “Nissan Worldwide Vehicle Sales Report.” Factory Warranty List, 2022. Accessed 18 May 2023.
      Gomez, Robin. “Adopting ChatGPT and Generative AI in Retail Customer Service.” Radial, 235, April 2023. Accessed 10 May 2023.
      Harms, Thomas and Kristina Rogers. “How collaboration can drive value for you, your partners and the planet.” EY, 26 Oct 2021. Accessed 10 May 2023.
      Hedge & Co. “Toyota, Honda finish 1-2; General Motors finishes at 3rd in annual Supplier Working Relations Study.” PR Newswire, 23 May 2022. Accessed 17 May 2023.
      Henke Jr, John W., and T. Thomas. "Lost supplier trust, lost profits." Supply Chain Management Review, May 2014. Accessed 17 May 2023.
      Information Services Group, Inc. “Global Demand for IT and Business Services Continues Upward Surge in Q2, ISG Index™ Finds.” BusinessWire, 7 July 2021. Accessed 8 May 2023.
      Kasanoff, Bruce. “New Study Reveals Costs Of Bad Supplier Relationships.” Forbes, 6 Aug 2014. Accessed 17 May 2023.
      Macrotrends. “Nissan Motor Gross Profit 2010-2022.” Macrotrends. Accessed 18 May 2023.
      Macrotrends. “Toyota Gross Profit 2010-2022.” Macrotrends. Accessed 18 May 2023.
      McKinsey. “Mind the [skills] gap.” McKinsey, 27 Jan 2021. Accessed 18 May 2023.
      Morgan, Blake. “7 Examples of How Digital Transformation Impacted Business Performance.” Forbes, 21 Jul 2019. Accessed 10 May 2023.
      Nissan Motor Corporation. “Nissan reports strong financial results for fiscal year 2022.” Nissan Global Newsroom, 11 May 2023. Accessed 18 May 2023.

      Bibliography

      “OpenAI and Microsoft extend partnership.” Open AI, 23 Jan 2023. Accessed 26 May 2023.
      Pearson, Bryan. “The Apple Of Its Aisles: How Best Buy Lured One Of The Biggest Brands.“ Forbes, 23 Apr 2015. Accessed 23 May 2023.
      Perifanis, Nikolaos-Alexandros and Fotis Kitsios. “Investigating the Influence of Artificial Intelligence on Business Value in the Digital Era of Strategy: A Literature Review.” Information, 2 Feb 2023. Accessed 10 May 2023.
      Scott, Tim and Nathan Spitse. “Third-party risk is becoming a first priority challenge.” Deloitte. Accessed 18 May 2023.
      Stanley, Renee. Interview by Kim Osborne Rodriguez, 17 May 2023.
      Statista. “Toyota's retail vehicle sales from 2017 to 2021.” Statista, 27 Jul 2022. Accessed 18 May 2023.
      Tlili, Ahmed, et al. “What if the devil is my guardian angel: ChatGPT as a case study of using chatbots in education.” Smart Learning Environments, 22 Feb 2023. Accessed 9 May 2023.
      Vitasek, Kate. “Outcome-Based Management: What It Is, Why It Matters And How To Make It Happen.” Forbes, 12 Jan 2023. Accessed 9 May 2023.

      Renovate the Data Center

      • Buy Link or Shortcode: {j2store}497|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Center & Facilities Optimization
      • Parent Category Link: /data-center-and-facilities-optimization
      • 33% of enterprises will be undertaking facility upgrades or refreshes in 2010 aimed at extending the life of their existing data centers.
      • Every upgrade or refresh targeting specific components in the facility to address short-term pain will have significant impact on the data center environment as a whole. Planning upfront and establishing a clear project scope will minimize expensive changes in later years.
      • This solution set will provide you with step-by-step design, planning, and selection tools to define a Data Center renovation plan to reduce cost and risk while supporting cost-effective long-term growth for power, cooling, standby power, and fire protection renovations.

      Our Advice

      Critical Insight

      • 88% of organizations cited they would spend more time and effort on documenting and identifying facility requirements for initial project scoping. Organizations can prevent scope creep by conducting the necessary project planning up front and identify requirements and the effect that the renovation project will have in all areas of the data center facility.
      • Data Center facilities renovations must include the specific requirements related to power provisioning, stand-by power, cooling, and fire protection - not just the immediate short-term pain.
      • 39% of organizations cited they would put more emphasis on monitoring contractor management and performance to improve the outcome of the data center renovation project.

      Impact and Result

      • Early internal efforts to create a budget and facility requirements yields better cost and project outcomes when construction begins. Each data center renovation project is unique and should have its own detailed budget.
      • Upfront planning and detailed project scoping can prevent a cascading impact on data center renovation projects to other areas of the data center that can increase project size, scope and spend.
      • Contractor selection is one of the most important first steps in a complex data center renovation. Organizations must ensure the contractor selected has experience specifically in data center renovation.

      Renovate the Data Center Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and understand the renovation project.

      • Storyboard: Renovate the Data Center
      • None
      • Data Center Annual Review Checklist

      2. Renovate power in the data center.

      • Data Center Power Requirements Calculator

      3. Renovate cooling in the data center.

      • Data Center Cooling Requirements Calculator

      4. Renovate standby power in the data center.

      • Data Center Standby Power Requirements Calculator

      5. Define current and future fire protection requirements.

      • Fire Protection & Suppression Engineer Selection Criteria Checklist
      • None

      6. Assess the opportunities and establish a clear project scope.

      • Data Center Renovation Project Charter
      • Data Center Renovation Project Planning & Monitoring Tool

      7. Establish a budget for the data center renovation project.

      • Data Center Renovation Budget Tool

      8. Select a general contractor to execute the project.

      • None
      • Data Center Renovation Contractor Scripted Interview
      • Data Center Renovation Contractor Scripted Interview Scorecard
      • Data Center Renovation Contractor Reference Checklist
      [infographic]

      Improve your core processes

      Improve your core processes


      We have over 45 fully detailed
      and interconnected process guides
      for you to improve your operations

      Managing and improving your processes is key to attaining commercial success

      Our practical guides help you to improve your operations

      We have hundreds of practical guides, grouped in many processes in our model. You may not need all of them. I suggest you browse within the belo top-level categories below and choose where to focus your attention. And with Tymans Group's help, you can go one process area at a time.

      If you want help deciding, please use the contact options below or click here.

      Check out our guides

      Our research and guides are priced from €299,00

      • Gert Taeymans Guidance

        Tymans Group Guidance & Consulting

        Tymans Group guidance and (online) consulting using both established and forward-looking research and field experience in our management domains.

        Contact

      • Tymans Group
        & Info-Tech
        Combo

        Get both inputs, all of the Info-tech research (with cashback rebate), and Tymans Group's guidance.

        Contact

      • Info-Tech Research

        Info-Tech offers a vast knowledge body, workshops, and guided implementations. You can buy Info-Tech memberships here at Tymans Group with cashback, reducing your actual outlay.

        Contact

      Register to read more …

      DORA - Article 7 — Explained

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      Intro

      While this text is about DORA requirements, it is really about resilient availability of your service. Even if you are not bound to this regulation, maybe you are not a financial services provider, the requirements and tips on how to get there are invaluable to your client satisfaction.

      Legal text

      In order to address and manage ICT risk, financial entities shall use and maintain updated ICT systems, protocols and tools that are:
      (a) appropriate to the magnitude of operations supporting the conduct of their activities, in accordance with the
      proportionality principle as referred to in Article 4;
      (b) reliable;
      (c) equipped with sufficient capacity to accurately process the data necessary for the performance of activities and the timely provision of services, and to deal with peak orders, message or transaction volumes, as needed, including where new technology is introduced;
      (d) technologically resilient in order to adequately deal with additional information processing needs as required under
      stressed market conditions or other adverse situations.

      What do you need to do?

      • Determine what systems you need.
      • Inventory the systems you have.
      • Make sure your systems and applications are sized right for your business
        • and made resilient according to the business functions they support
          in relation to the size of the business functions they support (proportionality)
        • and are reliable, meaning they produce consistent results
        • and are resilient, meaning they can withstand adverse effects where needed 

      How do you do this?

      For requirement (a)

      • Identify the capacity requirements for your services
      • Also identify the capacity requirements in case of serious decapacitating events (Business continuity)
      • Detail your capacity management plan so that you can meet the requirements
      • Test your systems for compliamce with these requirements

      For requirement (b)

      • Show the parts of your IT policy that deals with availability, 
      • Show the technical Disaster recovery plans and their execution reports (ideally over a number of years)
      • Show the availability reports for your systems.
      • Show the vulnerability management reports for your systems (optional)

      For requirement (C)

      • Show the availability reports for your systems: this is really the end-result: if you can show that your systems are available even under heavy load, you have won half the battle.
      • Show the capacity requirements for your systems. This is where you can prove you really thought about demad for your service.
      • Show the capacity monitoring plans, plans and roadmaps and reports for your systems
      •  Show the load testing reports executed on your systems

       For requirement (d)

      • Show the identified attacks scenarios and you defend against them
      •  Show the results of your resilience test plans: talk about High availability, Disaster recovery, and manual workaround or alternative workflows (that is business continuity.)

      Many of these solutions will depend on the the solutions and responses to other DORA requirements.

       

      dora

      Decide if You Are Ready for SAFe

      • Buy Link or Shortcode: {j2store}355|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Complex application landscapes require delivery teams to work together and coordinate changes across multiple product lines and releases.
      • Leadership wants to balance strategic goals with localized prioritization of changes.
      • Traditional methodologies are not well suited to support enterprise agility: Scrum doesn’t scale easily, and Waterfall is too slow and risky.

      Our Advice

      Critical Insight

      SAFe’s popularity is largely due to its structural resemblance to enterprise portfolio and project planning with top-down prioritization and decision making. This directly conflicts with Agile’s purpose and principles of empowerment and agility.

      • Poor culture, processes, governance, and leadership will disrupt any methodology. Many drivers for SAFe could be solved by improving and standardizing development and release management within current methodologies.
      • Few organizations are capable or should be applying a pure SAFe framework. Successful organizations have adopted and modified SAFe frameworks to best fit their needs, teams, value streams, and maturity.

      Impact and Result

      • Start with a clear understanding of your needs, constraints, goals, and culture.
        • Start with an Agile readiness assessment. Agile is core to value realization.
        • Take the time to determine your drivers and goals.
        • If SAFe is right for you, selecting the right implementation partner is key.
      • Plan SAFe as a long-term enterprise cultural transformation requiring changes at all levels.

      Decide if You Are Ready for SAFe Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Decide if You Are Ready for SAFe Storyboard – Research to help you understand where SAFe fits into delivery methodologies and determine if SAFe is right for your organization.

      This deck will guide you to define your primary drivers for SAFe, assess your Agile readiness, define enablers and blockers, estimate implementation risk, and start your SAFe implementation plan.

      • Decide if You Are Ready for SAFe Storyboard

      2. Scaled Agile Readiness Assessment – A tool to conduct an Agile readiness survey.

      Start your journey with a clear understanding about the level of Agile and product maturity throughout the organization. Each area that lacks strength should be evaluated further and added to your journey map.

      • Scaled Agile Readiness Assessment

      3. SAFe Transformation Playbook – A template to build a change management plan to guide your transition.

      Define clear ownership for every critical step.

      • SAFe Transformation Playbook
      [infographic]

      Workshop: Decide if You Are Ready for SAFe

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand where SAFe fits into delivery methodologies and SDLCs

      The Purpose

      Understand what is driving your proposed SAFe transformation and if it is the right framework for your organization.

      Key Benefits Achieved

      Better understanding of your scaled agile needs and drivers

      Activities

      1.1 Define your primary drivers for SAFe.

      1.2 Create your own list of pros and cons of SAFe.

      Outputs

      List of primary drivers for SAFe

      List of pros and cons of SAFe

      2 Determine if you are ready for SAFe

      The Purpose

      Identify factors influencing a SAFe implementation and ensure teams are aware and prepared.

      Key Benefits Achieved

      Starting understanding of your organization’s readiness to implement a SAFe framework

      Activities

      2.1 Assess your Agile readiness.

      2.2 Define enablers and blockers of scaling Agile delivery.

      2.3 Estimate your SAFe implementation risk.

      2.4 Start your SAFe implementation plan.

      Outputs

      Agile readiness assessment results

      List of enablers and blockers of scaling Agile delivery

      Estimated SAFe implementation risk

      High-level SAFe implementation plan template

      Further reading

      Decide if You Are Ready for SAFe

      Approach the Scaled Agile Framework (SAFe) with open eyes and an open wallet.

      Analyst Perspective

      Ensure that SAFe is the right move before committing.

      Waterfall is dead. Or obsolete at the very least.

      Organizations cannot wait months or years for product, service, application, and process changes. They need to embrace business agility to respond to opportunities more quickly and deliver value sooner. Agile established values and principles that have promoted smaller cycle times, greater connections between teams, improved return on investment (ROI) prioritization, and improved team empowerment.

      Where organizations continue to struggle is matching localized Scrum teams with enterprise initiatives. This struggle is compounded by legacy executive planning cycles, which undermine Agile team authority. SAFe has provided a series of frameworks to help organizations deal with these issues. It combines enterprise planning and alignment with cross-team collaboration.

      Don't rely on popularity or marketing to make your scaled Agile decision. SAFe is a highly disruptive transformation, and it requires extensive training, coaching, process changes, and time to implement. Without the culture shift to an Agile mindset at all levels, SAFe becomes a mirror of Waterfall processes dressed in SAFe names. Furthermore, SAFe itself will not fix problems with communication, requirements, development, testing, release, support, or governance. You will still need to fix these problems within the SAFe framework to be successful.

      Hans Eckman, Principal Research Director, Applications Delivery and Management

      Hans Eckman
      Principal Research Director, Applications Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge Common Obstacles Info-Tech's Approach
      • Complex application landscapes require delivery teams to work together and coordinate changes across multiple product lines and releases.
      • Leadership wants to maintain executive strategic planning with faster delivery of changes.
      • Traditional methodologies are not well suited to support enterprise agility.
        • Waterfall is too slow, inefficient, and full of accumulated risk.
        • Scrum is not easy to scale and requires behavioral changes.
      • Enterprise transformations are never fast or easy, and SAFe is positioned as a complete replacement of your delivery practices.
      • Teams struggle with SAFe's rigid framework, interconnected methodologies, and new terms.
      • Few organizations are successful at implementing a pure SAFe framework.
      • Organizations without scaled product families have difficulties organizing SAFe teams into proper value streams.
      • Team staffing and stability are hard to resolve.
      Start with a clear understanding of your needs, constraints, goals, and culture.
      • Developing an Agile mindset is core to value realization. Start with Info-Tech's Agile Readiness Assessment.
      • Take the time to identify your drivers and goals.
      • If SAFe is right for you, build a transformation plan and select the right implementation partner.
      Plan SAFe as a long-term enterprise cultural transformation, requiring changes at all levels.

      Info-Tech Insight
      SAFe is a highly disruptive enterprise transformation, and it won't solve your organizational delivery challenges by itself. Start with an open mind, and understand what is needed to support a multi-year cultural transition. Decide how far and how fast you are willing to transform, and make sure that you have the right transformation and coaching partner in place. There is no right software development lifecycle (SDLC) or methodology. Find or create the methodology that best aligns to your needs and goals.

      Agile's Four Core Values

      "...while there is value in the items on the right, we value the items on the left more."
      - The Agile Manifesto

      STOP! If you're not Agile, don't start with SAFe.

      Agile over SAFe

      Successful SAFe requires an Agile mindset at all levels.

      Be aware of common myths around Agile and SAFe

      SAFe does not...

      1...solve development and communication issues.

      2...ensure that you will finish requirements faster.

      3...mean that you do not need planning and documentation.

      "Without proper planning, organizations can start throwing more resources at the work, which spirals into the classic Waterfall issues of managing by schedule."
      – Kristen Morton, Associate Implementation Architect,
      OneShield Inc. (Info-Tech Interview)

      Info-Tech Insight
      Poor culture, processes, governance, and leadership will disrupt any methodology. Many drivers for SAFe could be solved by improving and standardizing development and release management within current methodologies.

      Review the drivers that are motivating your organization to adopt and scale Agile practices

      Functional groups have their own drivers to adopt Agile development processes, practices, and techniques (e.g. to improve collaboration, decrease churn, or increase automation). Their buy-in to scaling Agile is just as important as the buy-in of stakeholders.

      If a group's specific needs and drivers are not addressed, its members may develop negative sentiments toward Agile development. These negative sentiments can affect their ability to see the benefits of Agile, and they may return to their old habits once the opportunity arises.

      It is important to find opportunities in which both business objectives and functional group drivers can be achieved by scaling Agile development. This can motivate teams to continuously improve and adhere to the new environment, and it will maintain business buy-in. It can also be used to justify activities that specifically address functional group drivers.

      Examples of Motivating Drivers for Scaling Agile

      • Improve artifact handoffs between development and operations.
      • Increase collaboration among development teams.
      • Reveal architectural and system risks early.
      • Expedite the feedback loop from support.
      • Improve capacity management.
      • Support development process innovation.
      • Create a safe environment to discuss concerns.
      • Optimize value streams.
      • Increase team engagement and comradery.

      Don't start with scaled Agile!

      Scaling Agile is a way to optimize product management and product delivery in application lifecycle management practices. Do not try to start with SAFe when the components are not yet in place.

      Scaled Agile


      Thought model describing how Agile connects Product Management to Product Delivery to elevate the entire Solution Lifecycle.

      Scale Agile delivery to improve cross-functional dependencies and releases

      Top Business Concerns When Scaling Agile

      1 Organizational Culture: The current culture may not support team empowerment, learning from failure, and other Agile principles. SAFe also allows top-down decisions to persist.

      2 Executive Support: Executives may not dedicate resources, time, and effort into removing obstacles to scaling Agile because of lack of business buy-in.

      3 Team Coordination: Current collaboration structures may not enable teams and stakeholders to share information freely and integrate workflows easily.

      4 Business Misalignment: Business vision and objectives may be miscommunicated early in development, risking poorly planned and designed initiatives and low-quality products.

      Extending collaboration is the key to success.

      Uniting stakeholders and development into a single body is the key to success. Assess the internal and external communication flow and define processes for planning and tracking work so that everyone is aware of how to integrate, communicate, and collaborate.

      The goal is to enable faster reaction to customer needs, shorter release cycles, and improved visibility of the project's progress with cross-functional and diverse conversations.

      Advantages of successful SAFe implementations

      Once SAFe is complete and operational, organizations have seen measurable benefits:

      • Multiple frameworks to support different levels of SAFe usage
      • Deliberate and consistent planning and coordination
      • Coordinating dependencies within value streams
      • Reduced time to delivery
      • Focus on customers and end users
      • Alignment to business goals and value streams
      • Increased employee engagement

      Sources: TechBeacon, 2019; Medium, 2020; "Benefits," Scaled Agile, 2023;
      "Pros and Cons," PremierAgile, n.d.; "Scaling Agile Challenges," PremierAgile, n.d.

      Advantages of successful SAFe implementations

      Source: "Benefits," Scaled Agile, 2023

      Recognize the difference between Scrum teams and the Scaled Agile Framework (SAFe)

      SAFe provides a framework that aligns Scrum teams into coordinated release trains driven by top-down prioritization.

      Scrum vs SAFe

      Develop Your Agile Approach for a Successful Transformation

      Source: Scaled Agile, Inc.

      Info-Tech's IT Management & Governance Framework

      Info-Tech's IT Management & Governance Framework

      Info-Tech Insight
      SAFe is an enterprise, culture, and process transformation that impacts all IT services. Some areas of Info-Tech's IT Management & Governance Framework have higher impacts and require special attention. Plan to include transformation support for each of these topics during your SAFe implementation. SAFe will not fix broken processes on its own.

      Without adopting an Agile mindset, SAFe becomes Waterfall with SAFe terminology

      Waterfall with SAFe terminology

      Source: Scaled Agile, Inc.

      Info-Tech Insight
      When first implementing SAFe, organizations reproduce their organizational design and Waterfall delivery structures with SAFe terms:

      • Delivery Manager = Release Train Engineer
      • Stakeholder/Sponsor = Product Manager
      • Release = Release Train
      • Project/Program = Project or Portfolio

      SAFe isn't without risks or challenges

      Risks and Causes of Failed SAFe Transformations

      • SAFe conflicts with legacy cultures and delivery processes.
      • SAFe promotes continued top-down decisions, undermining team empowerment.
      • Scaled product families are required to define proper value streams.
      • Team empowerment and autonomy are reduced.
      • SAFe activities are poorly executed.
      • There are high training and coaching costs.
      • Implementation takes a long time.
      • End-to-end delivery management tools aligned to SAFe are required.
      • Legacy delivery challenges are not specifically solved with SAFe.
      • SAFe is designed to work for large-scale development teams.

      Challenges

      • Adjusting to a new set of terms for common roles, processes, and activities
      • Executing planning cycles
      • Defining features and epics at the right level
      • Completing adequate requirements
      • Defining value streams
      • Coordinating releases and release trains
      • Providing consistent quality

      Sources: TechBeacon, 2019; Medium, 2020; "Benefits," Scaled Agile, 2023;
      "Pros and Cons," PremierAgile, n.d.; "Scaling Agile Challenges," PremierAgile, n.d.

      Focus on your core competencies instead

      Before undertaking an enterprise transformation, consider improving the underlying processes that will need to be fixed anyway. Fixing these areas while implementing SAFe compounds the effort and disruption.

      Product Delivery

      Product Management

      "But big-bang transitions are hard. They require total leadership commitment, a receptive culture, enough talented and experienced agile practitioners to staff hundreds of teams without depleting other capabilities, and highly prescriptive instruction manuals to align everyone's approach."
      – "Agile at Scale," Harvard Business Review

      Insight Summary

      Overarching insight
      SAFe is a highly disruptive enterprise transformation, and it will not solve your organizational delivery challenges by itself. Start with an open mind, and understand what is needed to support a multi-year cultural transition. Decide how far and fast you are willing to transform and make sure that you have the right transformation and coaching partner in place.

      SAFe conflicts with core Agile principles.
      The popularity of SAFe is largely due to its structural resemblance to enterprise portfolio and project planning with top-down prioritization and decision-making. This directly conflicts with Agile's purpose and principles of empowerment and agility.

      SAFe and Agile will not solve enterprise delivery challenges.
      Poor culture, processes, governance, and leadership will disrupt any methodology. Many issues with drivers for SAFe could be solved by improving development and release management within current methodologies.

      Most organizations should not be using a pure SAFe framework
      Few organizations are capable of, or should be, applying a pure SAFe framework. Successful organizations have adopted and modified SAFe frameworks to best fit their needs, teams, value streams, and maturity.

      Without an Agile mindset, SAFe will be executed as Waterfall stages using SAFe terminology.
      Groups that "Do Agile" are not likely to embrace the behavioral changes needed to make any scaled framework effective. SAFe becomes a series of Waterfall PIs using SAFe terminology.

      Your transformation does not start with SAFe.
      Start your transition to scaled Agile with a maturity assessment for current delivery practices. Fixing broken process, tools, and teams must be at the heart of your initiative.

      Blueprint Deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Key Deliverable

      SAFe Transformation Playbook

      Build a transformation and organizational change management plan to guide your transition. Define clear ownership for every critical step.

      Scaled Agile Readiness Assessment

      Conduct the Agile readiness survey. Without an Agile mindset, SAFe will follow Waterfall or WaterScrumFall practices.

      Case Study

      Spotify's approach to Agile at scale

      INDUSTRY: Digital Media
      SOURCE: Unified Communications and Collaborations

      Spotify's Scaling Agile Initiative

      With rapid user adoption growth (over 15 million active users in under six years), Spotify had to find a way to maintain an Agile mindset across 30+ teams in three different cities, while maintaining the benefits of cross-functional collaboration and flexibility for future growth.

      Spotify's Approach

      Spotify found a fit-for-purpose way for the organization to increase team autonomy without losing the benefits of cross-team communication from economics of scale. Spotify focused on identifying dependencies that block or slow down work through a mix of reprioritization, reorganization, architectural changes, and technical solutions. The organization embraced dependencies that led to cross-team communication and built in the necessary flexibility to allow Agile to grow with the organization.

      Spotify's scaling Agile initiative used interview processes to identify what each team depended on and how those dependencies blocked or slowed the team.

      Squad refers to an autonomous Agile release team in this case study.

      Case Study

      Suncorp instilled dedicated communication streams to ensure cross-role collaboration and culture.

      INDUSTRY: Insurance
      SOURCE: Agile India, International Conference on Agile and Lean Software Development, 2014

      Challenge Solution Results
      • Suncorp Group wanted to improve delivery and minimize risk. Suncorp realized that it needed to change its project delivery process to optimize business value delivery.
      • With five core business units, over 15,000 employees, and US$96 billion in assets, Suncorp had to face a broad set of project coordination challenges.
      • Suncorp decided to deliver all IT projects using Agile.
      • Suncorp created a change program consisting of five main streams of work, three of which dealt with the challenges specific to Agile culture:
        • People: building culture, leadership, and support
        • Communication: ensuring regular employee collaboration
        • Capabilities: blending training and coaching
      • Sponsorship from management and champions to advocate Agile were key to ensure that everyone was unified in a common purpose.
      • Having a dedicated communication stream was vital to ensure regular sharing of success and failure to enable learning.
      • Having a structured, standard approach to execute the planned culture change was integral to success.

      Case Study

      Nationwide embraces DevOps and improves software quality.

      INDUSTRY: Insurance
      SOURCE: Agile India, International Conference on Agile and Lean Software Development, 2014

      Challenge Solution Results
      • In the past, Nationwide primarily followed a Waterfall development process. However, this method created conflicts between IT and business needs.
      • The organization began transitioning from Waterfall to Agile development. It has seen early successes with Agile: decrease in defects per release and more success in meeting delivery times.
      • Nationwide needed to respond more efficiently to changing market requirements and regulations and to increase speed to market.
      • Nationwide decided to take a DevOps approach to application development and delivery.
      • IT wanted to perform continuous integration and deployment in its environments.
      • Cross-functional teams were organically created, made up of members from the business and multiple IT groups, including development and operations.
      • DevOps allowed Nationwide to be more Agile and more responsive to its customers.
      • Teams were able to perform acceptance testing with their customers in parallel with development. This allowed immediate feedback to help steer the project in the right direction.
      • DevOps improved code quality by 50% over a three-year period and reduced user downtime by 70%.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit Guided Implementation Workshop Consulting
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1

      Call #1:

      Scope your requirements, objectives, and specific challenges.

      Call #2:

      1.1.1 Define your primary drivers for SAFe.

      1.1.2 Create your own list of pros and cons of SAFe.

      Call #3:

      1.2.1 Assess your Agile readiness.

      1.2.2 Define enablers and blockers for scaling Agile delivery.

      1.2.3 Estimate your SAFe implementation risk.

      Call #4:

      1.2.4 Start your SAFe implementation plan.

      Summarize your results and plan your next steps.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is one to four calls over the course of one to six weeks.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Pre-Planning Step 1.1 Step 1.2
      Identify your stakeholders. Step 1.1 Understand where SAFe fits into your delivery methodologies and SDLCs. Step 1.2 Determine if you are ready for SAFe.
      Activities 1. Determine stakeholders and subject matter experts.
      2. Coordinate timing and participation.
      3. Set goals and expectations for the workshop.
      1.1.1 Define your primary drivers for SAFe.
      1.1.2 Create your own list of pros and cons of SAFe
      1.2.1 Assess your Agile readiness.
      1.2.2 Define enablers and blockers for scaling Agile delivery.
      1.2.3 Estimate your SAFe implementation risk.
      1.2.4 Start your SAFe implementation plan.
      Deliverables
    • Workshop schedule
    • Participant commitment
      • List of primary drivers for SAFe
      • List of pros and cons of SAFe
      • Agile Readiness Assessment results
      • List of enablers and blockers for scaling Agile delivery
      • Estimated SAFe implementation risk
      • Template for high-level SAFe implementation plan

      Supporting Your Agile Journey

      Enable Product Agile Delivery Executive Workshop Develop Your Agile Approach Spread Best Practices with an Agile Center of Excellence Implement DevOps Practices That Work Enable Organization-Wide Collaboration by Scaling Agile
      Number One Number two Number Three Number Four Number Five

      Align and prepare your IT leadership teams.

      Audience: Senior and IT delivery leadership

      Size: 8-16 people

      Time: 7 hours

      Tune Agile team practices to fit your organization culture.

      Audience: Agile pilot teams and subject matter experts (SMEs)

      Size: 10-20 people

      Time: 4 days

      Leverage Agile thought leadership to expand your best practices.

      Audience: Agile SMEs and thought leaders

      Size: 10-20 people

      Time: 4 days

      Build a continuous integration and continuous delivery pipeline.

      Audience: Product owners (POs) and delivery team leads

      Size: 10-20 people

      Time: 4 days

      Execute a disciplined approach to rolling out Agile methods.

      Audience: Agile steering team and SMEs

      Size: 3-8 people

      Time: 3 hours

      Repeat Legend

      Sample agendas are included in the following sections for each of these topics.

      Your Product Transformation Journey

      1. Make the Case for Product Delivery2. Enable Product Delivery - Executive Workshop3. Deliver on Your Digital Product Vision4. Deliver Digital Products at Scale5. Mature and Scale Product Ownership
      Align your organization with the practices to deliver what matters most.Participate in a one-day executive workshop to help you align and prepare your leadership.Enhance product backlogs, roadmapping, and strategic alignment.Scale product families to align with your organization's goals.Align and mature your product owners.

      Audience: Senior executives and IT leadership

      Size: 8-16 people

      Time: 6 hours

      Repeat Symbol

      Audience: Product owners/managers

      Size: 10-20 people

      Time: 3-4 days

      Repeat Symbol

      Audience: Product owners/managers

      Size: 10-20 people

      Time: 3-4 days

      Audience: Product owners/managers

      Size: 8-16 people

      Time: 2-4 days

      Repeat Symbol

      Repeat Legend

      Phase 1

      Determine if SAFe Is Right for Your Organization

      Phase 1
      1.1 Understand where SAFe fits into your delivery methodologies and SDLCs
      1.2 Determine if you are ready for SAFe (fit for purpose)

      This phase will walk you through the following activities:

      • 1.1.1 Define your primary drivers for SAFe.
      • 1.1.2 Create your own list of pros and cons of SAFe.
      • 1.2.1 Assess your Agile readiness.
      • 1.2.2 Define enablers and blockers for scaling Agile delivery.
      • 1.2.3 Estimate your SAFe implementation risk.
      • 1.2.4 Start your SAFe implementation plan.

      This phase involves the following participants:

      • Senior leadership
      • IT leadership
      • Project Management Office
      • Delivery managers
      • Product managers/owners
      • Agile thought leaders and coaches
      • Compliance teams leads

      Step 1.1

      Understand where SAFe fits into your delivery methodologies and SDLCs

      Activities
      1.1.1 Define your primary drivers for SAFe
      1.1.2 Create your own list of pros and cons of SAFe

      This step involves the following participants:

      • IT leadership
      • Delivery managers
      • Project management office
      • Product owners and managers
      • Development team leads
      • Portfolio managers
      • Architects

      Outcomes of this step:

      • List of primary drivers for SAFe
      • List of pros and cons of SAFe

      Agile's Four Core Values

      "...while there is value in the items on the right, we value the items on the left more."
      – The Agile Manifesto

      STOP! If you're not Agile, don't start with SAFe.

      Agile's Four Core Values

      Successful SAFe requires an Agile mindset at all levels.

      Be aware of common myths around Agile and SAFe

      SAFe does not...

      1...solve development and communication issues.

      2...ensure that you will finish requirements faster.

      3...mean that you do not need planning and documentation.

      "Without proper planning, organizations can start throwing more resources at the work, which spirals into the classic Waterfall issues of managing by schedule."
      – Kristen Morton, Associate Implementation Architect,
      OneShield Inc. (Info-Tech Interview)

      Info-Tech Insight
      SAFe only provides a framework and steps where these issues can be resolved.

      The importance of values and principles

      Modern development practices (such as Agile, Lean, and DevOps) are based on values and principles. This supports the move away from command-and-control management to self-organizing teams.

      Values

      • Values represent your team's core beliefs and capture what you want to instill in your team.

      Principles

      • Principles represent methods for solving a problem or deciding.
      • Given that principles are rooted in specifics, they can change more frequently because they are both fallible and conducive to learning.

      Consider the guiding principles of your application team

      Teams may have their own perspectives on how they deliver value and their own practices for how they do this. These perspectives can help you develop guiding principles for your own team to explain your core values and cement your team's culture. Guiding principles can help you:

      • Enable the appropriate environment to foster collaboration within current organizational, departmental, and cultural constraints
      • Foster the social needs that will engage and motivate your team in a culture that suits its members
      • Ensure that all teams are driven toward the same business and team goals, even if other teams are operating differently
      • Build organizational camaraderie aligned with corporate strategies

      Info-Tech Insight
      Following methodologies by the book can be detrimental if they do not fit your organization's needs, constraints, and culture. The ultimate goal of all teams is to deliver value. Any practices or activities that drive teams away from this goal should be removed or modified.

      Review the drivers that are motivating your organization to adopt and scale Agile practices

      Functional groups have their own drivers to adopt Agile development processes, practices, and techniques (e.g. to improve collaboration, decrease churn, or increase automation). Their buy-in to scaling Agile is just as important as the buy-in of stakeholders.

      By not addressing a group's specific needs and drivers, the resulting negative sentiments of its members toward Agile development can affect their ability to see the benefits of Agile and they may return to old habits once the opportunity arises.

      Find opportunities in which both business objectives and functional group drivers can be achieved with scaling Agile development. This alignment can motivate teams to continuously improve and adhere to the new environment, and it will maintain business buy-in. This assessment can also be used to justify activities that specifically address functional group drivers.

      Examples of Motivating Drivers for Scaling Agile

      • Improve artifact hand-offs between development and operations.
      • Increase collaboration among development teams.
      • Reveal architectural and system risks early.
      • Expedite the feedback loop from support.
      • Improve capacity management.
      • Support development process innovation.
      • Create a safe environment to discuss concerns.
      • Optimize value streams.
      • Increase team engagement and comradery.

      Exercise 1.1.1 Define your primary drivers for SAFe

      30 minutes

      • Brainstorm a list of drivers for scaling Agile.
      • Build a value canvas to help capture and align team expectations.
      • Identify jobs or functions that will be impacted by SAFe.
      • List your current pains and gains.
      • List the pain relievers and gain creators.
      • Identify the deliverable needed for a successful transformation.
      • Complete your SAFe value canvas in your SAFe Transformation Playbook.

      Enter the results in your SAFe Transformation Playbook.

      Input
      • Organizational understanding
      • Existing Agile delivery strategic plans
      Output
      • IT leadership
      • Delivery managers
      • Project management office
      • Product owners and managers
      • Development team leads
      • Portfolio managers
      • Architects

      SAFe Value Canvas Template

      SAFe Value Canvas Template

      Case Study

      A public utilities organization steadily lost stakeholder engagement, diminishing product quality.

      INDUSTRY: Public Utilities
      SOURCE: Info-Tech Expert Interview

      Challenge

      • The goal of a public utilities organization was to adopt Agile so it could quickly respond to changes and trim costs.
      • The organization decided to scale Agile using a structured approach. It began implementation with IT teams that were familiar with Agile principles and leveraged IT seniors as Agile champions. To ensure that Agile principles were widespread, the organization decided to develop a training program with vendor assistance.
      • As Agile successes began to be seen, the organization decided to increase the involvement of business teams gradually so it could organically grow the concept within the business.

      Results

      • Teams saw significant success with many projects because they could easily demonstrate deliverables and clearly show the business value. Over time, the teams used Agile for large projects with complex processing needs.
      • Teams continued to deliver small projects successfully, but business engagement waned over time. Some of the large, complex applications they delivered using Agile lacked the necessary functionality and appropriate controls and, in some cases, did not have the ability to scale due to a poor architectural framework. These applications required additional investment, which far exceeded the original cost forecasts.

      While Agile and product development are intertwined, they are not the same!

      Delivering products does not necessarily require an Agile mindset. However, Agile methods help to facilitate the journey because product thinking is baked into them.

      Agile and product development are intertwined

      Recognize the difference between Scrum teams and the Scaled Agile Framework (SAFe)

      SAFe provides a framework that aligns Scrum teams into coordinated release trains driven by top-down prioritization.

      Difference between Scrum and SAFe

      Develop Your Agile Approach for a Successful Transformation

      Without adopting an Agile mindset, SAFe becomes Waterfall with SAFe terminology

      Waterfall with SAFe terminology

      Info-Tech Insight
      When first implementing SAFe, organizations reproduce their organizational design and Waterfall delivery structures with SAFe terms:

      • Delivery Manager = Release Train Engineer
      • Stakeholder/Sponsor = Product Manager
      • Release = Release Train
      • Project/Program = Project or Portfolio

      Advantages of successful SAFe implementations

      Once SAFe is complete and operational, organizations have seen measurable benefits:

      • Multiple frameworks to support different levels of SAFe usage
      • Deliberate and consistent planning and coordination
      • Coordinating dependencies within value streams
      • Reduced time to delivery
      • Focus on customers and end users
      • Alignment to business goals and value streams
      • Increased employee engagement

      Sources: TechBeacon, 2019; Medium, 2020; "Benefits," Scaled Agile, 2023;
      "Pros and Cons," PremierAgile, n.d.; "Scaling Agile Challenges," PremierAgile, n.d.

      Advantages of successful SAFe implementations

      Source: "Benefits," Scaled Agile, 2023

      SAFe isn't without risks or challenges

      Risks and Causes of Failed SAFe Transformations

      • SAFe conflicts with legacy cultures and delivery processes.
      • SAFe promotes continued top-down decisions, undermining team empowerment.
      • Scaled product families are required to define proper value streams.
      • Team empowerment and autonomy are reduced.
      • SAFe activities are poorly executed.
      • There are high training and coaching costs.
      • Implementation takes a long time.
      • End-to-end delivery management tools aligned to SAFe are required.
      • Legacy delivery challenges are not specifically solved with SAFe.
      • SAFe is designed to work for large-scale development teams.

      Challenges

      • Adjusting to a new set of terms for common roles, processes, and activities
      • Executing planning cycles
      • Defining features and epics at the right level
      • Completing adequate requirements
      • Defining value streams
      • Coordinating releases and release trains
      • Providing consistent quality

      Sources: TechBeacon, 2019; Medium, 2020; "Benefits," Scaled Agile, 2023; "Pros and Cons," PremierAgile, n.d.; "Scaling Agile Challenges," PremierAgile, n.d.

      Exercise 1.1.2 Create your own list of the pros and cons of SAFe

      1 hour

      Pros Cons

      Enter the results in your SAFe Transformation Playbook

      Input
      • Organizational drivers
      • Analysis of SAFe
      • Estimate of fit for purpose
      Output
      • IT leadership
      • Delivery managers
      • Project management office
      • Product owners and managers
      • Development team leads
      • Portfolio managers
      • Architects

      Focus on your core competencies instead

      Before undertaking an enterprise transformation, consider improving the underlying processes that will need to be fixed anyway. Fixing these areas while implementing SAFe compounds the effort and disruption.

      Product Delivery

      Product Management

      "But big-bang transitions are hard. They require total leadership commitment, a receptive culture, enough talented and experienced agile practitioners to staff hundreds of teams without depleting other capabilities, and highly prescriptive instruction manuals to align everyone's approach."
      - "Agile at Scale," Harvard Business Review

      Step 1.2

      Determine if you are ready for SAFe (fit for purpose)

      Activities
      1.2.1 Assess your Agile readiness
      1.2.2 Define enablers and blockers for scaling Agile delivery
      1.2.3 Estimate your SAFe implementation risk
      1.2.4 Start your SAFe implementation plan

      This step involves the following participants:

      • IT leadership
      • Delivery managers
      • Project management office
      • Product owners and managers
      • Development team leads
      • Portfolio managers
      • Architects

      Outcomes of this step:

      • Agile Readiness Assessment results
      • Enablers and blockers for scaling Agile
      • SAFe implementation risk
      • SAFe implementation plan

      Use CLAIM to guide your Agile journey

      Use CLAIM to guide your Agile journey

      Conduct the Agile Readiness Assessment Survey

      Without an Agile mindset, SAFe will follow Waterfall or WaterScrumFall practices.

      • Start your journey with a clear understanding of the level of Agile and product maturity throughout your organization.
      • Each area that lacks strength should be evaluated further and added to your journey map.

      Chart of Agile Readiness

      Exercise 1.2.1 Assess your Agile readiness

      1 hour

      • Open and complete the Agile Readiness Assessment in your playbook or the Excel tool provided.
      • Discuss each area's high and low scores to reach a consensus.
      • Record your results in your SAFe Transformation Playbook.

      Chart of Agile Readiness

      Enter the results in Scaled Agile Readiness Assessment.

      Input
      • Organizational knowledge
      • Agile Readiness Assessment
      Output
      • IT leadership
      • Delivery managers
      • Project Management Office
      • Product owners and managers
      • Development team leads
      • Portfolio managers
      • Architects

      Exercise 1.2.2 Define enablers and blockers for scaling Agile delivery

      1 hour

      • Identify and mitigate blockers for scaling Agile in your organization.
        • Identify enablers who will support successful SAFe transformation.
        • Identify blockers who will make the transition to SAFe more difficult.
        • For each blocker, define at least one mitigating step.
      Enablers Blockers Mitigation

      Enter the results in your SAFe Transformation Playbook

      Input
      • Agile Readiness Assessment
      • Organizational knowledge
      Output
      • IT leadership
      • Delivery managers
      • Project management office
      • Product owners and managers
      • Development team leads
      • Portfolio managers
      • Architects

      Estimate your SAFe implementation risk

      Poor Fit High Risk Scaling Potential
      Team size <50 >150 or non-dedicated 50-150 dedicated
      Agile maturity Waterfall and project delivery Individual Scrum DevOps teams Scrum DevOps teams coordinating dependencies
      Product management maturity Project-driver changes from stakeholders Proxy product owners within delivery teams Defined product families and products
      Strategic goals Localized decisions Enterprise goals implemented at the app level Translation and refinement of enterprise goals through product families
      Enterprise architecture Siloed architecture standards Common architectures Future enterprise architecture and employee review board (ERB) reviews
      Release management Independent release schedules Formal release calendar Continuous integration/development (CI/CD) with organizational change management (OCM) scheduled cross-functional releases
      Requirements management and quality assurance Project based Partial requirements and test case coverage Requirements as an asset and test automation

      Exercise 1.2.3 Estimate your SAFe implementation risk

      30 minutes

      • Determine which description best matches your overall organizational state.
      • Enter the results in your SAFe Transformation Playbook.
      • Change the text to bold in the cell you selected to describe your current state and/or add a border around the cell.

      Chart of SAFe implementation risk

      Enter the results in SAFe Transformation Playbook.

      Input
      • Agile Readiness Assessment
      • Organizational knowledge
      Output
      • IT leadership
      • Delivery managers
      • Project management office
      • Product owners and managers
      • Development team leads
      • Portfolio managers
      • Architects

      Interpret your SAFe implementation risks

      Analyze your highlighted selections and patterns in the rows and columns. Use these factors to inform your SAFe implementation steps and timing.

      Interpret your SAFe implementation risks

      Build your implementation plan

      Build a transformation and organizational change management plan to guide your transition. Define clear ownership for every critical step.

      Plan your transformation.

      • Align stakeholders and thought leaders.
      • Select an implementation partner.
      • Insert critical steps.

      Build your SAFe framework.

      • Define your target SAFe framework.
      • Customize your SAFe framework.
      • Establish SAFe governance and reporting.
      • Insert critical steps.

      Implement SAFe practices.

      • Define product families and value streams.
      • Conduct SAFe training for:
        • Executive leadership
        • Agile SAFe coaches
        • Practitioners
      • Insert critical steps.

      For additional help with OCM, please download Master Organizational Change Management Practices.

      Exercise 1.2.4 Start your SAFe implementation plan

      30 minutes

      • Using the high-level SAFE implementation framework, begin building out the critical steps.
      • Record the results in your SAFe Transformation Playbook.
      • Your playbook is an evergreen document to help guide your implementation. It should be reviewed often.

      SAFe implementation plan

      Enter the results in your SAFe Transformation Playbook

      Input
      • SAFe readiness assessment
      • Enablers and blockers
      • Drivers for SAFe
      Output
      • IT leadership
      • Delivery managers
      • Project management office
      • Product owners and managers
      • Development team leads
      • Portfolio managers
      • Architects

      Select an implementation partner

      Finding the right SAFe implementation partner is critical to your transformation success.

      • Using your previous assessment, align internal and external resources to support your transformation.
      • Select a partner who has experience in similar organizations and is aligned with your delivery goals.
      • Plan to transition support to internal teams when SAFe practices have stabilized and moved into continuous improvement.
      • Augment your transformation partner with internal coaches.
      • Plan for a multiyear engagement before SAFe benefits are realized.

      Summary of Accomplishments

      Your journey begins.

      Implementing SAFe is a long, expensive, and difficult process. For some organizations, SAFe provides the balance of leadership-driven prioritization and control with shorter release cycles and time to value. The key is making sure that SAFe is right for you and you are ready for SAFe. Few organizations fit perfectly into one of the SAFe frameworks. Instead, consider fine-tuning and customizing SAFe to meet your needs and gradual transformation.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.
      workshops@infotech.com
      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.

      Below are sample activities that will be conducted by Info-Tech analysts with your team:

      Scaled Agile Delivery Readiness Assessment
      This assessment will help identify enablers and blockers in your organizational culture using our CLAIM+G organization transformation model.

      SAFE Value Canvas
      Use a value campus to define jobs, pains, gains, pain relievers, gain creators, and needed deliverables to help inform and guide your SAFe transformation.

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Bibliography

      "6 Biggest SAFe Agile Implementation Mistakes to Avoid." Triumph Strategic Consulting, 27 July 2017.

      "The 7 Must-Haves for Achieving Scaling Agile Success." The 7 Must-Haves for Achieving Scaling Agile Success.

      Ageling, Willem-Jan. "11 Most Common Reasons to Use Scaled Agile Framework (SAFE) and How to Do This With Unscaled Scrum." Medium, Serious Scrum, 26 Jan. 2020.

      Agile India, International Conference on Agile and Lean Software Development, 2014.

      "Air France - KLM - Agile Adoption with SAFe." Scaled Agile, 28 Nov. 2022.

      "Application Development Trends 2019 - Global Survey Report." OutSystems.

      "Benefits of SAFe: How It Benefits Organizations." Scaled Agile, 13 Mar. 2023.

      Berkowitz, Emma. "The Cost of a SAFe(r) Implementation: CPRIME Blog." Cprime, 30 Jan. 2023.

      "Chevron - Adopting SAFe with Remote Workforce." Scaled Agile, 28 Nov. 2022.

      "Cisco It - Adopting Agile Development with SAFe." Scaled Agile, 13 Sept. 2022.

      "CMS - Business Agility Transformation Using SAFe." Scaled Agile, 13 Sept. 2022.

      Crain, Anthony. "4 Biggest Challenges in Moving to Scaled Agile Framework (SAFe)." TechBeacon, 25 Jan. 2019.

      "The Essential Role of Communications ." Project Management Institute .

      Gardiner, Phil. "SAFe Implementation: 4 Tips for Getting Started." Applied Frameworks, 20 Jan. 2022.

      "How Do I Start Implementing SAFe?" Agility in Mind, 29 July 2022.

      "How to Masterfully Screw Up Your SAFe Implementation." Wibas Artikel-Bibliothek, 6 Sept. 2022.

      "Implementation Roadmap." Scaled Agile Framework, 14 Mar. 2023.

      Islam, Ayvi. "SAFe Implementation 101 - The Complete Guide for Your Company." //Seibert/Media, 22 Dec. 2020.

      "Johnson Controls - SAFe Implementation Case Study." Scaled Agile, 28 Nov. 2022.

      "The New Rules and Opportunities of Business Transformation." KPMG.

      "Nokia Software - SAFe Agile Transformation." Scaled Agile, 28 Nov. 2022.

      Pichler, Roman. "What Is Product Management?" Romanpichler, 2014.

      "Product Documentation." ServiceNow.

      "Pros and Cons of Scaled Agile Framework." PremierAgile.

      "Pulse of the Profession Beyond Agility." Project Management Institute.

      R, Ramki. "Pros and Cons of Scaled Agile Framework (SAFe)." Medium, 3 Mar. 2019.

      R, Ramki. "When Should You Consider Implementing SAFe (Scaled Agile Framework)?" Medium, Medium, 3 Mar. 2019.

      Rigby, Darrell, Jeff Sutherland, and Andy Noble. "Agile at Scale: How to go from a few teams to hundreds." Harvard Business Review, 2018.

      "SAFe Implementation Roadmap." Scaled Agile Framework, Scaled Agile, Inc., 14 Mar. 2023.

      "SAFe Partner Cprime: SAFe Implementation Roadmap: Scaled Agile." Cprime, 5 Apr. 2023.

      "SAFe: The Good, the Bad, and the Ugly." Project Management Institute.

      "Scaled Agile Framework." Wikipedia, Wikimedia Foundation, 29 Mar. 2023.

      "Scaling Agile Challenges and How to Overcome Them." PremierAgile.

      "SproutLoud - a Case Study of SAFe Agile Planning." Scaled Agile, 29 Nov. 2022.

      "Story." Scaled Agile Framework, 13 Apr. 2023.

      Sutherland , Jeff. "Scrum: How to Do Twice as Much in Half the Time." Tedxaix, YouTube, 7 July 2014.

      Venema, Marjan. "6 Scaled Agile Frameworks - Which One Is Right for You?" NimbleWork, 23 Dec. 2022.

      Warner, Rick. "Scaled Agile: What It Is and Why You Need It." High-Performance Low-Code for App Development, OutSystems, 25 Oct. 2019.

      Watts, Stephen, and Kirstie Magowan. "The Scaled Agile Framework (SAFE): What to Know and How to Start." BMC Blogs, 9 Sept. 2020.

      "What Is SAFe? The Scaled Agile Framework Explained." CIO, 9 Feb. 2021.

      "Why Agile Transformations Fail: Four Common Culprits." Planview.

      "Why You Should Use SAFe (and How to Find SAFe Training to Help)." Easy Agile.

      Y., H. "Story Points vs. 'Ideal Days.'" Cargo Cultism, 19 Aug. 2010.

      Bibliography

      Enable Organization-Wide Collaboration by Scaling Agile

      Ambler, Scott W. "Agile Architecture: Strategies for Scaling Agile Development." Agile Modeling, 2012.

      - - -. "Comparing Approaches to Budgeting and Estimating Software Development Projects." AmbySoft.

      - - -. "Agile and Large Teams." Dr. Dobb's, 17 Jun 2008.

      Ambler, Scott W. and Mark Lines. Disciplined Agile Delivery: A Practitioner's Guide to Agile Software Delivery in the Enterprise. IBM Press, 2012.

      Ambler, Scott W., and Mark Lines. "Scaling Agile Software Development: Disciplined Agility at Scale." Disciplined Agile Consortium White Paper Series, 2014.

      AmbySoft. "2014 Agile Adoption Survey Results." Scott W. Ambler + Associates, 2014.

      Bersin, Josh. "Time to Scrap Performance Appraisals?" Forbes Magazine, 5 June 2013. Accessed 30 Oct. 2013..

      Cheese, Peter, et al. " Creating an Agile Organization." Accenture, Oct. 2009. Accessed Nov. 2013..

      Croxon, Bruce, et al. "Dinner Series: Performance Management with Bruce Croxon from CBC's 'Dragon's Den.'" HRPA Toronto Chapter. Sheraton Hotel, Toronto, ON, 12 Nov. 2013. Panel discussion.

      Culbert, Samuel. "10 Reasons to Get Rid of Performance Reviews." Huffington Post Business, 18 Dec. 2012. Accessed 28 Oct. 2013.

      Denning, Steve. "The Case Against Agile: Ten Perennial Management Objections." Forbes Magazine, 17 Apr. 2012. Accessed Nov. 2013.

      Estis, Ryan. "Blowing up the Performance Review: Interview with Adobe's Donna Morris." Ryan Estis & Associates, 17 June 2013. Accessed Oct. 2013.

      Heikkila et al. "A Revelatory Case Study on Scaling Agile Release Planning." EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), 2010.

      Holler, Robert, and Ian Culling. "From Agile Pilot Project to Enterprise-Wide Deployment: Five Sure-Fire Ways To Fail When You Scale." VersionOne, 2010.

      Kniberg, Henrik, and Anders Ivarsson, "Scaling Agile @ Spotify," Unified Communications and Collaborations, 2012.

      Narayan, Sriram. "Agile IT Organization Design: For Digital Transformation and Continuous Delivery." Addison-Wesley Professional, 2015.

      Shrivastava, NK, and Phillip George. "Scaling Agile." RefineM, 2015.

      Sirkia, Rami, and Maarit Laanti. "Lean and Agile Financial Planning." Scaled Agile Framework Blog, 2014.

      Scaled Agile Framework (SAFe). "Agile Architecture." Scaled Agile Inc., 2015.

      VersionOne. 9th Annual: State of Agile Survey. VersionOne, LLC, 2015.

      Appendix A: Supporting Info-Tech Research

      Transformation topics and supporting research to make your journey easier, with less rework

      Supporting research and services

      Improving IT Alignment

      Build a Business-Aligned IT Strategy
      Success depends on IT initiatives clearly aligned to business goals, IT excellence, and driving technology innovation.

      Make Your IT Governance Adaptable
      Governance isn't optional, so keep it simple and make it flexible.

      Create an IT View of the Service Catalog
      Unlock the full value of your service catalog with technical components.

      Application Portfolio Management Foundations
      Ensure your application portfolio delivers the best possible return on investment.

      Shifting Toward Agile DevOps

      Agile/DevOps Research Center
      Access the tools and advice you need to be successful with Agile.

      Develop Your Agile Approach for a Successful Transformation
      Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

      Implement DevOps Practices That Work
      Streamline business value delivery through the strategic adoption of DevOps practices.

      Perform an Agile Skills Assessment
      Being Agile isn't about processes, it's about people.

      Define the Role of Project Management in Agile and Product-Centric Delivery
      Projects and products are not mutually exclusive.

      Shifting Toward Product Management

      Make the Case for Product Delivery
      Align your organization on the practices to deliver what matters most.

      Deliver on Your Digital Product Vision
      Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale
      Deliver value at the scale of your organization through defining enterprise product families.

      Mature and Scale Product Ownership
      Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

      Build a Value Measurement Framework
      Focus product delivery on business value- driven outcomes.

      Improving Value and Delivery Metrics

      Build a Value Measurement Framework
      Focus product delivery on business value-driven outcomes.

      Create a Holistic IT Dashboard
      Mature your IT department by measuring what matters.

      Select and Use SDLC Metrics Effectively
      Be careful what you ask for, because you will probably get it.

      Reduce Time to Consensus With an Accelerated Business Case
      Expand on the financial model to give your initiative momentum.

      Improving Governance, Prioritization, and Value

      Make Your IT Governance Adaptable
      Governance isn't optional, so keep it simple and make it flexible.

      Maximize Business Value From IT Through Benefits Realization
      Embed benefits realization into your governance process to prioritize IT spending and confirm the value of IT.

      Drive Digital Transformation With Platform Strategies
      Innovate and transform your business models with digital platforms.

      Succeed With Digital Strategy Execution
      Building a digital strategy is only half the battle: create a systematic roadmap of technology initiatives to execute the strategy and drive digital transformation.

      Build a Value Measurement Framework
      Focus product delivery on business value-driven outcomes.

      Create a Holistic IT Dashboard
      Mature your IT department by measuring what matters.

      Improving Requirements Management and Quality Assurance

      Requirements Gathering for Small Enterprises
      Right-size the guidelines of your requirements gathering process.

      Improve Requirements Gathering
      Back to basics: great products are built on great requirements.

      Build a Software Quality Assurance Program
      Build quality into every step of your SDLC.

      Automate Testing to Get More Done
      Drive software delivery throughput and quality confidence by extending your automation test coverage.

      Manage Your Technical Debt
      Make the case to manage technical debt in terms of business impact.

      Create a Business Process Management Strategy
      Avoid project failure by keeping the "B" in BPM.

      Build a Winning Business Process Automation Playbook
      Optimize and automate your business processes with a user-centric approach.

      Improving Release Management

      Optimize Applications Release Management
      Build trust by right-sizing your process using appropriate governance.

      Streamline Application Maintenance
      Effective maintenance ensures the long-term value of your applications.

      Streamline Application Management
      Move beyond maintenance to ensure exceptional value from your apps.

      Optimize IT Change Management
      Right-size IT change management to protect the live environment.

      Manage Your Technical Debt
      Make the case to manage technical debt in terms of business impact.

      Improve Application Development Throughput
      Drive down your delivery time by eliminating development inefficiencies and bottlenecks while maintaining high quality.

      Improving Business Relationship Management

      Embed Business Relationship Management in IT
      Show that IT is worthy of Trusted Partner status.

      Mature and Scale Product Ownership
      Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

      Improving Security

      Build an Information Security Strategy
      Create value by aligning your strategy to business goals and business risks.

      Develop and Deploy Security Policies
      Enhance your overall security posture with a defensible and prescriptive policy suite.

      Simplify Identity and Access Management
      Leverage risk- and role-based access control to quantify and simplify the identity and access management (IAM) process.

      Improving and Supporting Business-Managed Applications

      Embrace Business-Managed Applications
      Empower the business to implement their own applications with a trusted business-IT relationship.

      Enhance Your Solution Architecture Practices
      Ensure your software systems solution is architected to reflect stakeholders' short- and long-term needs.

      Satisfy Digital End Users With Low- and No-Code
      Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

      Build Your First RPA Bot
      Support RPA delivery with strong collaboration and management foundations.

      Automate Work Faster and More Easily With Robotic Process Automation
      Embrace the symbiotic relationship between the human and digital workforce.

      Improving Business Intelligence, Analytics, and Reporting

      Modernize Data Architecture for Measurable Business Results
      Enable the business to achieve operational excellence, client intimacy, and product leadership with an innovative, agile, and fit-for-purpose data architecture practice.

      Build a Reporting and Analytics Strategy
      Deliver actionable business insights by creating a business-aligned reporting and analytics strategy.

      Build Your Data Quality Program
      Quality data drives quality business decisions.

      Design Data-as-a-Service
      Journey to the data marketplace ecosystems.

      Build a Robust and Comprehensive Data Strategy
      Learn about the key to building and fostering a data-driven culture.

      Build an Application Integration Strategy
      Level the table before assembling the application integration puzzle or risk losing pieces.

      Appendix B: SDLC Transformation Steps

      Waterfall SDLC

      Valuable product delivered at the end of an extended project lifecycle, frequently in years

      Waterfall SDLC

      • Business is separated from the delivery of technology it needs. Only one-third of the product is actually valuable (ITRG, N=40,000).
      • In Waterfall, a team of experts in specific disciplines hand off different aspects of the lifecycle.
      • Document sign-offs are required to ensure integration between silos (Business, Development, and Operations) and individuals.
      • A separate change-request process lays over the entire lifecycle to prevent changes from disrupting delivery.
      • Tools are deployed to support a specific role (e.g. BA) and seldom integrated (usually requirements <-> test).

      Wagile/Agifall/WaterScrumFall SDLC

      Valuable product delivered in multiple releases

       Wagile/Agifall/WaterScrumFall SDLC

      • Business is more closely integrated by a business product owner, who is accountable for day-to-day delivery of value for users.
      • The team collaborates and develops cross-functional skills as they define, design, build, and test code over time.
      • Sign-offs are reduced but documentation is still focused on satisfying project delivery and operations policy requirements.
      • Change is built into the process to allow the team to respond to change dynamically.
      • Tools start to be integrated to streamline delivery (usually requirements and Agile work management tools).

      Agile SDLC

      Valuable product delivered iteratively: frequency depends Ops' capacity

      Agile SDLC

      • Business users are closely integrated through regularly scheduled demos (e.g. every two weeks).
      • Team is fully cross-functional and collaborates to plan, define, design, build, and test the code, supported by specialists.
      • Documentation is focused on future development and operations needs.
      • Change is built into the process to allow the team to respond to change dynamically.
      • Automation is explored for application development (e.g. automated regression testing).

      Agile With DevOps SDLC

      High frequency iterative delivery of valuable product (e.g. every two weeks)

       Agile With DevOps SDLC

      • Business users are closely integrated through regularly scheduled demos.
      • Development and operations teams collaborate to plan, define, design, build, test, and deploy code, supported by automation.
      • Documentation is focused on supporting users, future changes, and operational support.
      • Change is built into the process to allow the team to respond to change dynamically.
      • Test, build, deploy process is fully automated. (Service desk is still separated.)

      DevOps SDLC

      Continuous integration and delivery

       DevOps SDLC

      • Business users are closely integrated through regularly scheduled demos.
      • Fully integrated DevOps team collaborates to plan, define, design, build, test, deploy, and maintain code.
      • Documentation is focused on future development and use adoption.
      • Change is built into the process to allow the team to respond to change dynamically.
      • Development and operations toolchain are fully integrated.

      Fully integrated product SDLC

      Agile + DevOps + continuous delivery of valuable product on demand

       Fully integrated product SDLC

      • Business users are fully integrated with the teams through dedicated business product owner.
      • Cross-functional teams collaborate across the business and technical life of the product.
      • Documentation supports internal and external needs (business, users, operations).
      • Change is built into the process to allow the team to respond to change dynamically.
      • Toolchain is fully integrated (including service desk).

      Appendix C: Understanding Agile Scrum Practices and Ceremonies

      Cultural advantages of Agile

      Cultural advantages of Agile

      Agile* SDLC

      With shared ownership instead of silos, we are able to deliver value at the end of every iteration (aka sprint)

      Agile SDLC

      Key Elements of the Agile SDLC

      • You are not "one and done." There are many short iterations with constant feedback.
      • There is an empowered product owner. This is a single authoritative voice who represents stakeholders.
      • There is a fluid product backlog. This enables prioritization of requirements "just-in-time."
      • There is a cross-functional, self-managing team. This team makes commitments and is empowered by the organization to do so.
      • There is working, tested code at the end of each sprint: Value becomes more deterministic along sprint boundaries.
      • Stakeholders are allowed to see and use the functionality and provide necessary feedback.
      • Feedback is being continuously injected back into the product backlog. This shapes the future of the solution.
      • There is continuous improvement through sprint retrospectives.
      • The virtuous cycle of sprint-demo-feedback is internally governed when done right.

      * There are many Agile methodologies to choose from, but Scrum is by far the most widely used (and is shown above).

      Understand the Scrum process

      The scrum process coordinates multiple stakeholders to deliver on business priorities.

      Understand the Scrum process

      Understand the ceremonies part of the scrum process

       Understand the ceremonies part of the scrum process

      Scrum vs. Kanban: Key differences

      Scrum vs. Kanban: Key differences

      Scrum vs. Kanban: When to use each

      Scrum

      Related or grouped changes are delivered in fixed time intervals.

      Use when:

      • Coordinating the development or release of related items
      • Maturing a product or service
      • Coordinating interdependencies between work items

      Kanban

      Independent items are delivered as soon as each is ready.

      Use when:

      • Completing work items from ticketing or individual requests
      • Completing independent changes
      • Releasing changes as soon as possible

      Appendix D: Improving Product Management

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      Product delivery realizes value for your product family

      Manage and communicate key milestones

      Successful product-delivery managers understand and define key milestones in their product-delivery lifecycles. These milestones need to be managed along with the product backlog and roadmap.

      Manage and communicate key milestones

      Info-Tech Best Practice
      Product management is not just about managing the product backlog and development cycles. Teams need to manage key milestones, such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints.

      A backlog stores and organizes product backlog items (PBIs) at various stages of readiness

      Organize product backlog at various stages of readiness

      A well-formed backlog can be thought of as a DEEP backlog:

      Detailed Appropriately: PBIs are broken down and refined as necessary.

      Emergent: The backlog grows and evolves over time as PBIs are added and removed.

      Estimated: The effort that a PBI requires is estimated at each tier.

      Prioritized: A PBI's value and priority are determined at each tier.

      Source: Perforce, 2018

      Backlog tiers facilitate product planning steps

      Ranging from the intake of an idea to a PBI ready for development; to enter the backlog, each PBI must pass through a given quality filter.

      Backlog tiers facilitate product planning steps

      Each activity is a variation of measuring value and estimating effort in order to validate and prioritize a PBI.

      A PBI successfully completes an activity and moves to the next backlog tier when it meets the appropriate criteria. Quality filters should exist between each tier.

      Use quality filters to ensure focus on the most important PBIs

      Expand the concepts of defining "ready" and "done" to include the other stages of a PBI's journey through product planning.

      Use quality filters to ensure focus on the most important PBIs

      Info-Tech Best Practice
      A quality filter ensures that quality is met and the appropriate teams are armed with the correct information to work more efficiently and improve throughput.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      Define product value by aligning backlog delivery with roadmap goals

      Product roadmaps guide delivery and communicate your strategy

      In "Deliver on Your Digital Product Vision," we demonstrate how a product roadmap is core to value realization. The product roadmap is your communicated path. As a product owner, you use it to align teams and changes to your defined goals, as well as your product to enterprise goals and strategy.

      Product roadmaps guide delivery and communicate your strategy

      Info-Tech Insight
      The quality of your product backlog - and your ability to realize business value from your delivery pipeline - is directly related to the input, content, and prioritization of items in your product roadmap.

      Info-Tech's approach

      Operationally align product delivery to enterprise goals

      Operationally align product delivery to enterprise goals

      The Info-Tech Difference

      Create a common definition of what a product is and identify the products in your inventory.

      Use scaling patterns to build operationally aligned product families.

      Develop a roadmap strategy to align families and products to enterprise goals and priorities.

      Use products and families to assess value realization.

      Establish High-Value IT Performance Dashboards and Metrics

      • Buy Link or Shortcode: {j2store}58|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $8,599 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Performance Measurement
      • Parent Category Link: /performance-measurement

      While most CIOs understand the importance of using metrics to measure IT’s accomplishments, needs, and progress, when it comes to creating dashboards to communicate these metrics, they:

      • Concentrate on the data instead of the audience.
      • Display information specific to IT activities instead of showing how IT addresses business goals and problems.
      • Use overly complicated, out of context graphs that crowd the dashboard and confuse the viewer.

      Our Advice

      Critical Insight

      While most CIOs understand the importance of using metrics to measure IT’s accomplishments, needs, and progress, when it comes to creating dashboards to communicate these metrics, they:

      • Concentrate on the data instead of the audience.
      • Display information specific to IT activities instead of showing how IT addresses business goals and problems.
      • Use overly complicated, out of context graphs that crowd the dashboard and confuse the viewer.

      Impact and Result

      Use Info-Tech’s ready-made dashboards for executives to ensure you:

      • Speak to the right audience
      • About the right things
      • In the right quantity
      • Using the right measures
      • At the right time.

      Establish High-Value IT Performance Dashboards and Metrics Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish High-Value IT Performance Metrics and Dashboards – a document that walks you through Info-Tech’s ready-made IT dashboards.

      This blueprint guides you through reviewing Info-Tech’s IT dashboards for your audience and organization, then walks you through practical exercises to customize the dashboards to your audience and organization. The blueprint also gives practical guidance for delivering your dashboards and actioning your metrics.

      • Establish High-Value IT Performance Metrics and Dashboards Storyboard

      2. Info-Tech IT Dashboards and Guide – Ready-made IT dashboards for the CIO to communicate to the CXO.

      IT dashboards with visuals and metrics that are aligned and organized by CIO priority and that allow you to customize with your own data, eliminating 80% of the dashboard design work.

      • Info-Tech IT Dashboards and Guide

      3. IT Dashboard Workbook – A step-by-step tool to identify audience needs, translate needs into metrics, design your dashboard, and track/action your metrics.

      The IT Dashboard Workbook accompanies the Establish High Value IT Metrics and Dashboards blueprint and guides you through customizing the Info-Tech IT Dashboards to your audience, crafting your messages, delivering your dashboards to your audience, actioning metrics results, and addressing audience feedback.

      • Info-Tech IT Dashboards Workbook

      4. IT Metrics Library

      Reference the IT Metrics Library for ideas on metrics to use and how to measure them.

      • IT Metrics Library

      5. HR Metrics Library

      Reference the HR Metrics Library for ideas on metrics to use and how to measure them.

      • HR Metrics Library

      Infographic

      Workshop: Establish High-Value IT Performance Dashboards and Metrics

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Test Info-tech’s IT Dashboards Against Your Audience’s Needs and Translate Audience Needs Into Metrics

      The Purpose

      Introduce the Info-Tech IT Dashboards to give the participants an idea of how they can be used in their organization.

      Understand the importance of starting with the audience and understanding audience needs before thinking about data and metrics.

      Explain how audience needs translate into metrics.

      Key Benefits Achieved

      Understanding of where to begin when it comes to considering dashboards and metrics (the audience).

      Identified audience and needs and derived metrics from those identified needs.

      Activities

      1.1 Review the info-Tech IT Dashboards and document impressions for your organization.

      1.2 Identify your audience and their attributes.

      1.3 Identify timeline and deadlines for dashboards.

      1.4 Identify and prioritize audience needs and desired outcomes.

      1.5 Associate metrics to each need.

      1.6 Identify a dashboard for each metric.

      Outputs

      Initial impressions of Info-Tech IT Dashboards.

      Completed Tabs 2 and 3 of the IT Dashboard Workbook.

      2 Inventory Your Data and Assess Data Quality and Readiness

      The Purpose

      Provide guidance on how to derive metrics and assess data.

      Key Benefits Achieved

      Understand the importance of considering how you will measure each metric and get the data.

      Understand that measuring data can be costly and that sometimes you just can’t afford to get the measure or you can’t get the data period because the data isn’t there.

      Understand how to assess data quality and readiness.

      Activities

      2.1 Complete a data inventory for each metric on each dashboard: determine how you will measure the metric, the KPI, any observation biases, the location of the data, the type of source, the owner, and the security/compliance requirements.

      2.2 Assess data quality for availability, accuracy, and standardization.

      2.3 Assess data readiness and the frequency of measurement and reporting.

      Outputs

      Completed Tab 4 of the IT Dashboard Workbook.

      3 Design and Build Your Dashboards

      The Purpose

      Guide participants in customizing the Info-Tech IT Dashboards with the data identified in previous steps.

      This step may vary as some participants may not need to alter the Info-Tech IT Dashboards other than to add their own data.

      Key Benefits Achieved

      Understanding of how to customize the dashboards to the participants’ organization.

      Activities

      3.1 Revisit the Info-Tech IT Dashboards and use the identified metrics to determine what should change in them.

      3.2 Build your dashboards by editing the Info-Tech IT Dashboards with your changes as planned in Step 3.1.

      Outputs

      Assessed Info-Tech IT Dashboards for your audience’s needs.

      Completed Tab 5 of the IT Dashboard Workbook.

      Finalized dashboards.

      4 Deliver Your Dashboard and Plan to Action Metrics

      The Purpose

      Guide participants in learning how to create a story around the dashboards.

      Guide participants in planning to action metrics and where to record results.

      Guide participants in how to address results of metrics and feedback from audience about dashboards.

      Key Benefits Achieved

      Participants understand how to speak to their dashboards.

      Participants understand how to action metrics results and feedback about dashboards.

      Activities

      4.1 Craft your story.

      4.2 Practice delivering your story.

      4.3 Plan to action your metrics.

      4.4 Understand how to record and address your results.

      Outputs

      Completed Tabs 6 and 7 of the IT Dashboard Workbook.

      5 Next Steps and Wrap-Up

      The Purpose

      Finalize work outstanding from previous steps and answer any questions.

      Key Benefits Achieved

      Participants have thought about and documented how to customize the Info-Tech IT Dashboards to use in their organization, and they have everything they need to customize the dashboards with their own metrics and visuals (if necessary).

      Activities

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Outputs

      Completed IT Dashboards tailored to your organization.

      Completed IT Dashboard Workbook

      Further reading

      Establish High-Value IT Performance Dashboards and Metrics

      Spend less time struggling with visuals and more time communicating about what matters to your executives.

      Analyst Perspective

      A dashboard is a communication tool that helps executives make data-driven decisions

      CIOs naturally gravitate toward data and data analysis. This is their strength. They lean into this strength, using data to drive decisions, track performance, and set targets because they know good data drives good decisions.

      However, when it comes to interpreting and communicating this complex information to executives who may be less familiar with data, CIOs struggle, often falling back on showing IT activity level data instead of what the executives care about. This results in missed opportunities to tell IT’s unique story, secure funding, reveal important trends, or highlight key opportunities for the organization.

      Break through these traditional barriers by using Info-Tech’s ready-made IT dashboards. Spend less time agonizing over visuals and layout and more time concentrating on delivering IT information that moves the organization forward.

      Photo of Diana MacPherson
      Diana MacPherson
      Senior Research Analyst, CIO
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      While most CIOs understand the importance of using metrics to measure IT’s accomplishments, needs, and progress, when it comes to creating dashboards to communicate these metrics, they:

      • Concentrate on the data instead of the audience.
      • Display information specific to IT activities instead of showing how IT addresses business goals and problems.
      • Use overly complicated, out of context graphs that crowd the dashboard and confuse the viewer.

      Common Obstacles

      CIOs often experience these challenges because they:

      • Have a natural bias toward data and see it as the whole story instead of a supporting character in a larger narrative.
      • Assume that the IT activity metrics that are easy to get and useful to them are equally interesting to all their stakeholders.
      • Do not have experience communicating visually to an audience unfamiliar with IT operations or lingo.

      Info-Tech’s Approach

      Use Info-Tech’s ready-made dashboards for executives to ensure you:

      • Speak to the right audience
      • About the right things
      • In the right quantity
      • Using the right measures
      • At the right time

      Info-Tech Insight

      The purpose of a dashboard is to drive decision making. A well designed dashboard presents relevant, clear, concise insights that help executives make data-driven decisions.

      Your challenge

      CIOs struggle to select the right metrics and dashboards to communicate IT’s accomplishments, needs, and progress to their executives. CIOs:

      • Fail to tailor metrics to their audience, often presenting graphs that are familiar and useful to them, but not their executives. This results in dashboards full of IT activities that executives neither understand nor find valuable.
      • Do not consider the timeliness of their metrics, which has the same effect as not tailoring their metrics: the executives do not care about the metrics they are shown.
      • Present too many metrics, which not only clutters the board but also dilutes the message the CIO needs to communicate.
      • Do not act on the results of their metrics and show progress, which makes metrics meaningless. Why measure something if you won’t act on the results?

      The bottom line: CIOs often communicate to the wrong audience, about the wrong things, in the wrong amount, using the wrong metrics, at the wrong time.

      In a survey of 500 executives, organizations that struggled with dashboards identified the reasons as:
      61% Inadequate context
      54% Information overload

      — Source: Exasol

      CXOs and CIOs agree that IT performance metrics need improvement

      When asked which performance indicators should be implemented in your business, CXOs and CIOs both agree that IT needs to improve its metrics across several activity areas: technology performance, cost and salary, and risk.

      A diagram that shows performance indicators and metrics from cxo and cio.

      The Info-Tech IT Dashboards center key metrics around these activities ensuring you align your metrics to the needs of your CXO audience.

      Info-Tech CEO/CIO Alignment Survey Benchmark Report n=666

      The Info-Tech IT Dashboards are organized by the top CIO priorities

      The top six areas that a CIO needs to prioritize and measure outcomes, no matter your organization or industry, are:

      • Managing to a budget: Reducing operational costs and increasing strategic IT spend
      • Customer/constituent satisfaction: Directly and indirectly impacting customer experience.
      • Risk management: Actively knowing and mitigating threats to the organization.
      • Delivering on business objectives: Aligning IT initiatives to the vision of the organization.
      • Employee engagement: Creating an IT workforce of engaged and purpose-driven people.
      • Business leadership relations: Establishing a network of influential business leaders.

      Deliver High-Value IT Dashboards to Your Executives

      A diagram that shows Delivering High-Value IT Dashboards to Your Executives

      Info-Tech’s approach

      Deliver High-Value Dashboards to Your Executives

      A diagram that shows High-Value Dashboard Process.

      Executives recognize the benefits of dashboards:
      87% of respondents to an Exasol study agreed that their organization’s leadership team would make more data-driven decisions if insights were presented in a simpler and more understandable way
      (Source: Exasol)

      The Info-Tech difference:

      We created dashboards for you so you don’t have to!

      1. Eliminate 80% of the dashboard design work by selecting from our ready-made Info-Tech IT Dashboards.
      2. Use our IT Dashboard Workbook to adjust the dashboards to your audience and organization.
      3. Follow our blueprint and IT Dashboard Workbook tool to craft, and deliver your dashboard to your CXO team, then action feedback from your audience to continuously improve.

      Info-Tech’s methodology for establishing high-value dashboards

      1. Test Info-Tech’s IT Dashboards Against Your Audience’s Needs

      Phase Steps

      1. Validate Info-Tech’s IT Dashboards for Your Audience
      2. Identify and Document Your Audience’s Needs

      Phase Outcomes

      1. Initial impressions of Info-Tech IT Dashboards
      2. Completed Tabs 2 of the IT Dashboard Workbook

      2. Translate Audience Needs into Metrics

      Phase Steps

      1. Review Info-Tech’s IT Dashboards for Your Audience
      2. Derive Metrics from Audience Needs
      3. Associate metrics to Dashboards

      Phase Outcomes

      1. Completed IT Tab 3 of IT Dashboard Workbook

      3. Ready Your Data for Dashboards

      Phase Steps

      1. Assess Data Inventory
      2. Assess Data Quality
      3. Assess Data Readiness
      4. Assess Data Frequency

      Phase Outcomes

      1. Assessed Info-Tech IT Dashboards for your audience’s needs
      2. Completed Tab 5 of the IT Dashboard Workbook
      3. Finalized dashboards

      4. Build and Deliver Your Dashboards

      Phase Steps

      1. Design Your Dashboard
      2. Update Your Dashboards
      3. Craft Your Story and Deliver Your Dashboards

      Phase Outcomes

      1. Completed IT Tab 5 and 6 of IT Dashboard Workbook and finalized dashboards

      5. Plan, Record, and Action Your Metrics

      Phase Steps

      1. Plan How to Record Metrics
      2. Record and Action Metrics

      Phase Outcomes

      1. Completed IT Dashboards tailored to your organization
      2. Completed IT Dashboard Workbook

      How to Use This Blueprint

      Choose the path that works for you

      A diagram that shows path of using this blueprint.

      The Info-Tech IT Dashboards address several needs:

      1. New to dashboards and metrics and not sure where to begin? Let the phases in the blueprint guide you in using Info-Tech’s IT Dashboards to create your own dashboards.
      2. Already know who your audience is and what you want to show? Augment the Info-Tech’s IT Dashboards framework with your own data and visuals.
      3. Already have a tool you would like to use? Use the Info-Tech’s IT Dashboards as a design document to customize your tool.

      Insight Summary

      The need for easy-to-consume data is on the rise making dashboards a vital data communication tool.

      70%: Of employees will be expected to use data heavily by 2025, an increase from 40% in 2018.
      — Source: Tableau

      Overarching insight

      A dashboard’s primary purpose is to drive action. It may also serve secondary purposes to update, educate, and communicate, but if a dashboard does not drive action, it is not serving its purpose.

      Insight 1

      Start with the audience. Resist the urge to start with the data. Think about who your audience is, what internal and external environmental factors influence them, what problems they need to solve, what goals they need to achieve, then tailor the metrics and dashboards to suit.

      Insight 2

      Avoid showing IT activity-level metrics. Instead use CIO priority-based metrics to report on what matters to the organization. The Info-Tech IT Dashboards are organized by the CIO priorities: risks, financials, talent, and strategic initiatives.

      Insight 3

      Dashboards show the what not the why. Do not assume your audience will draw the same conclusions from your graphs and charts as you do. Provide the why by interpreting the results, adding insights and calls to action, and marking key areas for discussion.

      Insight 4

      A dashboard is a communication tool and should reflect the characteristics of good communication. Be clear, concise, consistent, and relevant.

      Insight 5

      Action your data. Act and report progress on your metrics. Gathering metrics has a cost, so if you do not plan to action a metric, do not measure it.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Photo of Dashboards

      Key deliverable: Dashboards

      Ready-made risk, financials, talent, and strategic initiatives dashboards that organize your data in a visually appealing way so you can concentrate on the metrics and communication.

      Photo of IT Dashboard Workbook

      IT Dashboard Workbook

      The IT Dashboard Workbook keeps all your metrics, data, and dashboard work in one handy file!

      Photo of IT Dashboard Guide

      IT Dashboard Guide

      The IT Dashboard Guide provides the Info-Tech IT Dashboards and information about how to use them.

      Blueprint benefits

      CIO Benefits

      • Reduces the burden of figuring out what metrics to show executives and how to categorize and arrange the visuals.
      • Increases audience engagement through tools and methods that guide CIOs through tailoring metrics and dashboards to audience needs.
      • Simplifies CIO messages so executives better understand IT needs and value.
      • Provides CIOs with the tools to demonstrate transparency and competency to executive leaders.
      • Provides tools and techniques for regular review and action planning of metrics results, which leads to improved performance, efficiency, and effectiveness.

      Business Benefits

      • Provides a richer understanding of the IT landscape and a clearer connection of how IT needs and issues impact the organization.
      • Increases understanding of the IT team’s contribution to achieving business outcomes.
      • Provides visibility into IT and business trends.
      • Speeds up decision making by providing insights and interpretations to complex situations.

      Measure the value of this blueprint

      Realize measurable benefits after using Info-Tech’s approach:

      Determining what you should measure, what visuals you should use, and how you should organize your visuals, is time consuming. Calculate the time it has taken you to research what metrics you should show, create the visuals, figure out how to categorize the visuals, and layout your visuals. Typically, this takes about 480 hours of time. Use the ready-made Info-Tech IT Dashboards and the IT Dashboard Workbook to quickly put together a set of dashboards to present your CXO. Using these tools will save approximately 480 hours.

      A study at the University of Minnesota shows that visual presentations are 43% more effective at persuading their audiences (Bonsignore). Estimate how persuasive you are now by averaging how often you have convinced your audience to take a specific course of action. After using the Info-Tech IT Dashboards and visual story telling techniques described in this blueprint, average again. You should be 43% more persuasive.

      Further value comes from making decisions faster. Baseline how long it takes, on average, for your executive team to make a decision before using Info-Tech’s IT Dashboards then time how long decisions take when you use your Info-Tech’s IT Dashboards. Your audience should reach decisions 21% faster according to studies at Stanford University and the Wharton School if business (Bonsignore).

      Case Study

      Visuals don’t have to be fancy to communicate clear messages.

      • Industry: Construction
      • Source: Anonymous interview participant

      Challenge

      Year after year, the CIO of a construction company attended business planning with the Board to secure funding for the year. One year, the CEO interrupted and said, “You're asking me for £17 million. You asked me for £14 million last year and you asked me for £12 million the year before that. I don't quite understand what we get for our money.”

      The CEO could not understand how fixing laptops would cost £17 million and for years no one had been able to justify the IT spend.

      Solutions

      The CIO worked with his team to produce a simple one-page bubble diagram representing each IT department. Each bubble included the total costs to deliver the service, along with the number of employees. The larger the bubble, the higher the cost. The CIO brought each bubble to life as he explained to the Board what each department did.

      The Board saw, for example, that IT had architects who thought about the design of a service, where it was going, the life cycle of that service, and the new products that were coming out. They understood what those services cost and knew how many architects IT had to provide for those services.

      Recommendations

      The CEO remarked that he finally understood why the CIO needed £17 million. He even saw that the costs for some IT departments were low for the amount of people and offered to pay IT staff more (something the CIO had requested for years).

      Each year the CIO used the same slide to justify IT costs and when the CIO needed further investment for things like security or new products, an upgrade, or end of life support, the sign-offs came very quickly because the Board understood what IT was doing and that IT wasn't a bottomless pit.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation
      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop
      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting
      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      What does a typical GI on this topic look like?

      A diagram that shows Guided Implementation in 5 phases.

      Workshop overview

      Day 1: Test Info-tech’s IT Dashboards Against Your Audience’s Needs and Translate Audience Needs Into Metrics

      Activities
      1.1 Review the info-Tech IT Dashboards and document impressions for your organization.
      1.2 Identify your audience’s attributes.
      1.3 Identify timeline and deadlines for dashboards.
      1.4 Identify and prioritize audience needs and desired outcomes.
      1.5 Associate metrics to each need.
      1.6 Identify a dashboard for each metric.

      Deliverables
      1. Initial impressions of Info-Tech IT Dashboards.
      2. Completed Tabs 2 and 3 of the IT Dashboard Workbook.

      Day 2: Inventory Your Data; Assess Data Quality and Readiness

      Activities
      2.1 Complete a data inventory for each metric on each dashboard: determine how you will measure the metric, the KPI, any observation biases, the location of the data, the type of source, and the owner and security/compliance requirements.
      2.2 Assess data quality for availability, accuracy, and standardization.
      2.3 Assess data readiness and frequency of measurement and reporting.

      Deliverables
      1. Completed Tab 4 of the IT Dashboard Workbook.

      Day 3: Design and Build Your Dashboards

      Activities
      3.1 Revisit the Info-Tech IT Dashboards and use the identified metrics to determine what should change on the dashboards.
      3.2 Build your dashboards by editing the Info-Tech IT Dashboards with your changes as planned in Step 3.1.

      Deliverables
      1. Assessed Info-Tech IT Dashboards for your audience’s needs.
      2. Completed Tab 5 of the IT Dashboard Workbook.
      3. Finalized dashboards.

      Day 4: Deliver Your Dashboard and Plan to Action Metrics

      Activities
      4.1 Craft your story.
      4.2 Practice delivering your story.
      4.3 Plan to action your metrics.
      4.4 Understand how to record and address your results.

      Deliverables
      1. Completed Tabs 6 and 7 of the IT Dashboard Workbook.

      Day 5: Next Steps and Wrap-Up (offsite)

      Activities
      5.1 Complete in-progress deliverables from previous four days
      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables
      1. Completed IT Dashboards tailored to your organization.
      2. Completed IT Dashboard Workbook.

      Contact your account representative for more information.

      workshops@infotech.com
      1-888-670-8889

      What is an IT dashboard?

      A photo of Risks - Protect the Organization. A photo of Financials: Transparent, fiscal responsibility
      A photo of talent attrat and retain top talent A photo of Strategic Initiatives: Deliver Value to Customers.

      An IT dashboard is…
      a visual representation of data, and its main purpose is to drive actions. Well-designed dashboards use an easy to consume presentation style free of clutter. They present their audience with a curated set of visuals that present meaningful metrics to their audience.

      Dashboards can be both automatically or manually updated and can show information that is dynamic or a snapshot in time.

      Info-Tech IT Dashboards

      Review the Info-Tech IT Dashboards

      We created dashboards so you don’t have to.

      A photo of Risks - Protect the Organization. A photo of Financials: Transparent, fiscal responsibility A photo of talent attrat and retain top talent A photo of Strategic Initiatives: Deliver Value to Customers.

      Use the link below to download the Info-Tech IT Dashboards and consider the following:

      1. What are your initial reactions to the dashboards?
      2. Are the visuals appealing? If so, what makes them appealing?
      3. Can you use these dashboards in your organization? What makes them usable?
      4. How would you use these dashboards to speak your own IT information to your audience?

      Download the Info-Tech IT Dashboards

      Why Use Dashboards When We Have Data?

      How graphics affect us

      Cognitively

      • Engage our imagination
      • Stimulate the brain
      • Heighten creative thinking
      • Enhance or affect emotions

      Emotionally

      • Enhance comprehension
      • Increase recollection
      • Elevate communication
      • Improve retention

      Visual clues

      • Help decode text
      • Attract attention
      • Increase memory

      Persuasion

      • 43% more effective than text alone

      — Source: (Vogel et al.)

      Phase 1

      Test Info-Tech’s IT Dashboards Against Your Audience’s Needs

      A diagram that shows phase 1 to 5.

      This phase will walk you through the following:

      • Documenting impressions for using Info-Tech’s IT Dashboards for your audience.
      • Documenting your audience and their needs and metrics for your IT dashboards

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Info-Tech IT Dashboard organization and audience

      We created a compelling way to organize IT dashboards so you don’t have to. The Info-Tech IT Dashboards are organized by CIO Priorities, and these are consistent irrespective of industry or organization. This is a constant that you can organize your metrics around.

      A photo of Info-Tech IT Dashboards

      Dashboard Customization

      The categories represent a constant around which you can change the order; for example, if your CXO is more focused on Financials, you can switch the Financials dashboard to appear first.

      The Info-Tech IT Dashboards are aimed at a CXO audience so if your audience is the CXO, then you may decide to change very little, but you can customize any visual to appeal to your audience.

      Phase 1 will get you started with your audience.

      Always start with the audience

      …and not the data!

      Reliable, accurate data plays a critical role in dashboards, but data is only worthwhile if it is relevant to the audience who consumes it, and dashboards are only as meaningful as the data and metrics they represent.

      Instead of starting with the data, start with the audience. The more IT understands about the audience, the more relevant the metrics will be to their audience and the more aligned leadership will be with IT.

      Don’t forget yourself and who you are. Your audience will have certain preconceived notions about who you are and what you do. Consider these when you think about what you want your audience to know.

      46% executives identify lack of customization to individual user needs as a reason they struggle with dashboards.
      — Source: (Exasol)

      Resist the Data-First Temptation

      If you find yourself thinking about data and you haven’t thought about your audience, pull yourself back to the audience.

      Ask first Ask later
      Who is this dashboard for? What data should I show?
      How will the audience use the dashboard to make decisions? Where do I get the data?
      How can I show what matters to the audience? How much effort is required to get the data?

      Meaningful measures rely on understanding your audience and their needs

      It is crucial to think about who your audience is so that you can translate their needs into metrics and create meaningful visuals for your dashboards.

      A diagram that highlights step 1-3 of understanding your audience in the high-value dashboard process.

      Step 1.1

      Review and Validate Info-Tech’s IT Dashboards for Your Audience

      Activities:
      1.1.1 Examine Info-Tech’s IT Dashboards.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 1.1 & 1.2 to Test Info-Tech’s IT Dashboards Against Your Audience’s Needs.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Info-Tech dashboards reviewed for your organization’s audience.

      1.1.1 Examine the Info-Tech IT Dashboards

      30 minutes

      1. If you haven’t already downloaded the Info-Tech IT Dashboards, click the link below to download.
      2. Complete a quick review of the dashboards and consider how your audience would receive them.
      3. Document your thoughts, with special emphasis on your audience in the Info-Tech Dashboard Impressions slide.

      A diagram that shows Info-Tech IT Dashboards

      Download Info-Tech IT Dashboards

      Reviewing visuals can help you think about how your audience will respond to them

      Jot down your thoughts below. You can refer to this later as you consider your audience.

      Consider:

      • Who is your dashboard audience?
      • Are their needs different from the Info-Tech IT Dashboard audience’s? If so, how?
      • Will the visuals work for your audience on each dashboard?
      • Will the order of the dashboards work for your audience?
      • What is missing?

      Step 1.2

      Identify and Document Your Audience’s Needs

      Activities:
      1.2.1 Document your audience’s needs in the IT Dashboard Workbook.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 1.1 & 1.2 to Test Info-Tech’s IT Dashboards Against Your Audience’s Needs.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Audience details documented in IT Dashboard Workbook

      Identify Your Audience and dig deeper to understand their needs

      Connect with your audience

      • Who is your audience?
      • What does your audience care about? What matters to them?
      • How is their individual success measured? What are their key performance indicators (KPIs)?
      • Connect the challenges and pain points of your audience to how IT can help alleviate those pain points:
        • For example, poor financial performance could be due to a lack of digitization. Identify areas where IT can help alleviate this issue.
        • Try to uncover the root cause behind the need. Root causes are often tied to broad organizational objectives, so think about how IT can impact those objectives.

      Validate the needs you’ve uncovered with the audience to ensure you have not misinterpreted them and clarify the desired timeline and deadline for the dashboard.

      Document audiences and needs on Tab 2 of the IT Dashboard Workbook

      Typical Audience Needs
      Senior Leadership
      • Inform strategic planning and track progress toward objectives.
      • Understand critical challenges.
      • Ensure risks are managed.
      • Ensure budgets are managed.
      Board of Directors
      • Understand organizational risks.
      • Ensure organization is fiscally healthy.
      Business Partners
      • Support strategic workforce planning.
      • Surface upcoming risks to workforce.
      CFO
      • IT Spend
      • Budget Health and Risks

      Prioritize and select audience needs that your dashboard will address

      Prioritize needs by asking:

      • Which needs represent the largest value to the entire organization (i.e. needs that impact more of the organization than just the audience)?
      • Which needs will have the largest impact on the audience’s success?
      • Which needs are likely to drive action (e.g. if supporting a decision, is the audience likely to be amenable to changing the way they make that decision based on the data)?

      Select three to five of the highest priority needs for each audience to include on a dashboard.

      Prioritize needs on Tab 2 of the IT Dashboard Workbook

      A diagram that shows 3 tiers of high priority, medium priority, and low priority.

      1.2.1 Document Your Audience Needs in the IT Dashboard Workbook

      1 hour

      Click the link below to download the IT Dashboard Workbook and open the file. Select Tab 2. The workbook contains pre-populated text that reflects information about Info-Tech’s IT Dashboards. You may want to keep the pre-populated text as reference as you identify your own audience then remove after you have completed your updates.

      A table of documenting audience, including key attributes, desired timeline, deadline, needs, and priority.

      Download Info-Tech IT Dashboard Workbook

      Phase 2

      Translate Audience Needs Into Metrics

      A diagram that shows phase 1 to 5.

      This phase will walk you through the following:

      • Revisiting the Info-Tech IT Dashboards for your audience.
      • Documenting your prioritized audience’s needs and the desired outcome of each in the IT Dashboard Workbook.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Linking audience needs to metrics has positive outcomes

      When you present metrics that your audience cares about, you:

      • Deliver real value and demonstrate IT’s value as a trusted partner.
      • Improve the relationship between the business and IT.
      • Enlighten the business about what IT does and how it is connected to the organization.

      29% of respondents to The Economist Intelligence Unit survey cited inadequate collaboration between IT and the business as one of the top barriers to the organization’s digital objectives.
      — Source: Watson, Morag W., et al.

      Dashboard Customization

      The Info-Tech IT Dashboards use measures for each dashboard that correspond with what the audience (CXO) cares about. You can find these measures in the IT Dashboard Workbook. If your audience is the CXO, you may have to change a little but you should still validate the needs and metrics in the IT Dashboard Workbook.

      Phase 2 covers the process of translating needs into metrics.

      Once you know what your audience needs, you know what to measure

      A diagram that highlights step 4-5 of knowing your audience needs in the high-value dashboard process.

      Step 2.1

      Document Desired Outcomes for Each Prioritized Audience Need

      Activities:
      2.1.1 Compare the Info-Tech IT Dashboards with your audience’s needs.
      2.1.2 Document prioritized audience needs and the desired outcome of each in the IT Dashboard Workbook.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 2.1 to 2.3 to translate audience needs into metrics.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Understanding of how well Info-Tech IT Dashboards address audience needs.
      • Documented desired outcomes for each audience need.

      2.1.1 Revisit Info-Tech’s IT Dashboards and Review for Your Audience

      30 minutes

      1. If you haven’t already downloaded the Info-Tech IT Dashboards, click the link below to download.
      2. Click the link below to download the Info-Tech IT Dashboard Workbook.
      3. Recall your first impressions of the dashboards that you recorded on earlier in Phase 1 and open up the audience and needs information you documented in Tab 2 of the IT Dashboard Workbook.
      4. Compare the dashboards with your audience’s needs that you documented on Tab 2.
      5. Record any updates to your thoughts or impressions on the next slide. Think about any changes to the dashboards that you would make so that you can reference it when you build the dashboards.

      Download Info-Tech IT Dashboard Workbook

      A photo of Info-Tech IT Dashboards
      The Info-Tech IT Dashboards contain a set of monthly metrics tailored toward a CXO audience.

      Download Info-Tech IT Dashboards

      Knowing what your audience needs, do the metrics the visuals reflect address them?

      Any changes to the Info-Tech IT Dashboards?

      Consider:

      • Are your audience’s needs already reflected in the visuals in each of the dashboards? If so, validate this in the next activity by reviewing the prioritized needs, desired outcomes, and associated metrics already documented in the IT Dashboard Workbook.
      • Are there any visuals your audience would need that you don’t see reflected in the dashboards? Write them here to use in the next exercise.

      Desired outcomes make identifying metrics easier

      When it’s not immediately apparent what the link between needs and metrics is, brainstorm desired outcomes.

      A diagram that shows an example of desired outcomes

      2.1.2 Document your audience’s desired outcome per prioritized need

      Now that you’ve examined the Info-Tech IT Dashboards and considered the needs of your audience, it is time to understand the outcomes and goals of each need so that you can translate your audience’s needs into metrics.

      1 hour

      Click the link below to download the IT Dashboard Workbook and open the file. Select Tab 3. The workbook contains pre-populated text that reflects information about Info-Tech’s IT Dashboards. You may want to keep the pre-populated text as reference as you identify your own audience then remove it after you have completed your updates.

      A diagram that shows desired outcome per prioritized need

      Download Info-Tech IT Dashboard Workbook

      Deriving Meaningful Metrics

      Once you know the desired outcomes, you can identify meaningful metrics

      A diagram of an example of meaningful metrics.

      Common Metrics Mistakes

      Avoid the following oversights when selecting your metrics.

      A diagram that shows 7 metrics mistakes

      Step 2.2

      Derive Metrics From Audience Needs

      Activities:
      2.2.1 Derive metrics using the Info-Tech IT Dashboards and the IT Dashboard Workbook.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 2.1 to 2.3 to translate audience needs into metrics.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented metrics for audience needs.

      2.2.1 Derive metrics from desired outcomes

      Now that you have completed the desired outcomes, you can determine if you are meeting those desired outcomes. If you struggle with the metrics, revisit the desired outcomes. It could be that they are not measurable or are not specific enough.

      2 hours

      Click the link below to download the IT Dashboard Workbook and open the file. Select Tab 3. The workbook contains pre-populated text that reflects information about Info-Tech’s IT Dashboards. You may want to keep the pre-populated text as reference as you identify your own audience then remove it after you have completed your updates.

      A diagram that shows derive metrics from desired outcomes

      Download Info-Tech IT Dashboard Workbook

      Download IT Metrics Library

      Download HR Metrics Library

      Step 2.3

      Associate Metrics to Dashboards

      Activities:
      2.3.1 Review the metrics and identify which dashboard they should appear on.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 2.1 to 2.3 to translate audience needs into metrics.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Metrics associated to each dashboard.

      2.3.1 Associate metrics to dashboards

      30 minutes

      Once you have identified all your metrics from Step 2.2, identify which dashboard they should appear on. As with all activities, if the Info-Tech IT Dashboard meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information.

      A diagram that shows associate metrics to dashboards

      Phase 3

      Ready Your Data for Dashboards

      A diagram that shows phase 1 to 5.

      This phase will walk you through the following:

      • Inventorying your data
      • Assessing your data quality
      • Determining data readiness
      • Determining data measurement frequency

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Can you measure your metrics?

      Once appropriate service metrics are derived from business objectives, the next step is to determine how easily you can get your metric.

      A diagram that highlights step 5 of measuring your metrics in the high-value dashboard process.

      Make sure you select data that your audience trusts

      40% of organizations say individuals within the business do not trust data insights.
      — Source: Experian, 2020

      Phase 3 covers the process of identifying data for each metric, creating a data inventory, assessing the readiness of your data, and documenting the frequency of measuring your data. Once complete, you will have a guide to help you add data to your dashboards.

      Step 3.1

      Assess Data Inventory

      Activities:
      3.1.1 Download the IT Dashboard Workbook and complete the data inventory section on Tab 4.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 3.1 to 3.4 to ready your data for dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented data inventory for each metric.

      3.1.1 Data Inventory

      1 hour

      Click the link below to download the IT Dashboard Workbook and open the file. Select Tab 4. The pre-populated text is arranged into the tables according to the dashboard they appear on; you may need to scroll down to see all the dashboard tables.

      Create a data inventory by placing each metric identified on Tab 3 into the corresponding dashboard table. Complete each column as described below.

      A diagram that shows 9 columns of data inventory.

      Metrics Libraries: Use the IT Metrics Library and HR Metrics Library for ideas for metrics to use and how to measure them.

      Download Info-Tech IT Dashboard Workbook

      Step 3.2

      Assess Data Quality

      Activities:
      3.2.1 Use the IT Dashboard Workbook to complete an assessment of data quality on Tab 4.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 3.1 to 3.4 to ready your data for dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented data quality assessment for each metric.

      3.2.1 Assess Data Quality

      1 hour

      Document the data quality on Tab 4 of the IT Dashboard Workbook by filling in the data availability, data accuracy, and data standardization columns as described below.

      A diagram that shows data availability, data accuracy, and data standardization columns.

      Data quality is a struggle for many organizations. Consider how much uncertainty you can tolerate and what would be required to improve your data quality to an acceptable level. Consider cost, technological resources, people resources, and time required.

      Download Info-Tech IT Dashboard Workbook

      Step 3.3

      Assess Data Readiness

      Activities:
      3.3.1 Use the IT Dashboard Workbook to determine the readiness of your data.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 3.1 to 3.4 to ready your data for dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented data readiness for each metric

      3.3.1 Determine Data Readiness

      1 hour

      Once the data quality has been documented and examined, complete the Data Readiness section of Tab 4 in the Info-Tech IT Dashboard Workbook. Select a readiness classification using the definitions below. Use the readiness of your data to determine the level of effort required to obtain the data and consider the constraints and cost/ROI to implement new technology or revise processes and data gathering to produce the data.

      A diagram that shows data readiness section

      Remember: Although in most cases, simple formulas that can be easily understood are the best approach, both because effort is lower and data that is not manipulated is more trustworthy, do not abandon data because it is not perfect but instead plan to make it easier to obtain.

      Download Info-Tech IT Dashboard Workbook

      Step 3.4

      Assess Data Frequency

      Activities:
      3.4.1 Use the IT Dashboard Workbook to determine the readiness of your data and how frequently you will measure your data.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 3.1 to 3.4 to assess data inventory, quality, and readiness.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented frequency of measurement for each metric.

      3.4.1 Document Planned Frequency of measurement

      10 minutes

      Document the planned frequency of measurement for all your metrics on Tab 4 of the IT Dashboard Workbook.

      For each metric, determine how often you will need to refresh it on the dashboard and select a frequency from the drop down. The Info-tech IT Dashboards assume a monthly refresh.

      Download Info-Tech IT Dashboard Workbook

      Phase 4

      Build and Deliver Your Dashboards

      A diagram that shows phase 1 to 5.

      This phase will walk you through the following:

      • Designing your dashboards
      • Updating your dashboards
      • Crafting your story
      • Delivering your dashboards

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Using your dashboard to tell your story with visuals

      Now that you have linked metrics to the needs of your audience and you understand how to get your data, it is time to start building your dashboards.

      A diagram that highlights step 6 of creating meaningful visuals in the high-value dashboard process.

      Using visual language

      • Shortens meetings by 24%
      • Increases the ability to reach consensus by 21%
      • Strengthens persuasiveness by 43%

      — Source: American Management Association

      Phase 4 guides you through using the Info-Tech IT Dashboard visuals for your audience’s needs and your story.

      Step 4.1

      Design Your Dashboard

      Activities:
      4.1.1 Plan and validate dashboard metrics, data, level of effort and visuals.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 4.1 to 4.3 to build and deliver your dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Identified and validated metrics, data, and visuals for your IT dashboards.

      Use clear visuals that avoid distracting the audience

      Which visual is better to present?

      Sample A:
      A photo of Sample A visuals

      Sample B:
      A diagram Sample B visuals

      Select the appropriate visuals

      Identify the purpose of the visualization. Determine which of the four categories below aligns with the story and choose the appropriate visual to display the data.

      Relationship

      A photo of Scatterplots
      Scatterplots

      • Used to show relationships between two variables.
      • Can be difficult to interpret for audiences that are not familiar with them.

      Distribution

      A photo of Histogram
      Histogram

      • Use a histogram to show spread of a given numeric variable.
      • Can be used to organize groups of data points.
      • Requires continuous data.
      • Can make comparisons difficult.

      A photo of Scatterplot
      Scatterplot

      • Can show correlation between variables.
      • Show each data plot, making it easier to compare.

      Composition

      A photo of Pie chart
      Pie chart

      • Use pie charts to show different categories.
      • Avoid pie charts with numerous slices.
      • Provide numbers alongside slices, as it can be difficult to compare slices based on size alone.

      A photo of Table
      Table

      • Use tables when there are a large number of categories.
      • Presents information in a simple way.

      Comparison

      A photo of Bar graph
      Bar graph

      • Use to compare categories.
      • Easy to understand, familiar format.

      A photo of Line chart
      Line chart

      • Use to show trends or changes over time.
      • Clear and easy to analyze.

      (Calzon)

      Examples of data visualization

      To compare categories, use a bar chart:
      2 examples of bar chart
      Conclusion: Visualizing the spend in various areas helps prioritize.


      To show trends, use a line graph:
      An example of line graph.
      Conclusion: Overlaying a trend line on revenue per employee helps justify headcount costs.


      To show simple results, text is sometimes more clear:
      A diagram that shows examples of text and graphics.
      Conclusion: Text with meaningful graphics conveys messages quickly.


      To display relative percentages of values, use a pie chart:
      An example of pie chart.
      Conclusion: Displaying proportions in a pie chart gives an at-a-glance understanding of the amount any area uses.

      Choose effective colors and design

      Select colors that will enhance the story

      • Use color strategically to help draw the audience’s attention and highlight key information.
      • Choose two to three colors to use consistently throughout the dashboard, as too many colors will be distracting to the audience.
      • Use colors that connect with the audience (e.g., organization or department colors).
      • Don’t use colors that are too similar in shade or brightness level, as those with colorblindness might have difficulty discerning them.

      Keep the design simple and clear

      • Leave white space to separate sections and keep the dashboard simple.
      • Don’t measure everything; show just enough to address the audience’s needs.
      • Use blank space between data points to provide natural contrast (e.g., leaving space between each bar on a bar graph). Don’t rely on contrast between colors to separate data (Miller).
      • Label each data point directly instead of using a separate key, so anyone who has difficulty discerning color can still interpret the data (Miller).

      Example

      A example that shows colours and design of a chart.

      Checklist to build compelling visuals in your presentation

      Leverage this checklist to ensure you are creating the perfect visuals and graphs for your presentation.

      Checklist:

      • Do the visuals grab the audience’s attention?
      • Will the visuals mislead the audience/confuse them?
      • Do the visuals facilitate data comparison or highlight trends and differences in a more effective manner than words?
      • Do the visuals present information simply, cleanly, and accurately?
      • Do the visuals illustrate messages and themes from the accompanying text?

      4.1.1 Plan and validate your dashboard visuals

      1 hour

      Click the links below to download the Info-Tech IT Dashboards and the IT Dashboard Workbook. Open the IT Dashboard Workbook and select Tab 5. For each dashboard, represented by its own table, open the corresponding Info-Tech IT Dashboard as reference.

      A diagram of dashboard and its considerations when selecting visuals.

      Download Info-Tech IT Dashboards

      Download Info-Tech IT Dashboard Workbook

      Step 4.2

      Update Your Dashboards

      Activities:
      4.2.1 Update the visuals on the Info-Tech IT Dashboards with data and visuals identified in the IT Dashboard Workbook.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 4.1 to 4.3 to build and deliver your dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Dashboards updated with your visuals, metrics, and data identified in the IT Dashboard Workbook.

      4.2.1 Update visuals with your own data

      2 hours

      1. Get the data that you identified in Tab 4 and Tab 5 of the IT Dashboard Workbook.
      2. Click the link below to go to the Info-Tech IT Dashboards and follow the instructions to update the visuals.

      Do not worry about the Key Insights or Calls to Action; you will create this in the next step when you plan your story.

      Download Info-Tech IT Dashboards

      Step 4.3

      Craft Your Story and Deliver Your Dashboards

      Activities:
      4.3.1 Craft Your Story
      4.3.2 Finalize Your Dashboards
      4.3.3 Practice Delivering Your Story With Your Dashboards

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 4.1 to 4.3 to build and deliver your dashboards.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Documented situations, key insights, and calls to action for each dashboard/visual.
      • A story to tell for each dashboard.
      • Understanding of how to practice delivering the dashboards using stories.

      Stories are more easily understood and more likely to drive decisions

      IT dashboards are valuable tools to provide insights that drive decision making.

      • Monitor: Track and report on strategic areas IT supports.
      • Provide insights: sPresent important data and information to audiences in a clear and efficient way.

      “Data storytelling is a universal language that everyone can understand – from people in STEM to arts and psychology.” — Peter Jackson, Chief Data and Analytics Officer at Exasol

      Storytelling provides context, helping the audience understand and connect with data and metrics.

      • 93% of respondents (business leaders and data professionals) agreed that decisions made as a result of successful data storytelling have the potential to help increase revenue.
      • 92% of respondents agreed that data storytelling was critical to communicate insights effectively.
      • 87% percent of respondents agreed that leadership teams would make more data-driven decisions if insights gathered from data were presented more simply.

      — Exasol

      For more visual guidance, download the IT Dashboard Guide

      Include all the following pieces in your message for an effective communication

      A diagram of an effective message, including consistent, clearn, relevant, and concise.

      Info-Tech Insight

      Time is a non-renewable resource. The message crafted must be considered a value-adding communication to your audience.

      Enable good communication with these components

      Be Consistent

      • The core message must be consistent regardless of audience, channel, or medium.
      • Test your communication with your team or colleagues to obtain feedback before delivering to a broader audience.
      • A lack of consistency can be interpreted as an attempt at deception. This can hurt credibility and trust.

      Be Clear

      • Say what you mean and mean what you say.
      • Choice of language is important: “Do you think this is a good idea? I think we could really benefit from your insights and experience here.” Or do you mean: “I think we should do this. I need you to do this to make it happen.”
      • Avoid jargon.

      Be Relevant

      • Talk about what matters to the audience.
      • Tailor the details of the message to the audience’s specific concerns.
      • IT thinks in processes but wider audiences focus mostly on results; talk in terms of results.
      • IT wants to be understood, but this does not matter to stakeholders. Think: “What’s in it for them?”
      • Communicate truthfully; do not make false promises or hide bad news.

      Be Concise

      • Keep communication short and to the point so key messages are not lost in the noise.
      • There is a risk of diluting your key message if you include too many other details.
      • If you provide more information than necessary, the clarity and consistency of the message can be lost.

      Draft the core messages to communicate

      1. Hook your audience: Use a compelling introduction that ensures your target audience cares about the message. Start with a story or metaphor and then support with the data on your dashboard. Avoid rushing in with data first.
      2. Demonstrate you can help: Let the audience know that based on the unique problem, you can help. There is value in engaging and working with you further.
      3. Write for the ear: Use concise and clear sentences, avoid technological language, and when you read it aloud ensure it sounds like how you would normally speak.
      4. Interpret visuals for your audience: Do not assume they will reach the same conclusions as you. For example, walk them through what a chart shows even if the axes are labeled, tell them what a trend line indicates or what the comparison between two data points means.
      5. Identify a couple of key insights: Think about one or two key takeaways you want your audience to leave with.
      6. Finish with a call to action: Your concluding statement should not be a thank-you but a call to action that ignites how your audience will behave after the communication. Dashboards exist to drive decisions, so if you have no call to action, you should ask if you need to include the visual.

      4.3.1 Craft Your Story

      1 hour

      Click the link below to download the IT Dashboard Workbook and open the file. Select Tab 6. The workbook contains grey text that reflects a sample story about the Info-Tech IT Dashboards. You may want to keep the sample text as reference, then remove after you have entered your information.

      A diagram of dashboard to craft your story.

      Download Info-Tech IT Dashboard Workbook

      4.3.2 Finalize Your Dashboards

      30 minutes

      1. Take the Key Insights and Calls to Action that you documented in Tab 6 of the IT Dashboard Workbook and place them in their corresponding dashboard.
      2. Add any text to your dashboard as necessary but only if the visual requires more information. You can add explanations more effectively during the presentation.

      A diagram that shows strategic initiatives: deliver value to customers.

      Tip: Aim to be brief and concise with any text. Dashboards simplify information and too much text can clutter the visuals and obscure the message.

      Download Info-Tech IT Dashboard Workbook

      4.3.3 Practice Delivering Your Story With Your Dashboards

      1 hour

      Ideally you can present your dashboard to your audience so that you are available to clarify questions and add a layer of interpretation that would crowd out boards if added as text.

      1. To prepare to tell your story, consult the Situation, Key Insights, and Call to Action sections that you documented for each dashboard in Tab 6 of the Info-Tech IT Dashboard Workbook.
      2. Practice your messages as you walk through your dashboards. The next two slides provide delivery guidance.
      3. Once you deliver your dashboards, update Tab 6 with audience feedback. Often dashboards are iterative and when your audience sees them, they are usually inspired to think about what else they would like to see. This is good and shows your audience is engaged!

      Don’t overwhelm your audience with information and data. You spent time to craft your dashboards so that they are clear and concise, so spend time practicing delivering a message that matches your clear, concise dashboards

      Download Info-Tech IT Dashboard Workbook

      Hone presentation skills before meeting with key stakeholders

      Using voice and body

      Think about the message you are trying to convey and how your body can support that delivery. Hands, stance, and frame all have an impact on what might be conveyed.

      If you want your audience to lean in and be eager about your next point, consider using a pause or softer voice and volume.

      Be professional and confident

      State the main points of your dashboard confidently. While this should be obvious, it needs to be stated explicitly. Your audience should be able to clearly see that you believe the points you are stating.

      Present in a way that is genuine to you and your voice. Whether you have an energetic personality or a calm and composed personality, the presentation should be authentic to you.

      Connect with your audience

      Look each member of the audience in the eye at least once during your presentation or if you are presenting remotely, look into the camera. Avoid looking at the ceiling, the back wall, or the floor. Your audience should feel engaged – this is essential to keeping their attention.

      Avoid reading the text from your dashboard, and instead paraphrase it while maintaining eye/camera contact.

      Info-Tech Insight

      You are responsible for the response of your audience. If they aren’t engaged, it is on you as the communicator.

      Communication Delivery Checklist

      • Have you practiced delivering the communication to team members or coaches?
      • Have you practiced delivering the communication to someone with little to no technology background?
      • Are you making yourself open to feedback and improvement opportunities?
      • If the communication is derailed from your plan, are you prepared to handle that change?
      • Can you deliver the communication without reading your notes word for word?
      • Have you adapted your voice throughout the communication to highlight specific components you want the audience to focus on?
      • Are you presenting in a way that is genuine to you and your personality?
      • Can you communicate the message within the time allotted?
      • Are you moving in an appropriate manner based on your communication (e.g., toward the screen, across the stage, hand gestures)
      • Do you have room for feedback on the dashboards? Solicit feedback with your audience after the meeting and record it in Tab 6 of the IT Dashboard Workbook.

      Phase 5

      Plan, record, and action your metrics

      A diagram that shows phase 1 to 5.

      This phase will walk you through the following:

      • Planning to track your metrics
      • Recording your metrics
      • Actioning your metrics

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Actioning your metrics to drive results

      To deliver real value from your dashboards, you need to do something with the results.

      Don’t fail on execution! The whole reason you labor to create inviting visuals and meaningful metrics is to action those metrics. The metrics results inform your entire story! It’s important to plan and do, but everything is lost if you fail to check and act.

      70%: of survey respondents say that managers do not get insights from performance metrics to improve strategic decision making.
      60%: of survey respondents say that operational teams do not get insights to improve operation decision making.

      (Bernard Marr)

      “Metrics aren’t a passive measure of progress but an active part of an organization’s everyday management….Applying the “plan–do–check–act” feedback loop…helps teams learn from their mistakes and identify good ideas that can be applied elsewhere”

      (McKinsey)

      Step 5.1

      Plan How to Record Metrics

      Activities:
      5.1.1 For each dashboard, add a baseline and target to existing metrics and KPIs.

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 5.1 to 5.2 to plan, record, and action your metrics.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Baselines and targets identified and recorded for each metric.

      5.1.1 Identify Baselines and Targets

      1 hour

      To action your metrics, you must first establish what your baselines and targets are so that you can determine if you are on track.

      To establish baselines:
      If you do not have a baseline. Run your metric to establish one.

      To establish targets:

      • Use historical data and trends of performance.
      • If you do not have historical data, establish an initial target based on stakeholder-identified requirements and expectations.
      • You can also run the metrics report over a defined period of time and use the baseline level of achievement to establish an initial target.
      • The target may not always be a number – it could be a trend. The initial target may be changed after review with stakeholders.

      Actions for Success:
      How will you ensure you can get this metric? For example, if you would like to measure delivered value, to make sure the metric is measurable, you will need to ensure that measures of success are documented for an imitative and then measured once complete.

      • If you need help with Action plans, the IT Metrics Library includes action plans for all of its metrics that may help

      A diagram of identify metrics and to identify baselines and targets.

      Download Info-Tech IT Dashboard Workbook

      Step 5.2

      Record and Action Metrics

      Activities:
      5.2.1 Record and Action Results

      • Note, the Info-Tech IT Dashboards are organized by CIO priorities – Risk, Financials, Talent, and Strategic Initiatives – and address the needs of the CXO audience. The IT Dashboard Workbook is pre-populated with this information.
      • If this meets your audience’s needs, you do not have to edit this content and can instead use the pre-populated information. You may wish to review the information to ensure it is still valid for your audience.

      A diagram that shows step 5.1 to 5.2 to plan, record, and action your metrics.

      This phase involves the following participants:

      • Senior IT leadership
      • Dashboard SMEs

      Outcomes of this step:

      • Understanding of what and where to record metrics once run.

      5.2.1 Record and Action Results

      1 hour

      After analyzing your results, use this information to update your dashboards. Revisit Tab 6 of the IT Dashboard Workbook to update your story. Remember to record any audience feedback about the dashboards in the Audience Feedback section.

      Action your measures as well as your metrics

      What should be measured can change over time as your organization matures and the business environment changes. Understanding what creates business value for your organization is critical. If metrics need to be changed, record metrics actions under Identified Actions on Tab 7. A metric will need to be addressed in one of the following ways:

      • Added: A new metric is required or an existing metric needs large-scale changes (example: calculation method or scope).
      • Changed: A minor change is required to the presentation format or data. Note: a major change in a metric would be performed through the Add option.
      • Removed: The metric is no longer required, and it needs to be removed from reporting and data gathering. A final report date for that metric should be determined.
      • Maintained: The metric is still useful and no changes are required to the metric, its measurement, or how it’s reported.

      A diagram of record results and identify how to address results.

      Don’t be discouraged if you need to update your metrics a few times before you get it right. It can take some trial and error to find the measures that best indicate the health of what you are measuring.

      Download Info-Tech IT Dashboard Workbook

      Tips for actioning results

      Sometimes actioning your metrics results requires more analysis

      If a metric deviates from your target, you may need to analyze how to correct the issue then run the metric again to see if the results have improved.

      Identify Root Cause
      Root Cause Analysis can include problem exploration techniques like The 5 Whys, fishbone diagrams, or affinity mapping.

      Select a Solution
      Once you have identified a possible root cause, use the same technique to brainstorm and select a solution then re-run your metrics.

      Consider Tension Metrics
      Consider tension metrics when selecting a solution. Will improving one area affect another? A car can go faster but it will consume more fuel – a project can be delivered faster but it may affect the quality.

      Summary of Accomplishment

      Problem Solved

      1. Using this blueprint and the IT Dashboard Workbook, you validated and customized the dashboards for your audience and organization, which reduced or eliminated time spent searching for and organizing your own visuals.
      2. You documented your dashboards’ story so you are ready to present them to your audience.
      3. You assessed the data for your dashboards and you built a metrics action-tracking plan to maintain your dashboards’ metrics.

      If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation.

      Contact your account representative for more information.
      workshops@infotech.com
      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      Contact your account representative for more information.

      workshops@infotech.com
      1-888-670-8889

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      A photo of Info-Tech IT Dashboards
      Review the Info-Tech IT Dashboards
      Determine how you can use the Info-Tech IT Dashboards in your organization and the anticipated level of customization.

      A photo of the IT Dashboard Workbook
      Plan your dashboards
      Complete the IT Dashboard Workbook to help plan your dashboards using Info-Tech’s IT Dashboards.

      Research Contributors and Experts

      Photo of John Corrado
      John Corrado
      Head of IT
      X4 Pharmaceuticals

      As head of IT, John is charged with the creation of strategic IT initiatives that align with X4s vision, mission, culture, and long-term goals and is responsible for the organization’s systems, security, and infrastructure. He works closely developing partnerships with X4tizens across the organization to deliver value through innovative programs and services.

      Photo of Grant Frost
      Grant Frost
      Chief Information & Security Officer
      Niagara Catholic School Board

      Grant Frost is an experienced executive, information technologist and security strategist with extensive experience in both the public and private sector. Grant is known for, and has extensive experience in, IT transformation and the ability to increase capability while decreasing cost in IT services.

      Photo of Nick Scozzaro
      Nick Scozzaro
      CEO and Co-Founder of MobiStream and ShadowHQ
      ShadowHQ

      Nick got his start in software development and mobility working at BlackBerry where he developed a deep understanding of the technology landscape and of what is involved in both modernizing legacy systems and integrating new ones. Working with experts across multiple industries, he innovated, learned, strategized, and ultimately helped push the boundaries of what was possible.

      Photo of Joseph Sanders
      Joseph Sanders
      Managing Director of Technology/Cyber Security Services
      Kentucky Housing Corporation

      In his current role Joe oversees all IT Operations/Applications Services that are used to provide services and support to the citizens of Kentucky. Joe has 30+ years of leadership experience and has held several executive roles in the public and private sector. He has been a keynote speaker for various companies including HP, IBM, and Oracle.

      Photo of Jochen Sievert
      Jochen Sievert
      Director Performance Excellence & IT
      Zeon Chemicals

      Jochen moved to the USA from Duesseldorf, Germany in 2010 to join Zeon Chemicals as their IT Manager. Prior to Zeon, Jochen has held various technical positions at Novell, Microsoft, IBM, and Metro Management Systems.

      Info-Tech Contributors

      Ibrahim Abdel-Kader, Research Analyst
      Donna Bales, Principal Research Director
      Shashi Bellamkonda, Principal Research Director
      John Burwash, Executive Counselor
      Tony Denford, Research Lead
      Jody Gunderman, Senior Executive Advisor
      Tom Hawley, Managing Partner
      Mike Higginbotham, Executive Counselor
      Valence Howden, Principal Research Director
      Dave Kish, Practice Lead
      Carlene McCubbin, Practice Lead
      Jennifer Perrier, Principal Research Director
      Gary Rietz, Executive Counselor
      Steve Schmidt, Senior Managing Partner
      Aaron Shum, Vice President, Security & Privacy
      Ian Tyler-Clarke, Executive Counselor

      Plus, an additional four contributors who wish to remain anonymous.

      Related Info-Tech Research

      Photo of Build an IT Risk Taxonomy

      Build an IT Risk Taxonomy

      Use this blueprint as a baseline to build a customized IT risk taxonomy suitable for your organization.

      Photo of Create a Holistic IT Dashboard

      Create a Holistic IT Dashboard

      This blueprint will help you identify the KPIs that matter to your organization.

      Photo of Develop Meaningful Service Metrics

      Develop Meaningful Service Metrics

      This blueprint will help you Identify the appropriate service metrics based on stakeholder needs.

      Photo of IT Spend & Staffing Benchmarking

      IT Spend & Staffing Benchmarking

      Use this benchmarking service to capture, analyze, and communicate your IT spending and staffing.

      Photo of Key Metrics for Every CIO

      Key Metrics for Every CIO

      This short research piece highlights the top metrics for every CIO, how those align to your CIO priorities, and action steps against those metrics.

      Photo of Present Security to Executive Stakeholders

      Present Security to Executive Stakeholders

      This blueprint helps you identify communication drivers and goals and collect data to support your presentation. It provides checklists for building and delivering a captivating security presentation.

      Bibliography

      “10 Signs You Are Sitting on a Pile of Data Debt.” Experian, n.d. Web.

      “From the What to the Why: How Data Storytelling Is Key to Success.” Exasol, 2021. Web.

      Bonsignore, Marian. “Using Visual Language to Create the Case for Change.” Amarican Management Association. Accessed 19 Apr. 2023.

      Calzon, Bernardita. “Top 25 Dashboard Design Principles, Best Practices & How To’s.” Datapine, 5 Apr. 2023.

      “Data Literacy.” Tableau, n.d. Accessed 3 May 2023.

      “KPIs Don’t Improve Decision-Making In Most Organizations.” LinkedIn, n.d. Accessed 2 May 2023.

      Miller, Amanda. “A Comprehensive Guide to Accessible Data Visualization.” Betterment, 2020. Accessed May 2022.

      “Performance Management: Why Keeping Score Is so Important, and so Hard.” McKinsey. Accessed 2 May 2023.

      Vogel, Douglas, et al. Persuasion and the Role of Visual Presentation Support: The UM/3M Study. Management Information Systems Research Center School of Management University of Minnesota, 1986.

      Watson, Morag W., et al. ”IT’s Changing Mandate in an Age of Disruption.” The Economist Intelligence Unit Limited, 2021.

      Infrastructure & Operations Priorities 2022

      • Buy Link or Shortcode: {j2store}56|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Disruptive & Emerging Technologies
      • Parent Category Link: /disruptive-emerging-technologies
      • The expectation amongst IT professionals for permanent transformational change has gone up 30% year over year. Further, 47% expect a lot of permanent change in 2022.
      • We are experiencing a great rate of change concurrent with a low degree of predictability.
      • How do you translate a general trend into a specific priority you can work on?

      Our Advice

      Critical Insight

      • Trends don’t matter but pressure does: Trends can be analyzed based on the pressure they exert (or not) on your I&O practice. Organizing trends into categories based on source makes for a more successful and contextual analysis.
      • Different prioritization is being demanded in 2022. For the foreseeable future prioritization is about drawing a line, below which you can ignore items with a clean conscience.
      • The priorities you choose to advocate for will be how your leadership is evaluated in the upcoming year.

      Impact and Result

      • By reading through this publication, you will begin to address the age-old problem “You don’t know what you don’t know.”
      • More importantly you will have a framework to dive deeper into the trends most relevant to you and your organization.
      • Info-Tech can help you turn your strong opinion into a compelling case for your stakeholders.

      Infrastructure & Operations Priorities 2022 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Infrastructure & Operations Priorities 2022 – A framework to dive deeper into the trends most relevant to you and your organization

      Discover Info-Tech's four trends for Infrastructure & Operations leaders.

      • Infrastructure & Operations Priorities Report for 2022

      Infographic

      Evaluate Your Vendor Account Team to Optimize Vendor Relations

      • Buy Link or Shortcode: {j2store}222|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Understand how important your account is to the vendor and how it is classified.
      • Understand how informed the account team is about your company and your industry.
      • Understand how long the team has been with the vendor. Have they been around long enough to have developed a “brand” or trust within their organization?
      • Understand and manage the relationships and influence the account team has within your organization to maintain control of the relationship.

      Our Advice

      Critical Insight

      Conducting the appropriate due diligence on your vendor’s account team is as important as the due diligence you put into the vendor. Ongoing management of the account team should follow the lifecycle of the vendor relationship.

      Impact and Result

      Understanding your vendor team’s background, experience, and strategic approach to your account is key to the management of the relationship, the success of the vendor agreement, and, depending on the vendor, the success of your business.

      Evaluate Your Vendor Account Team to Optimize Vendor Relations Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Evaluate Your Vendor Account Team to Optimize Vendor Relations Deck – Understand the value of knowing your account team’s influence in their organization, and yours, to drive results.

      Learn how to best qualify that you have the right team for your business needs, using the accompanying tools to measure and monitor success throughout the relationship.

      • Evaluate Your Vendor Account Team to Optimize Vendor Relations Storyboard

      2. Vendor Rules of Engagement Template – Use this template to create a vendor rules of engagement document for inclusion in your company website, RFPs, and contracts.

      The Vendor Rules of Engagement template will help you develop your written expectations for the vendor for how they will interact with your business and stakeholders.

      • Vendor Rules of Engagement

      3. Evalu-Rate Your Account Team – Use this tool to develop criteria to evaluate your account team and gain feedback from your stakeholders.

      Evaluate your vendor account teams using this template to gather stakeholder feedback on vendor performance.

      • Evalu-Rate Your Account Team
      [infographic]

      Further reading

      Evaluate Your Vendor Account Team to Optimize Vendor Relations

      Understand the value of knowing your account team’s influence in their organization, and yours, to drive results.

      Analyst Perspective

      Having the wrong account team has consequences for your business.

      IT professionals interact with vendor account teams on a regular basis. You may not give it much thought, but do you have a good understanding of your rep’s ability to support/service your account, in the manner you expect, for the best possible outcome? The consequences to your business of an inappropriately assigned and poorly trained account team can have a disastrous impact on your relationship with the vendor, your business, and your budget. Doing the appropriate due diligence with your account team is as important as the due diligence you should put into the vendor. And, of course, ongoing management of the account team relationship is vital. Here we will share how best to qualify that you have the right team for your business needs as well as how to measure and monitor success throughout the relationship.

      Photo of Donna Glidden, Research Director, Vendor Management, Info-Tech Research Group.

      Donna Glidden
      Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • Understand how important your account is to the vendor and how it is classified.
      • Understand how informed the account team is about your company and your industry.
      • Understand how long the team has been with the vendor. Have they been around long enough to have developed a “brand” or trust within their organization?
      • Understand and manage the relationships and influence the account team has within your organization to maintain control of the relationship.
      Common Obstacles
      • The vendor account team “came with the deal.”
      • The vendor account team has limited training and experience.
      • The vendor account team has close relationships within your organization outside of Procurement.
      • Managing your organization’s vendors is ad hoc and there is no formalized process for vendors to follow.
      • Your market position with the vendor is not optimal.
      Info-Tech’s Approach
      • Establish a repeatable, consistent vendor management process that focuses on the account team to maintain control of the relationship and drive the results you need.
      • Create a questionnaire for gaining stakeholder feedback to evaluate the account team on a regular basis.
      • Consider adding a vendor rules of engagement exhibit to your contracts and RFXs.

      Info-Tech Insight

      Understanding your vendor team’s background, their experience, and their strategic approach to your account is key to the management of the relationship, the success of the vendor agreement, and, depending on the vendor, the success of your business.

      Blueprint benefits

      IT Benefits

      • Clear lines of communication
      • Correct focus on the specific needs of IT
      • More accurate project scoping
      • Less time wasted

      Mutual IT and
      Business Benefits

      • Reduced time to implement
      • Improved alignment between IT & business
      • Improved vendor performance
      • Improved vendor relations

      Business Benefits

      • Clear relationship guidelines based on mutual understanding
      • Improved communications between the parties
      • Mutual understanding of roles/goals
      • Measurable relationship criteria

      Insight Summary

      Overarching insight

      Conducting the appropriate due diligence on your vendor’s account team is as important as the due diligence you put into the vendor. Ongoing management of the account team should follow the lifecycle of the vendor relationship.

      Introductory/RFP phase
      • Track vendor contacts with your organization.
      • Qualify the account team as you would the vendor:
        • Background
        • Client experience
      • Consider including vendor rules of engagement as part of your RFP process.
      • How does the vendor team classify your potential account?
      Contract phase
      • Set expectations with the account team for the ongoing relationship.
      • Include a vendor rules of engagement exhibit in the contract.
      • Depending on your classification of the vendor, establish appropriate account team deliverables, meetings, etc.
      Vendor management phase
      • “Evalu-rate” your account team by using a stakeholder questionnaire to gain measurable feedback.
      • Identify the desired improvements in communications and service delivery.
      • Use positive reinforcements that result in positive behavior.
      Tactical insight

      Don’t forget to look at your organization’s role in how well the account team is able to perform to your expectations.

      Tactical insight

      Measure to manage – what are the predetermined criteria that you will measure the account team’s success against?

      Lack of adequate sales training and experience can have a negative impact on the reps’ ability to support your needs adequately

      • According to Forbes (2012), 55% of salespeople lack basic sales skills.
      • 58% of buyers report that sales reps are unable to answer their questions effectively.
      • According to a recent survey, 84% of all sales training is lost after 90 days. This is due to the lack of information retention among sales personnel.
      • 82% of B2B decision-makers think sales reps are unprepared.
      • At least 50% of prospects are not a good fit for the product or service that vendors are selling (Sales Insights Lab).
      • It takes ten months or more for a new sales rep to be fully productive.

      (Source: Spotio)

      Info-Tech Insight

      Remember to examine the inadequacies of vendor training as part of the root cause of why the account team may lack substance.

      Why it matters

      1.8 years

      is the average tenure for top ten tech companies

      2.6 years is the average experience required to hire.

      2.4 years is the average account executive tenure.

      44% of reps plan to leave their job within two years.

      The higher the average contract value, the longer the tenure.

      More-experienced account reps tend to stay longer.

      (Source: Xactly, 2021)
      Image of two lightbulbs labeled 'skill training' with multiple other buzzwords on the glass.

      Info-Tech Insight

      You are always going to be engaged in training your rep, so be prepared.

      Before you get started…

      • Take an inward look at how your company engages with vendors overall:
        • Do you have a standard protocol for how initial vendor inquiries are handled (emails, phone calls, meeting invitations)?
        • Do you have a standard protocol for introductory vendor meetings?
        • Are vendors provided the appropriate level of access to stakeholders/management?
        • Are you prompt in your communications with vendors?
        • What is the quality of the data provided to vendors? Do they need to reach out repeatedly for more/better data?
        • How well are you able to forecast your needs?
        • Is your Accounts Payable team responsive to vendor inquiries?
        • Are Procurement and stakeholders on the same page regarding the handling of vendors?
      • While you may not have a formal vendor management initiative in place, try to understand how important each of your vendors are to your organization, especially before you issue an RFP, so you can set the right expectations with potential vendor teams.
      • Classify vendors as strategic, operational, tactical, or commodity.
        • This will help you focus your time appropriately and establish the right meeting cadence according to the vendor’s place in your business.
        • See Info-Tech’s research on vendor classification.
      When you formalize your expectations regarding vendor contact with your organization and create structure around it, vendors will take notice.

      Consider a standard intake process for fielding vendor inquiries and responding to requests for meetings to save yourself the headaches that come with trying to keep up with them.

      Stakeholder teams, IT, and Procurement need to be on the same page in this regard to avoid missteps in the important introductory phase of dealing with vendors and the resulting confusion on the part of vendor account teams when they get mixed messages and feel “passed around.”

      1. Introductory Phase

      If vendors know you have no process to track their activities, they’ll call who they want when they want, and the likelihood of them having more information about your business than you about theirs is significant.

      Vendor contacts are made in several ways:

      • Cold calls
      • Emails
      • Website
      • Conferences
      • Social introductions

      Things to consider:

      • Consider having a link on your company website to your Sourcing & Procurement team, including:
        • An email address for vendor inquiries.
        • Instructions to vendors on how to engage with you and what information they should provide.
        • A link to your Vendor Rules of Engagement.
      • Track vendor inquiries so you have a list of potential respondents to future RFPs.
      • Work with stakeholders and gain their buy-in on how vendor inquiries are to be routed and handled internally.
      Not every vendor contact will result in an “engagement” such as invitation to an RFP or a contract for business. As such, we recommend that you set up an intake process to track/manage supplier inquiries so that when you are ready to engage, the vendor teams will be set up to work according to your expectations.

      2. RFP/Contract Phase

      What are your ongoing expectations for the account team?
      • Understand how your business will be qualified by the vendor. Where you fit in the market space regarding spend, industry, size of your business, etc., determines what account team(s) you will have access to.
      • Add account team–specific questions to your RFP(s) to gain an understanding of their capabilities and experience up front.
      • How have you classified the vendor/solution? Strategic, tactical, operational, or commodity?
        • Depending on the classification/criticality (See Info-Tech’s Vendor Classification Tool) of the vendor, set the appropriate expectation for vendor review meetings, e.g. weekly, monthly, quarterly, annually.
        • Set the expectation that their support of your account will be regularly measured/monitored by your organization.
        • Consider including a set of vendor rules of engagement in your RFPs and contracts so vendors will know up front what your expectations are for how to engage with Procurement and stakeholders.
      Stock image of smiling coworkers.

      3. Ongoing Vendor Management

      Even if you don’t have a vendor management initiative in place, consider these steps to manage both new and legacy vendor relationships:
      • Don’t wait until there is an issue to engage the account team. Develop an open, honest relationship with vendors and get to know their key players.
      • Seek regular feedback from stakeholders on both parties’ performance against the agreement, based on agreed-upon criteria.
      • Measure vendor performance using the Evalu-Rate Your Account Team tool included with this research.
      • Based on vendor criticality, set a regular cadence of vendor meetings to discuss stakeholder feedback, both positive feedback as well as areas needing improvement and next steps, if applicable.
      Stock image of smiling coworkers.

      Info-Tech Insight

      What your account team doesn’t say is equally important as what they do say. For example, an account rep with high influence says, “I can get that for you” vs. “I'll get back to you.” Pay attention to the level of detail in their responses to you – it references how well they are networked within their own organization.

      How effective is your rep?

      The Poser
      • Talks so much they forget to listen
      • Needs to rely on the “experts”
      • Considers everyone a prospect
      Icons relating to the surrounding rep categories. Ideal Team Player
      • Practices active listening
      • Understands the product they are selling
      • Asks great questions
      • Is truthful
      • Approaches sales as a service to others
      The Bulldozer
      • Unable to ask the right questions
      • If push comes to shove, they keep pushing until you push back
      • Has a sense of entitlement
      • Lacks genuine social empathy
      Skillful Politician
      • Focuses on the product instead of people
      • Goes by gut feel
      • Fears rejection and can’t roll with the punches

      Characteristics of account reps

      Effective
      • Is truthful
      • Asks great questions
      • Practices active listening
      • Is likeable and trustworthy
      • Exhibits emotional intelligence
      • Is relatable and knowledgeable
      • Has excellent interpersonal skills
      • Has a commitment to personal growth
      • Approaches sales as a service to others
      • Understands the product they are selling
      • Builds authentic connections with clients
      • Is optimistic and has energy, drive, and confidence
      • Makes an emotional connection to whatever they are selling
      • Has the ability to put themselves in the position of the client
      • Builds trust by asking the right questions; listens and provides appropriate solutions without overpromising and underdelivering
      Ineffective
      • Goes by gut feel
      • Has a sense of entitlement
      • Lacks genuine social empathy.
      • Considers everyone a prospect
      • Is unable to ask the right questions.
      • Is not really into sales – it’s “just a job”
      • Focuses on the product instead of people
      • Loves to talk so much they forget to listen
      • Fears rejection and can’t roll with the punches
      • If push comes to shove, they keep pushing until you push back
      • Is clueless about their product and needs to rely on the “experts”

      How to support an effective rep

      • Consider being a reference account.
      • Say thank you as a simple way to boost morale and encourage continued positive behavior.
      • If you can, provide opportunities to increase business with the vendor – that is the ultimate thanks.
      • Continue to support open, honest communication between the vendor and your team.
      • Letters or emails of recognition to the vendor team’s management have the potential to boost the rep’s image within their own organization and shine a spotlight on your organization as a good customer.
      • Supplier awards for exemplary service and support may be awarded as part of a more formal vendor management initiative.
      • Refer to the characteristics of an effective rep – which ones best represent your account team?
      A little recognition goes a long way in reinforcing a positive vendor relationship.

      Info-Tech Insight

      Don’t forget to put the relationship in vendor relationship management – give a simple “Thank you for your support” to the account team from executive management.

      How to support an ineffective rep

      An ineffective rep can take your time and attention away from more important activities.
      • Understand what role, if any, you and/or your stakeholders may play in the rep’s lack of performance by determining the root cause:
        • Unrealistic expectations
        • Unclear and incomplete instructions
        • Lack of follow through by your stakeholders to provide necessary information
        • Disconnects between Sourcing/Procurement/IT that lead to poor communication with the vendor team (lack of vendor management)
      • Schedule more frequent meetings with the team to address the issues and measure progress.
      • Be open to listening to your rep(s) and ask them what they need from you in order to be effective in supporting your account.
      • Be sure to document in writing each instance where the rep has underperformed and include the vendor team’s leadership on all communications and meetings.
      • Refer to the characteristics of an ineffective rep – which ones best describe your ineffective vendor rep?
      “Addressing poor performance is an important aspect of supplier management, but prevention is even more so.” (Logistics Bureau)

      Introductory questions to ask vendor reps

      • What is the vendor team’s background, particularly in the industry they are representing? How did they get to where they are?
        • Have they been around long enough to have developed credibility throughout their organization?
        • Do they have client references they are willing to share?
      • How long have they been in this position with the vendor?
        • Remember, the average rep has less than 24 months of experience.
        • If they lack depth of experience, are they trainable?
      • How long have they been in the industry?
        • Longevity and experience matters.
      • What is their best customer experience?
        • What are they most proud of from an account rep perspective?
      • What is their most challenging customer experience?
        • What is their biggest weakness?
      • How are their relationships with their delivery and support teams?
        • Can they get the job done for you by effectively working their internal relationships?
      • What are their goals with this account?
        • Besides selling a lot.
      • What relationships do they have within your organization?
        • Are they better situated within your organization than you are?
      Qualify the account team as you would the vendor – get to know their background and history.

      Vendor rules of engagement

      Articulate your vendor expectations in writing

      Clearly document your expectations via formal rules of engagement for vendor teams in order to outline how they are expected to interact with your business and stakeholders. This can have a positive impact on your vendor and stakeholder relationships and enable you to gain control of:

      • Onsite visits and meetings.
      • Submission of proposals, quotes, contracts.
      • Communication between vendors, stakeholders and Procurement.
      • Expectations for ongoing relationship management.

      Include the rules in your RFXs and contracts to formalize your expectations.

      See the Vendor Rules of Engagement template included with this research.

      Download the Vendor Rules of Engagement template

      Sample of the Vendor Rules of Engagement template.

      Evalu-rate your vendor account team

      Measure stakeholder feedback to ensure your account team is on target to meet your needs. Sample of the Evalu-Rate Your Account Team tool.

      Download the Evalu-Rate Your Account Team tool

      • Use a measurable, repeatable process for evaluations.
      • Include feedback from key stakeholders engaged in the relationship.
      • Keep the feedback fact based and have backup.

      Final thoughts: Do’s and don’ts

      DO

      • Be friendly, approachable.
      • Manage the process by which vendors contact your organization – take control!
      • Understand your market position when sourcing goods/services to establish how much leverage you have with vendors.
      • Set vendor meetings according to their criticality to your business.
      • Evaluate your account teams to understand their strengths/weaknesses.
      • Gain stakeholder buy-in to your vendor processes.

      DON'T

      • Don’t be “friends.”
      • Don’t criticize in public.
      • Don’t needlessly escalate.
      • Don’t let the process of vendors communicating with your stakeholders “just happen.”
      • Don’t accept poor performance or attitude.

      Summary of Accomplishment

      Problem Solved

      Upon completion of this blueprint, Guided Implementation, or workshop, your team should have a comprehensive, well-defined, end-to-end approach to evaluating and managing your account team. Leveraging Info-Tech’s industry-proven tools and templates provides your organization with an effective approach to establishing, maintaining, and evaluating your vendor account team; improving your vendor and stakeholder communications; and maintaining control of the client/vendor relationship.

      Additionally, your team will have a foundation to execute your vendor management principles. These principles will assist your organization in ensuring you receive the perceived value from the vendor as a result of your vendor account team evaluation process.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Bibliography

      “14 Essential Qualities of a Good Salesperson.” Forbes, 5 Oct. 2021. Accessed 11 March 2022.

      “149 Eye-Opening Sales Stats to Consider.” Spotio, 30 Oct. 2018. Accessed 11 March 2022.

      “35 Sales Representative Interview Questions and Answers.” Indeed, 29 Oct. 2021. Accessed 8 March 2022.

      “8 Intelligent Questions for Evaluating Your Sales Reps Performance” Inc., 16 Aug. 2016. Accessed 9 March 2022.

      Altschuler, Max. “Reality Check: You’re Probably A Bad Salesperson If You Possess Any Of These 11 Qualities.” Sales Hacker, 9 Jan. 2018. Accessed 4 May 2022.

      Bertuzzi, Matt. “Account Executive Data Points in the SaaS Marketplace.” Treeline, April 12, 2017. Accessed 9 March 2022. “Appreciation Letter to Vendor – Example, Sample & Writing Tips.” Letters.org, 10 Jan. 2020. Web.

      D’Entremont, Lauren. “Are Your Sales Reps Sabotaging Your Customer Success Without Realizing It?” Proposify, 4 Dec. 2018. Accessed 7 March 2022.

      Freedman, Max. “14 Important Traits of Successful Salespeople.” Business News Daily, 14 April 2022. Accessed 10 April 2022.

      Hansen, Drew. “6 Tips For Hiring Your Next Sales All-Star.” Forbes, 16 Oct. 2012. Web.

      Hulland, Ryan. “Getting Along with Your Vendors.” MonMan, 12 March 2014. Accessed 9 March 2022.

      Lawrence, Jess. “Talking to Vendors: 10 quick tips for getting it right.” Turbine, 30 Oct. 2018. Accessed 11 March 2022.

      Lucero, Karrie. “Sales Turnover Statistics You Need To Know.” Xactly, 24 Aug. 2021. Accessed 9 March 2022.

      Noyes, Jesse. “4 Qualities to Look For in Your Supplier Sales Representative.” QSR, Nov. 2017. Accessed 9 March 2022.

      O’Byrne, Rob. “How To Address Chronic Poor Supplier Performance.” Logistics Bureau, 26 July 2016. Accessed 4 May 2022.

      O'Brien, Jonathan. Supplier Relationship Management: Unlocking the Hidden Value in Your Supply Base. Kogan Page, 2014.

      Short, Alex. “Three Things You Should Consider to Become A Customer of Choice.” Vizibl, 29 Oct. 2021. Web.

      Wayshak, Marc. “18 New Sales Statistics for 2022 from Our Groundbreaking Study!” Sales Insights Lab, 28 March 2022. Web.

      “What Does a Good Customer Experience Look Like In Technology?” Virtual Systems, 23 June 2021. Accessed 10 March 2022.

      Tymans Group Consulting

      IT resilience, carefree entrepreneurship.

      Discover and implement all the ingredients that make your IT perform fast and rock solid.

      Yes, I want stable and performant IT Operations

      We are multidisciplinary infrastructure and IT Operations experts.
      We bring passion, focus, and results to our work and your company.

      TY innovates resilience embedding in your organization

      Let's have a chat

      • TY as your advisor

        This gives you our expertise on tap. Do you have an issue? Call us. You want to have a sparring partner to solve a problem? Call us. Do you need a sounding board? Call us.

        TY provides advisory services as well as traditional consulting. We also execute study and revision services for your policies, standards, procedures, and guidelines to ensure compliance with DORA, NIS2 and corporate requirements of both your own company and that of your clients. And we also check against our internal best ways of working.

        Book a conversation

      • Focused Consulting and Implementing

        This is where you have our undivided attention, and we work with you one on one until resolution. Note that there is a waiting period for this service at this time.

        If you are interested, please first book a call so that we can determine if we are a good fit together.

        Book a conversation

      What our relations tell us

      • Citigroup Manager

        As a technical consultant, Gert is an All-Star performer...  He has got many wins under his belt... His willingness to work hard, knowledge of regional systems (especially Tokyo) and Microsoft Office is well respected within the Group 

      • Sandra

        Tx for all the efforts done! Great Job! And good luck for the ones amongst you that still need to work tomorrow Grtz Sandra VB
      • Patrick A.

        Hi Gert, I'm busy documenting .... Thanks for your real friendly and careful, yet effective support :-) Patrick A.
      • Lucie VH

        During my vacation, Gert took over the management of a number of ongoing problems. Even before I actually left for my trip, he took action and proposed a number of improvements. Gert coordinated between the different stakeholders and PTA's and resolved a number of acute issues. And he did this in a very pleasant, yet effective way.
      • Dawn

        No worries. It only freaked me out for a few minutes, then I saw that the system had blocked them from doing any real damage. Thanks for the cleanup and extra measures, though! As always, you rock!
      • After a successful DRP

        Thanks for all the efforts done ans special Tx Gert for Coordinating this again!
      • A CIO

        Yet again Gert, Thanks for handling this in such a top way!
      • A Sales Manager

        Awesome Gert, I will let the team know we can close this issue!
      • Investment bank manager

        Flexibility, Adaptability, problem Solving are Gert's strong points, Exceptionally beneficial in "crisis." I can attest that Gert will always see a problem through. if he needs to hand it off, it will aways have good handoff notes. His business knowledge is good and will part of the next project.

      • Wall Street Performance Review

        As with the classes for SFC, Gert organised formal classes for all of the Research IT teams.... I would class this job as well done, given everything that was going on with Rsearch IT. 

      • Stuart B on Gert Taeymans

        Excellent technical resource. Quick help on issues and provide explanations to regional teams. Often covers for us in the evenings or when things get particularly busy.

      • Asia support to roll out global system

        Gert time in Japan was a great success. He really helped the IT group through a really difficult tume during the roll out of {the global research publishing system} and had to cover all the bases that had not been properly coverd by the previous person in Japan. Gert's visit also coincided with Stuart's joining into the Asia IT Research group. Gert was very flexible  in the hours that he worked and the lenght of time he was out in Tokyo (in the end more than 4 weeks.)

        The feedback from both the users and the IT group was VERY positive on Gertt's contribution. He was more than capabable to put across technical points to the IT team, in their language.

      • IT Director

        Gert is a knowledgeable individual who takes on additional responsibility... rapidly addressng end-user issues and developing custom solutions when needed.

      Benefits of working with Tymans Group

      • We focus on actual deliverables

        TY delivers on the IT resilience what and how. Get actionable IT, management, governance, and productivity research, insights, blueprints with templates, easy-to-use tools, and clear instructions to help you execute effectively and become IT resilient.

      • Get insights from top IT professionals

        Our TY network base constantly informs us about our IT resilience research and validates it through client experiences. TY adds to that by applying this research to real-world situations in Belgium, the Netherlands, Germany, Europe and the US.

      • Data-driven insights

        It is tempting to use your gut instinct. Don't. Everything TY does, is data-driven. From our research to our interactions with you, we use an analytical approach to help you move forward with your key IT resilience projects.

      Frequently asked questions

      • How does Tymans Group IT Operations advisory work?

        TY believes strongly in leveraging technology and personal delivery. That is why TY uses one on one calling sessions using Teams and Zoom. When needed I do on site delivery.

        Every advisory option has a set number of interactive contact points in addition to email and chat options. Every contact request is answered by me personally. 

        Through the use of technology, I ensure that instead of you having to drive to your coach, the coach “comes” to you!

      • What are Tymans Group advisory service timings?

        TY is available on European time from 09:00 until 17:00 and US EST 09:00-17:00 (depending on already booked appointments). 

      • How much to Tymans Group programs cost?

        While this is a difficult question to answer, let's give it a shot.

        Ideally I work value-based. But this is more for well-defined projects where the ROI is quantifiable rather than qualifiable.

        Often advisory services are a discovery and we obtain results together. You may even only need an experienced sounding board. This type of pricing starts from €4,500.

      • Does Tymans Group have a "pick your brain" option?

        By popular demand, yes, I added this. It is not the cheapest way to use me, but it may be the most effective for you.

      • How are Tymans Group advisory services delivered?

        TY believes strongly in leveraging technology and personal delivery. That is why TY uses one on one calling sessions using Teams and Zoom. When needed I do on site delivery.

        This way I ensure that instead of you having to drive to your coach, the coach “comes” to you!

        You are allowed to record the sessions and use them internally in your organization, including as part of your internal training. You are not allowed to resell these without a resale agreement.

      • Tymans Group is delivered online via calls? Isn't on-site better?

        Interestingly, in the majority of advisory services the answer is no.

        Purely on-site automatically limits the time we can spend together. Thus, typically, the interactions are of a shorter duration. Even when this is done over a longer timeframe, like 5 to 10 days, this is really too short for effective advising, coaching and mentoring. 

        We stay away from accelerated programs, where I can send a lot of information, and most of it will not stick.

        Terry Sejnowski  a neuroscientist, actually states that cramming does not help you remember. It gets you, maybe, through the next exam, but the information is not retained. The way to integrate and remember information is to spread out the study and repeat. This is called the spacing effect.

        This is why I employ the online delivery method. When you record our sessions, you can come back and again repeat it, note down your questions and fire them off to me. I respond and you go back into the talk. Then you apply, possibly fail, and come back again until it succeeds, and then you make it your own.

        That is why time-pressured, on-site delivery does not work. Our method makes you effective because you internalized the material and feedback. This can then be rounded-off by on-site finalization.

        10-15 years ago, this was not possible, as the web-based tools were simply not fast enough. Today, unless you are taking classes like carpentry or other topics that require on-site delivery, online delivery is the way to go.

      • Can I pay by wire transfer?

        We actually prefer wire transfer. It cuts down on the financial fees and it is the norm in the European Union. Our US customer can also use this feature and pay into our US bank.

      • Where is Tymans Group located?

        Tymans Group has two locations:

        In Europe, Belgium and in Greenville, DE, United States, 

        The HQ is in Belgium.

      • Does this work for less than 25 employees?

        Resilience is not size-dependent. That said, if you are supplying critical services to financial services firms, you may not have a choice. In that case, be prepared to up your game. Call TY in this case. We can help you fulfill third-party requirements, such as the DORA regulation.

        In other cases, if you plan to grow your company beyond 25 employees, then yes. Start with the basics, though. Make sure you have a good understanding of your current challenges. Schedule a chat with me to determine the right baseline.

        If you are just starting out and want to ensure that your company's processes are correct right out of the gate, it's better to give me a call. We can start you off in the right direction without spending too much.

        Our guides are only available to existing advisory clients. Let's chat informally if we are a fit for you.

      • I'm a small business owner, can I do all this by myself?

        Our guides are only available to existing advisory clients.

        But also see the above question about company size and target clients. If you have fewer than 25 employees and you are not supplying critical services to financial institutions, then maybe some of our guides are not for you. We can still help you organize your resilience, but it may be more cost-effective to use only our TY Advisory services.

        Once you grow beyond 25 employees, you will benefit from our processes. Just implement what you need. How do you know what you require? You probably already have an inkling of what is lacking in your organization. If you are unsure, please get in touch with us.

        In short, the answer is yes, and TY can help you. Once you know what you are looking for, that guide allows you to handle it yourself. If you require help selecting the right guide, please get in touch with us.

      • Do you provide refunds?

        Before buying the DIY guides, available only to existing advisory clients,, please refer to the free Executive Summary when available. If there is no Executive summary available, please contact me with any questions you have. 

        As these are downloadable products, I cannot provide any refunds, but I will help you with any exchange where you have a good reason. 

      • I bought the wrong item

        If you bought the wrong item, please contact me and we'll be happy to provide an alternative item.

      • I want more assistance

        Yes, more assistance is available.  Tymans Group can provide you with any assistance you require within the parameters of your contract.

        Per-guide assistance ranges from a single phone or video consultation to guided implementation or a workshop. Alternatively we can go to do-it-for-you implementation or even full-time consulting.

        Note that our guides are only available to existing advisory clients.

        Please contact me for a talk.

      I want more information to become more resilient.

      Continue reading

      2020 Security Priorities Report

      • Buy Link or Shortcode: {j2store}245|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting

      Use this deck to learn what projects security practitioners are prioritizing for 2020. Based on a survey of 460 IT security professionals, this report explains what you need to know about the top five priorities, including:

      • Signals and drivers
      • Benefits
      • Critical uncertainties
      • Case study
      • Implications

      While the priorities should in no way be read as prescriptive, this research study provides a high-level guide to understand that priorities drive the initiatives, projects, and responsibilities that make up organizations' security strategies.

      Our Advice

      Critical Insight

      There is always more to do, and if IT leaders are to grow with the business, provide meaningful value, and ascend the ladder to achieve true business partner and innovator status, aggressive prioritization is necessary. Clearly, security has become a priority across organizations, as security budgets have continued to increase over the course of 2019. 2020’s priorities highlight that data security has become the thread that runs through all other security priorities, as data is now the currency of the modern digital economy. As a result, data security has reshaped organizations’ priorities to ensure that data is always protected.

      Impact and Result

      Ultimately, understanding how changes in technology and patterns of work stand to impact the day-to-day lives of IT staff across seniority and industries will allow you to evaluate what your priorities should be for 2020. Ensure that you’re spending your time right. Use data to validate. Prioritize and implement.

      2020 Security Priorities Report Research & Tools

      Start here – read the Executive Brief

      This storyboard will help you understand what projects security practitioners are prioritizing for 2020.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Data security

      Data security often rubs against other organizational priorities like data quality, but organizations need to understand that the way they store, handle, and dispose of data is now under regulatory oversight.

      • 2020 Security Priorities Report – Priority 1: Data Security

      2. Cloud security

      Cloud security means that organizations can take advantage of automation tools not only for patching and patch management but also to secure code throughout the SDLC. It is clear that cloud will transform how security is performed.

      • 2020 Security Priorities Report – Priority 2: Cloud Security

      3. Email security

      Email security is critical, since email continues to be one of the top points of ingress for cyberattacks from ransomware to business email compromise.

      • 2020 Security Priorities Report – Priority 3: Email Security

      4. Security risk management

      Security risk management requires organizations to make decisions based on their individual risk tolerance on such things as machine learning and IoT devices.

      • 2020 Security Priorities Report – Priority 4: Security Risk Management

      5. Security awareness and training

      Human error continues to be a security issue. In 2020, organizations should tailor their security awareness and training to their people so that they are more secure not only at work but also in life.

      • 2020 Security Priorities Report – Priority 5: Security Awareness and Training
      [infographic]

      Harness Configuration Management Superpowers

      • Buy Link or Shortcode: {j2store}303|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $12,999 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Asset Management
      • Parent Category Link: /asset-management
      • Configuration management databases (CMDB) are a lot of work to build and maintain. Starting down this process without the right tools, processes, and buy-in is a lot of work with very little reward.
      • If you decide to just build it and expect they will come, you may find it difficult to articulate the value, and you will be disappointed by the lack of visitors.
      • Relying on manual entry or automated data collection without governance may result in data you can’t trust, and if no one trusts the data, they won’t use it.

      Our Advice

      Critical Insight

      • The right mindset is just as important as the right tools. By involving everyone early, you can ensure the right data is captured and validated and you can make maintenance part of the culture. This is critical to reaching early and continual value with a CMDB.

      Impact and Result

      • Define your use cases: Identify the use cases and prioritize those objectives into phases. Define what information will be needed to meet the use cases and how that information will be populated.
      • Understand and design the CMDB data model: Define services and undiscoverable configuration items (CI) and map them to the discoverable CIs.
      • Operationalize configuration record updates: Define data stewards and governance processes and integrate your configuration management practice with existing practices and lifecycles.

      Harness Configuration Management Superpowers Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Harness Configuration Management Superpowers Deck – A step-by-step document that walks you through creating a configuration management program.

      Use this blueprint to create a configuration management program that provides immediate value.

      • Harness Configuration Management Superpowers – Phases 1-4

      2. Configuration Management Project Charter Template – A project charter template to help you build a concise document for communicating appropriate project details to stakeholders.

      Use this template to create a project charter to launch the configuration management project.

      • Configuration Management Project Charter

      3. Configuration Control Board Charter Template – A board charter template to help you define the roles and responsibilities of the configuration control board.

      Use this template to create your board charter for your configuration control board (CCB). Define roles and responsibilities and mandates for the CCB.

      • Configuration Control Board Charter

      4. Configuration Management Standard Operating Procedures (SOP) Template – An SOP template to describe processes and procedures for ongoing maintenance of the CMDB under the configuration management program.

      Use this template to create and communicate your SOP to ensure ongoing maintenance of the CMDB under the configuration management program.

      • Configuration Management Standard Operation Procedures

      5. Configuration Management Audit and Validation Checklist Template – A template to be used as a starting point to meet audit requirements under NIST and ITIL programs.

      Use this template to assess capability to pass audits, adding to the template as needed to meet internal auditors’ requirements.

      • Configuration Management Audit and Validation Checklist

      6. Configuration Management Policy Template – A template to be used for building out a policy for governance over the configuration management program.

      Use this template to build a policy for your configuration management program.

      • Configuration Management Policy

      7. Use Cases and Data Worksheet – A template to be used for validating data requirements as you work through use cases.

      Use this template to determine data requirements to meet use cases.

      • Use Cases and Data Worksheet

      8. Configuration Management Diagram Template Library – Examples of process workflows and data modeling.

      Use this library to view sample workflows and a data model for the configuration management program.

      • Configuration Management Diagram Template Library (Visio)
      • Configuration Management Diagram Template Library (PDF)

      9. Configuration Manager Job Description – Roles and responsibilities for the job of Configuration Manager.

      Use this template as a starting point to create a job posting, identifying daily activities, responsibilities, and required skills as you create or expand your configuration management program.

      • Configuration Manager

      Infographic

      Workshop: Harness Configuration Management Superpowers

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Configuration Management Strategy

      The Purpose

      Define the scope of your service configuration management project.

      Design the program to meet specific stakeholders needs

      Identify project and operational roles and responsibilities.

      Key Benefits Achieved

      Designed a sustainable approach to building a CMDB.

      Activities

      1.1 Introduction

      1.2 Define challenges and goals.

      1.3 Define and prioritize use cases.

      1.4 Identify data needs to meet these goals.

      1.5 Define roles and responsibilities.

      Outputs

      Data and reporting use cases based on stakeholder requirements

      Roles and responsibility matrix

      2 CMDB Data Structure

      The Purpose

      Build a data model around the desired use cases.

      Identify the data sources for populating the CMDB.

      Key Benefits Achieved

      Identified which CIs and relationships will be captured in the CMDB.

      Activities

      2.1 Define and prioritize your services.

      2.2 Evaluate CMDB default classifications.

      2.3 Test configuration items against existing categories.

      2.4 Build a data model diagram.

      Outputs

      List of CI types and relationships to be added to default settings

      CMDB data model diagram

      3 Processes

      The Purpose

      Key Benefits Achieved

      Built a right-sized approach to configuration record updates and data validation.

      Activities

      3.1 Define processes for onboarding, offboarding, and maintaining data in the CMDB.

      3.2 Define practices for configuration baselines.

      3.3 Build a data validation and auditing plan.

      Outputs

      Documented processes and workflows

      Data validation and auditing plan

      4 Communications & Roadmap

      The Purpose

      Key Benefits Achieved

      Metrics program defined

      Communications designed

      Activities

      4.1 Define key metrics for configuration management.

      4.2 Define metrics for supporting services.

      4.3 Build configuration management policies.

      4.4 Create a communications plan.

      4.5 Build a roadmap

      Outputs

      Policy for configuration management

      Communications documents

      Roadmap for next steps

      Further reading

      Harness Configuration Management Superpowers

      Create a configuration management practice that will provide ongoing value to the organization.

      EXECUTIVE BRIEF

      Analyst Perspective

      A robust configuration management database (CMDB) can provide value to the business and superpowers to IT. It's time to invest smartly to reap the rewards.

      IT environments are becoming more and more complex, and balancing demands for stability and demands for faster change requires visibility to make the right decisions. IT needs to know their environment intimately. They need to understand dependencies and integrations and feel confident they are making decisions with the most current and accurate view.

      Solutions for managing operations rely on the CMDB to bring visibility to issues, calculate impact, and use predictive analytics to fix performance issues before they become major incidents. AIOps solutions need accurate data, but they can also help identify configuration drift and flag changes or anomalies that need investigation.

      The days of relying entirely on manual entry and updates are all but gone, as the functionality of a robust configuration management system requires daily updates to provide value. We used to rely on that one hero to make sure information was up to date, but with the volume of changes we see in most environments today, it's time to improve the process and provide superpowers to the entire IT department.

      This is a picture of Sandi Conrad

      Sandi Conrad, ITIL Managing Professional
      Principal Research Director, IT Infrastructure & Operations, Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Build a configuration management database (CMDB): You need to implement a CMDB, populate it with records and relationships, and integrate it with discovery and management tools.
      • Identify the benefits of a CMDB: Too many CMDB projects fail because IT tries to collect everything. Base your data model on the desired use cases.
      • Define roles and responsibilities: Keeping data accurate and updated is difficult. Identify who will be responsible for helping

      Common Obstacles

      • Significant process maturity is required: Service configuration management (SCM) requires high maturity in change management, IT asset management, and service catalog practices.
      • Large investment: Building a CMDB takes a large amount of effort, process, and expertise.
      • Tough business case: Configuration management doesn't directly provide value to the business, but it requires a lot of investment from IT.

      Info-Tech's Approach

      • Define your scope and objectives: Identify the use cases for SCM and prioritize those objectives into phases.
      • Design the CMDB data model: Align with your existing configuration management system's data model.
      • Operationalize configuration record updates: Integrate your SCM practice with existing practices and lifecycles.

      Start small

      Scope creep is a serial killer of configuration management databases and service configuration management practices.

      Insight summary

      Many vendors are taking a CMDB-first approach to enable IT operations or sometimes asset management. It's important to ensure processes are in place immediately to ensure the data doesn't go stale as additional modules and features are activated.

      Define processes early to ensure success

      The right mindset is just as important as the right tools. By involving everyone early, you can ensure the right data is captured and validated and you can make maintenance part of the culture. This is critical to reaching early and continual value with a CMDB.

      Identify use cases

      The initial use case will be the driving force behind the first assessment of return on investment (ROI). If ROI can be realized early, momentum will increase, and the team can build on the initial successes.

      If you don't see value in the first year, momentum diminishes and it's possible the project will never see value.

      Keep the initial scope small and focused

      Discovery can collect a lot of data quickly, and it's possible to be completely overwhelmed early in the process.

      Build expertise and troubleshoot issues with a smaller scope, then build out the process.

      Minimize customizations

      Most CMDBs have classes and attributes defined as defaults. Use of the defaults will enable easier implementation and faster time to value, especially where automations and integrations depend on standard terms for field mapping.

      Automate as much as possible

      In large, complex environments, the data can quickly become unmanageable. Use automation as much as possible for discovery, dependency mapping, validation, and alerts. Minimize the amount of manual work but ensure everyone is aware of where and how these manual updates need to happen to see continual value.

      Info-Tech's Harness Configuration Management Superpowers.

      Configuration management will improve functionality of all surrounding processes

      A well-functioning CMDB empowers almost all other IT management and governance practices.

      Service configuration management is about:

      • Building a system of record about IT services and the components that support those services.
      • Continuously reconciling and validating information to ensure data accuracy.
      • Ensuring the data lifecycle is defined and well understood and can pass data and process audits.
      • Accessing information in a variety of ways to effectively serve IT and the business.
      An image of Info-Tech's CMDB Configuration Management tree, breaking down aspects into the following six categories: Strategic Partner; Service Provider; Proactive; Stabilize; Core; and Foundational.

      Configuration management most closely impacts these practices

      Info-Tech Research Group sees a clear relationship.

      When an IT department reports they are highly effective at configuration management, they are much more likely to report they are highly effective at these management and governance processes:

      The following management and governance processes are listed: Quality Management; Asset Management; Performance Measurement; Knowledge Management; Release Management; Incident and Problem Management; Service Management; Change Management.

      The data is clear

      Service configuration management is about more than just doing change management more effectively.

      Source: Info-Tech Research Group, IT Management and Governance Diagnostic; N=684 organizations, 2019 to July 2022.

      Make the case to use configuration management to improve IT operations

      Consider the impact of access to data for informing innovations, optimization efforts, and risk assessments.

      75% of Uptime's 2021 survey respondents who had an outage in the past three years said the outage would have been prevented if they'd had better management or processes.(1)

      75%

      75% of Uptime's 2021 survey respondents who had an outage in the past three years said the outage would have been prevented if they'd had better management or processes.(1)

      42%

      of publicly reported outages were due to software or configuration issues. (1)

      58%

      of networking-related IT outages were due to configuration and change management failure.(1)

      It doesn't have to be that way!

      Enterprise-grade IT service management (ITSM) tools require a CMDB for the different modules to work together and to enable IT operations management (ITOM), providing greater visibility.

      Decisions about changes can be made with accurate data, not guesses.

      The CMDB can give the service desk fast access to helpful information about the impacted components, including a history of similar incidents and resolutions and the relationship between the impacted components and other systems and components.

      Turn your team into IT superheroes.

      CMDB data makes it easier for IT Ops groups to:

      • Avoid change collisions.
      • Eliminate poor changes due to lack of visibility into complex systems.
      • Identify problematic equipment.
      • Troubleshoot incidents.
      • Expand the services provided by tier 1 and through automation.

      Benefits of configuration management

      For IT

      • Configuration management will supercharge processes that have relied on inherent knowledge of the IT environment to make decisions.
      • IT will more quickly analyze and understand issues and will be positioned to improve and automate issue identification and resolution.
      • Increase confidence and reduce risks for decisions involving release and change management with access to accurate data, regardless of the complexity of the environment.
      • Reduce or eliminate unplanned work related to poor outcomes due to decisions made with incorrect or incomplete data.

      For the Business

      • Improve strategic planning for business initiatives involving IT solutions, which may include integrations, development, or security concerns.
      • More quickly deploy new solutions or updates due to visibility into complex environments.
      • Enable business outcomes with reliable and stable IT systems.
      • Reduce disruptions caused by planning without accurate data and improve resolution times for service interruptions.
      • Improve access to reporting for budgeting, showbacks, and chargebacks as well as performance metrics.

      Measure the value of this blueprint

      Fast-track your planning and increase the success of a configuration management program with this blueprint

      Workshop feedback
      8.1/10

      $174,000 savings

      30 average days saved

      Guided Implementation feedback

      8.7/10

      $31,496 average savings

      41 average days saved

      "The workshop was well run, with good facilitation, and gained participation from even the most difficult parts of the audience. The best part of the experience was that if I were to find myself in the same position in the future, I would repeat the workshop."

      – University of Exeter

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3 Phase 4

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Prioritize services and use cases.

      Call #3: Identify data needed to meet goals.

      Call #4: Define roles and responsibilities.

      Call #5: Define and prioritize your services.

      Call #6: Evaluate and test CMDB default classifications.

      Call #7: Build a data model diagram.

      Call #8: Define processes for onboarding, offboarding, and maintaining data.

      Call #9: Discuss configuration baselines.

      Call #10: Build a data validation and audit plan.

      Call #11: Define key metrics.

      Call #12: Build a configuration management policy and communications plan.

      Call #13: Build a roadmap.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 12 calls over the course of 4 to 9 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4

      Configuration Management Strategy

      CMDB Data Structure

      Process Design

      Communications & Roadmap

      Activities
      • Introduction
      • Define challenges and goals.
      • Define and prioritize use cases.
      • Identify data needed to meet goals.
      • Define roles and responsibilities.
      • Define and prioritize your services.
      • Evaluate CMDB default classifications.
      • Test configuration items against existing categories.
      • Build a data model diagram.
      • Define processes for onboarding, offboarding, and maintaining data in the CMDB.
      • Define practices for configuration baselines.
      • Build a data validation and auditing plan.
      • Define key metrics for configuration management.
      • Define metrics for supporting services.
      • Build configuration management policies.
      • Create a communications plan.
      • Build a roadmap.

      Deliverables

      • Roles and responsibility matrix
      • Data and reporting use cases based on stakeholder requirements
      • List of CI types and relationships to be added to default settings
      • CMDB data model diagram
      • Documented processes and workflows
      • Data validation and auditing plan
      • Policy for configuration management
      • Roadmap for next steps
      • Communications documents

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Configuration Management Project Charter

      Detail your approach to building an SCM practice and a CMDB.

      Screenshot from the Configuration Management Project Charter

      Use Cases and Data Worksheet

      Capture the action items related to your SCM implementation project.

      Screenshot from the Use Cases and Data Worksheet

      Configuration Manager Job Description

      Use our template for a job posting or internal job description.

      Screenshot from the Configuration Manager Job Description

      Configuration Management Diagram Template Library

      Use these diagrams to simplify building your SOP.

      Screenshot from the Configuration Management Diagram Template Library

      Configuration Management Policy

      Set expectations for configuration control.

      screenshot from the Configuration Management Policy

      Configuration Management Audit and Validation Checklist

      Use this framework to validate controls.

      Screenshot from the Configuration Management Audit and Validation Checklist

      Configuration Control Board Charter

      Define the board's responsibilities and meeting protocols.

      Screenshot from the Configuration Management Audit and Validation Checklist

      Key deliverable:

      Configuration Management Standard Operating Procedures Template

      Outlines SCM roles and responsibilities, the CMDB data model, when records are expected to change, and configuration baselines.

      Four Screenshots from the Configuration Management Standard Operating Procedures Template

      Phase 1

      Configuration Management Strategy

      Strategy Data Structure Processes Roadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspects of a configuration management system:

      • Scope
      • Use Cases
      • Reports and Analytics

      This phase involves the following participants:

      • IT and business service owners
      • Business/customer relationship managers
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager
      • SCM project sponsor

      Harness Service Configuration Management Superpowers

      Establish clear definitions

      Ensure everyone is using the same terms.

      Term Definition
      Configuration Management

      The purpose of configuration management is to:

      • "Ensure that accurate and reliable information about the configuration of services, and the CIs that support them, is available when and where it is needed. This includes information on how CIs are configured and the relationships between them" (AXELOS).
      • "Provide sufficient information about service assets to enable the service to be effectively managed. Assess the impact of changes and deal with service incidents" (ISACA, 2018).
      Configuration Management System (CMS) A set of tools and databases used to manage, update, and present data about all configuration items and their relationships. A CMS may maintain multiple federated CMDBs and can include one or many discovery and dependency mapping tools.
      Configuration Management Database (CMDB) A repository of configuration records. It can be as simple as a spreadsheet or as complex as an integrated database populated through multiple autodiscovery tools.
      Configuration Record Detailed information about a configuration item.
      Configuration Item (CI)

      "Any component that needs to be managed in order to deliver an IT service" (AXELOS).

      These components can include everything from IT services and software to user devices, IT infrastructure components, and documents (e.g. maintenance agreements).
      Attributes Characteristics of a CI included in the configuration record. Common attributes include name, version, license expiry date, location, supplier, SLA, and owner.
      Relationships Information about the way CIs are linked. A CI can be part of another CI, connect to another CI, or use another CI. A CMDB is significantly more valuable when relationships are recorded. This information allows CMDB users to identify dependencies between components when investigating incidents, performing root-cause analysis, assessing the impact of changes before deployment, and much more.

      What is a configuration management database (CMDB)?

      The CMDB is a system of record of your services and includes a record for everything you need to track to effectively manage your IT services.

      Anything that is tracked in your CMDB is called a configuration item (CI). Examples of CIs include:

      • User-Facing Services
      • IT-Facing Services
      • Business Capabilities
      • Relationships
      • IT Infrastructure Components
      • Enterprise Software
      • End-User Devices
      • Documents

      Other systems of record can refer to CIs, such as:

      • Ticket database: Tickets can refer to which CI is impacted by an incident or provided as part of a service request.
      • Asset management database (AMDB): An IT asset is often also a CI. By associating asset records with CI records, you can leverage your IT asset data in your reporting.
      • Financial systems: If done well, the CMDB can supercharge your IT financial cost model.

      CMDBs can allow you to:

      • Query multiple databases simultaneously (so long as you have the CI name field in each database).
      • Build automated workflows and chatbots that interact with data across multiple databases.
      • More effectively identify the potential impact of changes and releases.

      Do not confuse asset with configuration

      Asset and configuration management look at the same world through different lenses

      • IT asset management (ITAM) tends to focus on each IT asset in its own right: assignment or ownership, lifecycle, and related financial obligations and entitlements.
      • Configuration management is focused on configuration items (CIs) that must be managed to deliver a service and the relationships and integrations with other CIs.
      • ITAM and configuration management teams and practices should work closely together. Though asset and configuration management focus on different outcomes, they may use overlapping tools and data sets. Each practice, when working effectively, can strengthen the other.
      • Many objects will exist in both the CMDB and AMDB, and the data on those shared objects will need to be kept in sync.

      A comparison between Asset and Configuration Management Databases

      *Discovery, dependency mapping, and data normalization are often features or modules of configuration management, asset management, or IT service management tools.

      Start with ITIL 4 guiding principles to make your configuration management project valuable and realistic

      Focus on where CMDB data will provide value and ensure the cost of bringing that data in will be reasonable for its purpose. Your end goal should be not just to build a CMDB but to use a CMDB to manage workload and workflows and manage services appropriately.

      Focus on value

      Include only the relevant information required by stakeholders.

      Start where you are

      Use available sources of information. Avoid adding new sources and tools unless they are justified.

      Progress iteratively with feedback

      Regularly review information use and confirm its relevance, adjusting the CMDB scope if needed.

      Collaborate and promote visibility

      Explain and promote available sources of configuration information and the best ways to use them, then provide hints and tips for more efficient use.

      Think and work holistically

      Consider other sources of data for decision making. Do not try to put everything in the CMDB.

      Keep it simple and practical

      Provide relevant information in the most convenient way; avoid complex interfaces and reports.

      Optimize and automate

      Continually optimize resource-consuming practice activities. Automate CDMB verification, data collection, relationship discovery, and other activities.

      ITIL 4 guiding principles as described by AXELOS

      Step 1.1

      Identify use cases and desired benefits for service configuration management

      Activities

      1.1.1 Brainstorm data collection challenges

      1.1.2 Define goals and how you plan to meet them

      1.1.3 Brainstorm and prioritize use cases

      1.1.4 Identify the data needed to reach your goals

      1.1.5 Record required data sources

      This step will walk you through the following aspects of a configuration management system:

      • Scope
      • Use cases

      This phase involves the following participants:

      • IT and business service owners
      • Business/customer relationship managers
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project sponsor
      • Project manager

      Identify potential obstacles in your organization to building and maintaining a CMDB

      Often, we see multiple unsuccessful attempts to build out a CMDB, with teams eventually losing faith and going back to spreadsheets. These are common obstacles:

      • Significant manual data collection, which is rarely current and fully accurate.
      • Multiple discovery solutions creating duplicate records, with no clear path to deduplicate records.
      • Manual dependency mapping that isn't accurate because it's not regularly assessed and updated.
      • Hybrid cloud and on-premises environment with discovery solutions only partially collecting as the right discovery and dependency mapping solutions aren't in place.
      • Dynamic environments (virtual, cloud, or containers) that may exist for a very short time, but no one knows how they should be managed.
      • Lack of expertise to maintain and update the CMDB or lack of an assigned owner for the CMDB. If no one owns the process and is assigned as a steward of data, it will not be maintained.
      • Database that was designed with other purposes in mind and is heavily customized, making it difficult to use and maintain.

      Understanding the challenges to accessing and maintaining quality data will help define the risks created through lack of quality data.

      This knowledge can drive buy-in to create a configuration management practice that benefits the organization.

      1.1.1 Brainstorm data collection challenges

      Involve stakeholders.
      Allot 45 minutes for this discussion.

      1. As a group, brainstorm the challenges you have with data:
      2. Accuracy and trustworthiness: What challenges do you have with getting accurate data on IT services and systems?
        1. Access: Where do you have challenges with getting data to people when they need it?
        2. Manually created data: Where are you relying on data that could be automatically collected?
        3. Data integration: Where do you have issues with integrating data from multiple sources?
        4. Impact: What is the result of these challenges?
      3. Group together these challenges into similar issues and identify what goals would help overcome them.
      4. Record these challenges in the Configuration Management Project Charter, section 1.2: Project Purpose.

      Download the Configuration Management Project Charter

      Input

      Output

      • None
      • List of high-level desired benefits for SCM
      Materials Participants
      • Whiteboard/flip charts
      • Sticky notes
      • Markers/pens
      • Configuration Management Project Charter
      • IT and business service owners
      • Business/customer relationship managers
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Info-Tech Maturity Ladder

      Identify your current and target state

      INNOVATOR

      • Characteristics of business partner
      • Integration with orchestration tools

      BUSINESS PARTNER

      Data collection and validation is fully automated

      Integrated with several IT processes

      Meets the needs of IT and business use cases

      TRUSTED OPERATOR

      • Data collection and validation is partially or fully automated
      • Trust in data accuracy is high, meets the needs of several IT use cases

      FIREFIGHTER

      • Data collection is partially or fully automated, validation is ad hoc
      • Trust in data accuracy is variable, used for decision making

      UNSTABLE

      INNOVATOR

      • Characteristics of business partner
      • Integration with orchestration tools

      BUSINESS PARTNER

      • Data collection and validation is fully automated
      • Integrated with several IT processes
      • Meets the needs of IT and business use cases

      TRUSTED OPERATOR

      • Data collection and validation is partially or fully automated
      • Trust in data accuracy is high, meets the needs of several IT use cases

      FIREFIGHTER

      • Data collection is partially or fully automated, validation is ad hoc
      • Trust in data accuracy is variable, used for decision making

      UNSTABLE

      A tower is depicted, with arrows pointing to Current (orange) and Target(blue)

      Define goals for your CMDB to ensure alignment with all stakeholders

      • How are business or IT goals being hindered by not having the right data available?
      • If the business isn't currently asking for service-based reporting and accountability, start with IT goals. This will help to develop goals that will be most closely aligned to the IT teams' needs and may help incentivize the right behavior in data maintenance.
      • Configuration management succeeds by enabling its stakeholders to achieve their outcomes. Set goals for configuration management based on the most important outcomes expected from this project. Ask your stakeholders:
        1. What are the business' or IT's planned transformational initiatives?
        2. What are your highest priority goals?
        3. What should the priorities of the configuration management practice be?
      • The answers to these questions will shape your approach to configuration management. Direct input from your leadership and executives, or their delegates, will help ensure you're setting a solid foundation for your practice.
      • Identify which obstacles will need to be overcome to meet these goals.

      "[T]he CMDB System should be viewed as a 'system of relevance,' rather than a 'single source of truth.' The burdens of relevance are at once less onerous and far more meaningful in terms of action, analysis, and automation. While 'truth' implies something everlasting or at least stable, relevance suggests a far more dynamic universe."

      – CMDB Systems, Making Change Work in the Age of Cloud and Agile, Drogseth et al

      Identify stakeholders to discuss what they need from a CMDB; business and IT needs will likely differ

      Define your audience to determine who the CMDB will serve and invite them to these conversations. The CMDB can aid the business and IT and can be structured to provide dashboards and reports for both.

      Nondiscoverable configuration items will need to be created for both audiences to organize CIs in a way that makes sense for all uses.

      Integrations with other systems may be required to meet the needs of your audience. Note integrations for future planning.

      Business Services

      Within the data sets, service configuration models can be used for:

      • Impact analysis
      • Cause and effect analysis
      • Risk analysis
      • Cost allocation
      • Availability analysis and planning

      Technical Services

      Connect to IT Finance for:

      • Service-based consumption and costing
      • Financial awareness through showback
      • Financial recovery through chargeback
      • Support IT strategy through financial transparency
      • Cost optimization
      • Reporting for depreciation, location-related taxation, and capitalization (may also use asset management for these)

      Intersect with IT Processes to:

      • Reduce time to restore services through incident management
      • Improve stability through change management
      • Reduce outages through problem management
      • Optimize assets through IT asset management
      • Provide detailed reporting for audit/governance, risk, and compliance

      1.1.2 Define goals and how you plan to meet them

      Involve stakeholders.

      Allot 45 minutes for this discussion.

      As a group, identify current goals for building and using a CMDB.

      Why are we doing this?

      • How do you hope to use the data within the CMDB?
      • What processes will be improved through use of this data and what are the expected outcomes?

      How will we improve the process?

      • What processes will be put in place to ensure data integrity?
      • What tools will be put in place to improve the methods used to collect and maintain data?

      Record these goals in the Configuration Management Project Charter, section 1.3: Project Objectives.

      Input

      Output

      • None
      • List of high-level desired benefits for SCM
      Materials Participants
      • Whiteboard/flip charts
      • Sticky notes
      • Markers/pens
      • Configuration Management Project Charter
      • IT and business service owners
      • Business/customer relationship managers
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      It's easy to think that if you build it, they will come, but CMDBs rarely succeed without solid use cases

      Set expectations for your organization that defined and fulfilled use cases will factor into prioritization exercises, functional plans, and project milestones to achieve ROI for your efforts.

      A good use case:

      • Justifies resource allocation
      • Gains funding for the right tools
      • Builds stakeholder support
      • Drives interest and excitement
      • Gains support from anyone in a position to help build out and validate the data
      • Helps to define success

      In the book CMDB Systems, Making Change Work in the Age of Cloud and Agile, authors Drogseth, Sturm, and Twing describe the secrets of success:

      A documented evaluation of CMDB System vendors showed that while most "best case" ROI fell between 6 and 9 months for CMDB deployments, one instance delivered ROI for a significant CMDB investment in as little as 2 weeks!

      If there's a simple formula for quick time to value for a CMDB System, it's the following:

      Mature levels of process awareness
      + Strong executive level support
      + A ready and willing team with strongly supportive stakeholders
      + Clearly defined and ready phase one use case
      + Carefully selected, appropriate technologies

      All this = Powerful early-phase CMDB System results

      Define and prioritize use cases for how the CMDB will be used to drive value

      The CMDB can support several use cases and may require integration with various modules within the ITSM solution and integration with other systems.

      Document the use cases that will drive your CMDB to relevance, including the expected benefits for each use case.

      Identify the dependencies that will need to be implemented to be successful.

      Define "done" so that once data is entered, verified, and mapped, these use cases can be realized.

      "Our consulting experience suggests that more than 75% of all strategic initiatives (CMDB or not) fail to meet at least initial expectations across IT organizations. This is often due more to inflated expectations than categorical failure."

      – CMDB Systems, Making Change Work in the Age of Cloud and Agile, Drogseth et al.

      This image demonstrates how CMBD will be used to drive value.

      After identifying use cases, determine the scope of configuration items required to feed the use cases

      On-premises software and equipment will be critical to many use cases as the IT team and partners work on network and data-center equipment, enterprise software, and integrations through various means, including APIs and middleware. Real-time and near real-time data collection and validation will ensure IT can act with confidence.

      Cloud use can include software as a service (SaaS) solutions as well as infrastructure and platform as a service (IaaS and PaaS), and this may be more challenging for data collection. Tools must be capable of connecting to cloud environments and feeding the information back into the CMDB. Where on-premises and cloud applications show dependencies, you might need to validate data if multiple discovery and dependency mapping solutions are used to get a complete picture. Tagging will be crucial to making sense of the data as it comes into the CMDB.

      In-house developed software would be beneficial to have in the CMDB but may require more manual work to identify and classify once discovered. A combination of discovery and tagging may be beneficial to input and classification.

      Highly dynamic environments may require data collection through integration with a variety of solutions to manage and record continuous deployment models and verifications, or they may rely on tags and activity logs to record historical activity. Work with a partner who specializes in CI/CD to help architect this use case.

      Containers will require an assessment of the level of detail required. Determine if the container is a CI and if the content will be described as attributes. If there is value to your use case to map the contents of each container as separate CIs within the container CI, then you can map to that level of detail, but don't map to that depth unless the use case calls for it.

      Internet of Things (IoT) devices and applications will need to match a use case as well. IoT device asset data will be useful to track within an asset database but may have limited value to add to a CMDB. If there are connections between IoT applications and data warehouses, the dependencies should likely be mapped to ensure continued dataflow.

      Out of scope

      A single source of data is highly beneficial, but don't make it a catchall for items that are not easily stored in a CMDB.

      Source code should be stored in a definitive media library (DML). Code can be linked to the CMDB but is generally too big to store in a CMDB and will reduce performance for data retrieval.

      Knowledge articles and maintenance checklists are better suited to a knowledge base. They can also be linked to the CDMB if needed but this can get messy where many-to-many relationships between articles and CIs exist.

      Fleet (transportation) assets and fixed assets should be in fleet management systems and accounting systems, respectively. Storing these types of data in the CMDB doesn't provide value to the support process.

      1.1.3 Brainstorm and prioritize use cases

      Which IT practices will you supercharge?

      Focus on improving both operations and strategy.

      1. Brainstorm the list of relevant use cases. What do you want to do with the data from the CMDB? Consider:
        1. ITSM management and governance practices
        2. IT operations, vendor orchestration, and service integration and management (SIAM) to improve vendor interactions
        3. IT finance and business service reporting needs
      2. Identify which use cases are part of your two- to three-year plan, including the purpose for adding configuration data into that process. Prioritize one or two of these use cases to accomplish in your first year.
      3. Identify dependencies to manage as part of the solution and define a realistic timeline for implementing integrations, modules, or data sources.
      4. Document this table in the Configuration Management Project Charter, section 2.2: Use Cases.
      Audience Use Case Goal/Purpose Project/Solution Dependencies Proposed Timeline Priority
      • IT
      • Change Management

      Stabilize the process by seeing:

      Change conflict reporting

      Reports of CI changes without change records

      System availability

      RFC mapping requires discovered CIs

      RFC review requires criticality, technical and business owners

      Conflict reporting requires dependency mapping

      • Discovery and manual information entered by October
      • Dependency mapping implemented by December

      High

      Determine what additional data will be needed to achieve your use cases

      Regardless of which use cases you are planning to fulfill with the CMDB, it is critical to not add data and complexity with the plan of resolving every possible inquiry. Ensure the cost and effort of bringing in the data and maintaining it is justified. The complexity of the environment will impact the complexity of data sources and integrations for discovery and dependency mapping.

      Before bringing in new data, consider:

      • Is this information available in other maintained databases now?
      • Will this data be critical for decision making? If it is nice to have or optional, can it be automatically moved into the database and maintained using existing integrations?
      • Is there a cost to bringing the data into the CMDB and maintaining it? Is that cost reasonable for its purpose?
      • How frequently will this information be accessed, and can it be updated in an adequate cadence to meet these needs?
      • When does this information need to be available?

      Info-Tech Insight

      If data will be used only occasionally upon request, determine if it will be more efficient to maintain it or to retrieve it from the CMDB or another data source as needed.

      Remember, within the data sets, service configuration models can be used for:

      • Impact analysis
      • Cause and effect analysis
      • Risk analysis
      • Cost allocation
      • Availability analysis and planning

      1.1.4 Expand your use cases by identifying the data needed to reach your goals

      Involve stakeholders.

      Allot 60 minutes for this discussion.

      Review use cases and their goals.

      Identify what data will be required to meet those goals and determine whether it will be mandatory or optional/nice-to-have information.

      Identify sources of data for each type of data. Color code or sort.

      Italicize data points that can be automatically discovered.

      Gain consensus on what information will be manually entered.

      Record the data in the Use Cases and Data Worksheet.

      Download the Use Cases and Data Worksheet

      Input

      Output

      • None
      • List of data requirements
      MaterialsParticipants
      • Whiteboard/flip charts
      • Sticky notes
      • Markers/pens
      • Use Cases and Data Worksheet
      • IT and business service owners
      • Business/customer relationship managers
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Use discovery and dependency mapping tools to automatically update the CMDB

      Avoid manual data entry whenever possible.

      Consider these features when looking at tools:

      • Application dependency mapping: Establishing and tracking the relationships and dependencies between system components, applications, and IT services. The ideal tool will be able to generate maps automatically.
      • Agentless and agent discovery: Scanning systems with both agent and agentless approaches. Agent-based scanning provides comprehensive information on applications used in individual endpoints, which is helpful in minimizing its IT footprint. However, agents require endpoint access. Agentless-based scanning provides a broader and holistic view of deployed applications without the need to install an agent on end devices, which can be good enough for inventory awareness.
      • Data export capability: Easy exporting of application inventory information to be used in reports and other tools.
      • Dashboards and chart visualization: Detailed list of the application inventory, including version number, number of users, licenses, deployment location, and other application details. These details will inform decision makers of each application's health and its candidacy for further rationalization activities.
      • Customizable scanning scripts: Tailor your application discovery approach by modifying the scripts used to scan your systems.
      • Integration with third-party tools: Easy integration with other systems with out-of-the-box plugins or customizable APIs.

      Determine which data collection methods will be used to populate the CMDB

      The effort-to-value ratio is an important factor in populating a CMDB. Manual efforts require a higher process focus, more intensive data validation, and a constant need to remind team members to act on every change.

      Real-Time Data AIOps continual scans Used for event and incident management
      Near Real-Time Data Discovery and dependency mapping run on a regular cycle Used for change and asset management
      Historical Data Activity log imports, manual data entry Used for IT finance, audit trail
      • Determine what amount of effort is appropriate for each data grouping and use case. As decisions are made to expand data within the CMDB, the effort-to-value ratio should always factor in. To be usable, data must be accurate, and every piece of data that needs to be manually entered runs the risk of becoming obsolete.
      • Identify which data sources will bring in each type of data. Where there is a possibility of duplicate records being created, one of the data sources will need to be identified as the primary.
      • If the decision is to manually enter configuration items early in the process, be aware that automation may create duplicates of the CIs that will need to be deduplicated at some point in the process to make the information more usable.
      • Typically, items are discovered, validated, then mapped, but there will be variations depending on the source.
      • Active Directory or LDAP may be used to bring users and technicians into the CMDB. Data may be imported from spreadsheets. Identify efforts where data cleanup may have to happen before transferring into the CMDB.
      • Identify how often manual imports will need to be conducted to make sure data is usable.

      Identify other nondiscoverable data that will need to be added to or accessed by the CMDB

      Foundational data, such as technicians, end users and approvers, roles, location, company, agency, department, building, or cost center, may be added to tables that are within or accessed by the CMDB. Work with your vendor to understand structure and where this information resides.

      • These records can be imported from CSV files manually, but this will require manual removal or edits as information changes.
      • Integration with the HRIS, Active Directory, or LDAP will enable automatic updates through synchronization or scheduled imports.
      • If synchronization is fully enabled, new data can be added and removed from the CMDB automatically.
      • Identify which nondiscoverable attributes will be needed, such as system criticality, support groups, groups it is managed by, location.
      • If partially automating the process, identify where manual updates will need to occur.
      • If fully automating the process, notifications will need to be set up when business owner or product or technical owner fields become empty to prompt defining a replacement within the CMDB.
      • Determine who will manage these updates.
      • Work with your CMDB implementation vendor to determine the best option for bringing this information in.

      1.1.5 Record required data sources

      Allot 15 minutes for this discussion.

      1. Where do you track the work involved in providing services? Typically, your ticket database tracks service requests and incidents. Additional data sources can include:
        • Enterprise resource planning tools for tracking purchase orders
        • Project management information system for tracking tasks
      2. What trusted data sources exist for the technology that supports these services? Examples include:
        • Management tools (e.g. Microsoft Endpoint Configuration Manager)
        • Architectural diagrams and network topology diagrams
        • IT asset management database
        • Spreadsheets
        • Other systems of record
      3. What other data sources can help you gather the data you identified in activity 1.1.4?
      4. Record the relevant data sources for each use case in the Configuration Management Standard Operating Procedures, section 6: Data Collection and Updates.

      Info-Tech Insight

      Improve the trustworthiness of your CMDB as a system of record by relying on data that is already trusted.

      Input

      Output

      • Use cases
      • List of data requirements
      MaterialsParticipants
      • Use Cases and Data Worksheet
      • Configuration Management Standard Operating Procedures
      • IT and business service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Step 1.2

      Define roles and responsibilities

      Activities

      1.2.1 Record the project team and stakeholders

      1.2.2 Complete a RACI chart to define who will be accountable and responsible for configuration tasks

      This step will walk you through the following aspects of a configuration management system:

      • Roles and responsibilities

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project manager

      Identify the roles you need in your SCM project

      Determine which roles will need to be involved in the initial project and how to source these roles.

      Leadership Roles
      Oversee the SCM implementation

      1. Configuration Manager – The practice owner for SCM. This is a long-term role.
      2. Configuration Control Board (CCB) Chair – An optional role that oversees proposed alterations to configuration plans. If a CCB is implemented, this is a long-term role.
      3. Project Sponsor or Program Sponsor – Provides the necessary resources for building the CMDB and SCM practices.
      4. Architecture Roles
        Plan the program to build strong foundation
        1. Configuration Management Architect – Technical leader who defines the overall CM solution, plans the scope, selects a tool, and leads the technical team that will implement the solution.
        2. Requirements Analyst – Gathers and manages the requirements for CM.
        3. Process Engineer – Defines, documents, and implements the entire process.

      Architecture Roles
      Plan the program to build strong foundation

      1. Configuration Management Architect – Technical leader who defines the overall CM solution, plans the scope, selects a tool, and leads the technical team that will implement the solution.
      2. Requirements Analyst – Gathers and manages the requirements for CM.
      3. Process Engineer – Defines, documents, and implements the entire process.

      Engineer Roles
      Implement the system

      1. Logical Database Analyst (DBA) Designs the structure to hold the configuration management data and oversees implementation.
      2. Communications and Trainer – Communicates the goals and functions of CM and teaches impacted users the how and why of the process and tools.

      Administrative Roles
      Permanent roles involving long-term ownership

      1. Technical Owner – The system administrator responsible for their system's uptime. These roles usually own the data quality for their system.
      2. Configuration Management Integrator – Oversees regular transfer of data into the CMDB.
      3. Configuration Management Tool Support – Selects, installs, and maintains the CM tool.
      4. Impact Manager – Analyzes configuration data to ensure relationships between CIs are accurate; conducts impact analysis.

      1.2.1 Record the project team and stakeholders

      Allocate 25 minutes to this discussion.

      1. Record the project team.
        1. Identify the project manager who will lead this project.
        2. Identify key personnel that will need to be involved in design of the configuration management system and processes.
        3. Identify where vendors/outsourcers may be required to assist with technical aspects.
        4. Document the project team in the Configuration Management Project Charter, section 1.1: Project Team.
      1. Record a list of stakeholders.
        1. Identify stakeholders internal and external to IT.
        2. Build the stakeholder profile. For each stakeholder, identify their role, interest in the project, and influence on project success. You can score these criteria high/medium/low or score them out of ten.
        3. If managed service providers will need to be part of the equation, determine who will be the liaison and how they will provide or access data.
      Input

      Output

      • Project team members
      • Project plan resources
      MaterialsParticipants
      • Configuration Management Project Charter
      • List of project stakeholders and participants
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Even with full automation, this cannot be a "set it and forget it" project if it is to be successful long-term

      Create a team to manage the process and data updates and to ensure data is always usable.

      • Services may be added and removed.
      • Technology will change as technical debt is reduced.
      • Vendors may change as contract needs develop.
      • Additional use cases may be introduced by IT and the business as approaches to management evolve.
      • AIOps can reduce the level of effort and improve visibility as configuration items change from the baseline and notifications are automated.
      • Changes can be checked against requests for changes through automated reconciliations, but changes will still need to be investigated where they do not meet expectations.
      • Manual data changes will need to be made regularly and verified.

      "We found that everyone wanted information from the CMDB, but no one wanted to pay to maintain it. People pointed to the configuration management team and said, 'It's their responsibility.'

      Configuration managers, however, cannot own the data because they have no way of knowing if the data is accurate. They can own the processes related to checking accuracy, but not the data itself."
      – Tim Mason, founding director at TRM Associates
      (Excerpt from Viewpoint: Focus on CMDB Leadership)

      Include these roles in your CMDB practice to ensure continued success and continual improvement

      These roles can make up the configuration control board (CCB) to make decisions on major changes to services, data models, processes, or policies. A CCB will be necessary in complex environments.

      Configuration Manager

      This role is focused on ensuring everyone works together to build the CMDB and keep it up to date. The configuration manager is responsible to:

      • Plan and manage the standards, processes, and procedures and communicate all updates to appropriate staff. Focused on continual improvement.
      • Plan and manage population of the CMDB and ensure data included meets criteria for cost effectiveness and reasonable effort for the value it brings.
      • Validate scope of services and CIs to be included and controlled within the CMDB and manage exceptions.
      • Audit data quality to ensure it is valid, is current, and meets defined standards.
      • Evaluate and recommend tools to support processes, data collection, and integrations.
      • Ensure configuration management processes interface with all other service and business management functions to meet use cases.
      • Report on configuration management performance and take appropriate action on process adherence and quality issues.

      Configuration Librarian

      This role is most important where manual data entry is prevalent and where many nonstandard configurations are in place. The librarian role is often held by the tool administrator. The librarian focuses specifically on data within the CMDB, including:

      • Manual updates to configuration data.
      • CMDB data verification on a regular schedule.
      • Processing ad hoc requests for data.

      Product/Service/Technical Owners

      The product or technical owner will validate information is correctly updating and reflects the existing data requirements as new systems are provisioned or as existing systems change.

      Interfacing Practice Owners

      All practice owners, such as change manager, incident manager, or problem manager, must work with the configuration team to ensure data is usable for each of the use cases they are responsible for.

      Download the Configuration Manager job description

      Assign configuration management responsibilities and accountabilities

      Align authority and accountability.

      • A RACI exercise will help you discuss and document accountability and responsibility for critical configuration management activities.
      • When responsibility and accountability are not well documented, it's often useful to invite a representative of the roles identified to participate in this alignment exercise. The discussion can uncover contrasting views on responsibility and governance, which can help you build a stronger management and governance model.
      • The RACI chart can help you identify who should be involved when making changes to a given activity. Clarify the variety of responsibilities assigned to each key role.
      • In the future, you may need to define roles in more detail as you change your configuration management procedures.

      Responsible: The person who actually gets the job done.
      Different roles may be responsible for different aspects of the activity relevant to their role.

      Accountable: The one role accountable for the activity (in terms of completion, quality, cost, etc.)
      Must have sufficient authority to be held accountable; responsible roles are often accountable to this role.

      Consulted: Those who need the opportunity to provide meaningful input at certain points in the activity; typically, subject matter experts or stakeholders. The more people you must consult, the more overhead and time you'll add to a process.

      Informed: Those who receive information regarding the task but do not need to provide feedback.
      Information might relate to process execution, changes, or quality.

      Complete a RACI chart to define who will be accountable and responsible for configuration tasks

      Determine what roles will be in place in your organization and who will fulfill them, and create your RACI chart to reflect what makes sense for your organization. Additional roles may be involved where there is complexity.

      R = responsible, A = accountable, C = consulted, I = informed CCB Configuration Manager Configuration Librarian Technical Owner(s) Interfacing Practice Owners Tool Administrator
      Plan and manage the standards, processes, and procedures and communicate all updates to appropriate staff. Focused on continual improvement. A R
      Plan and manage population of the CMDB and ensure data included meets criteria for cost effectiveness and reasonable effort for the value it brings. A R
      Validate scope of services and CIs to be included and controlled within the CMDB and manage exceptions. A R
      Audit data quality to ensure it is valid, is current, and meets defined standards. A,R
      Evaluate and recommend tools to support processes, data collection, and integrations. A,R
      Ensure configuration management processes interface with all other service and business management functions to meet use cases. A
      Report on configuration management performance and take appropriate action on process adherence and quality issues. A
      Make manual updates to configuration data. A
      Conduct CMDB data verification on a regular schedule. A
      Process ad hoc requests for data. A
      Enter new systems into the CMDB. A R
      Update CMDB as systems change. A R
      Identify new use cases for CMDB data. R A
      Validate data meets the needs for use cases and quality. R A
      Design reports to meet use cases. R
      Ensure integrations are configured as designed and are functional. R

      1.2.2 Complete a RACI chart to define who will be accountable and responsible for configuration tasks

      Allot 60 minutes for this discussion.

      1. Open the Configuration Management Standard Operating Procedures, section 4.1: Responsibility Matrix. In the RACI chart, review the top row of roles. Smaller organizations may not need a configuration control board, in which case the configuration manager may have more authority.
      2. Modify or expand the process tasks in the left column as needed.
      3. For each role, identify what that person is responsible for, accountable for, consulted on, or informed of. Fill out each column.
      4. Document in the SOP. Schedule a time to share the results with organization leads.
      5. Distribute the chart among all teams in your organization.
      6. Describe additional roles as needed in the documentation.
      7. Add accountabilities and responsibilities for the CCB into the Configuration Control Board Charter.
      8. If appropriate, add auxiliary roles to the Configuration Management Standard Operating Procedures, section 4.2: Configuration Management Auxiliary Role Definitions.

      Notes:

      1. Assign one Accountable for each task.
      2. Have one or more Responsible for each task.
      3. Avoid generic responsibilities such as "team meetings."
      4. Keep your RACI definitions in your documents for quick reference.

      Refer back to the RACI chart when building out the communications plan to ensure accountable and responsible team members are on board and consulted and informed people are aware of all changes.

      Input

      Output

      • Task assignments
      • RACI chart with roles and responsibilities
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures, RACI chart
      • Configuration Control Board Charter, Responsibilities section
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Phase 2

      Configuration Management Data Model

      StrategyData StructureProcessesRoadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspects of a configuration management system:

      • Data Model
      • Customer-Facing and Supporting Services
      • Business Capabilities
      • Relationships
      • IT Infrastructure Components
      • Enterprise Software
      • End-User Devices
      • Documents

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • CM practice manager
      • CM project manager

      Step 2.1

      Build a framework for CIs and relationships

      Activities

      Document services:

      2.1.1 Define and prioritize your services

      2.1.2 Test configuration items against existing categories

      2.1.3 Create a configuration control board charter to define the board's responsibilities and protocols

      This step will walk you through the following aspects of a configuration management system:

      • Data model
      • Configuration items
      • Relationships

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • CM practice manager
      • Project manager

      Making sense of data daily will be key to maintaining it, starting with services

      As CIs are discovered and mapped, they will automatically map to each other based on integrations, APIs, queries, and transactions. However, CIs also need to be mapped to a conceptional model or service to present the service and its many layers in an easily consumable way.

      These services will need to be manually created or imported into the CMDB and manually connected to the application services. Services can be mapped to technical or business services or both.

      If business services reporting has been requested, talk to the business to develop a list of services that will be required. Use terms the business will be expecting and identify which applications and instances will be mapped to those services.

      If IT is using the CMDB to support service usage and reporting, develop the list of IT services and identify which applications and instances will be mapped to those services.

      This image show the relationship between Discoverable and Nondiscoverable CIs. The discoverable CIs are coloured in purple, and the nondiscoverables are blue.

      Work with your stakeholders to ensure catalog items make sense to them

      There isn't a definitive right or wrong way to define catalog items. For example, the business and IT could both reference application servers, but only IT may need to see technical services broken down by specific locations or device types.

      Refer back to your goals and use cases to think through how best to meet those objectives and determine how to categorize your services.

      Define the services that will be the top-level, nondiscoverable services, which will group together the CIs that make up the complete service. Identify which application(s) will connect into the technical service.

      When you are ready to start discovery, this list of services will be connected to the discovered data to organize it in a way that makes sense for how your stakeholders need to see the data.

      While working toward meeting the goals of the first few use cases, you will want to keep the structure simple. Once processes are in place and data is regularly validated, complexities of different service types and names can be integrated into the data.

      This image show the relationship between Discoverable and Nondiscoverable CIs. Both Discoverable and nondiscoverable CIs are blue.

      Application Service(blue); Technical Service(Purple); IT Shared Services(Orange); Billable Services(green); Service Portfolio(red)

      Define the service types to manage within the CMDB to logically group CIs

      Determine which method of service groupings will best serve your audience for your prioritized use cases. This will help to name your service categories. Service types can be added as the CMDB evolves and as the audience changes.

      Application Service

      Technical Service

      IT Shared Services

      Billable Services

      Service Portfolio

      A set of interconnected applications and hosts configured to offer a service to the organization.

      Example: Financial application service, which may include email, web server, application server, databases, and middleware.

      A logical grouping of CIs based on common criteria.

      Example: Toronto web services, which may include several servers, web applications, and databases.

      A logical grouping of IT and business services shared and used across the organization.

      Example: VoIP/phone services or networking or security services.

      A group of services that will be billed out to departments or customers and would require logical groupings to enable invoicing.

      A group of business and technical service offerings with specific performance reporting levels. This may include multiple service levels for different customer audiences for the same service.

      2.1.1 Define and prioritize your services

      Prioritize your starting point. If multiple audiences need to be accommodated, work with one group at a time.

      Timing: will vary depending on number of services, and starting point

      1. Create your list of services, referencing an existing service catalog, business continuity or disaster recovery plan, list of applications, or brainstorming sessions. Use the terminology that makes the most sense for the audience and their reporting requirements.
      2. If this list is already in place, assess for relevance and reduce the list to only those services that will be managed through the CMDB.
      3. Determine what data will be relevant for each service based on the exercises done in 1.1.4 and 1.1.5. For example, if priority was a required attribute for use case data, ensure each service lists the priority of that service.
      4. For each of these, identify the supporting services. These items can come from your technical service catalog or list of systems and software.
      5. Document this table in the Use Cases and Data Worksheet, tab 3: Service Catalog.

      Service Record Example

      Service: Email
      Supporting Services: M365, Authentication Services

      Service Attributes

      Availability: 24/7 (99.999%)
      Priority: Critical
      Users: All
      Used for: Collaboration
      Billable: Departmental
      Support: Unified Support Model, Account # 123456789

      The CMDB will be organized by services and will enable data analysis through multiple categorization schemes

      To extract maximum service management benefit from a CMDB, the highest level of CI type should be a service, as demonstrated below. While it is easier to start at the system or single-asset level, taking the service mapping approach will provide you with a useful and dynamic view of your IT environment as it relates to the services you offer, instead of a static inventory of components.

      Level 1: Services

      • Business Service Offering: A business service is an IT service that supports a business process, or a service that is delivered to business customers. Business service offerings typically are bound by service-level agreements.
      • IT Service Offering: An IT service supports the customer's business processes and is made up of people, processes, and technology. IT service offerings typically are bound by service-level agreements.

      Level 2: Infrastructure CIs

      • IT Component Set: An IT service offering consists of one of more sets of IT components. An IT component set allows you to group or bundle IT components with other components or groupings.
      • IT Component: An IT system is composed of one or more supporting components. Many components are shared between multiple IT systems.

      Level 3: Supporting CIs

      • IT Subcomponent: Any IT asset that is uniquely identifiable and a component of an IT system.
      • IT components can have subcomponents, and those components can have subcomponents, etc.

      Two charts, showing Enterprise Architect Model and Configuration Service Model. Each box represents a different CI.

      Assess your CMDB's standard category offerings against your environment, with a plan to minimize customization

      Standard categorization schemes will allow for easier integration with multiple tools and reporting and improve results if using machine learning to automate categorization. If the CMDB chosen includes structured categories, use that as your starting point and focus only on gaps that are not addressed for CIs unique to your environment.

      There is an important distinction between a class and a type. This concept is foundational for your configuration data model, so it is important that you understand it.

      • Types are general groupings, and the things within a type will have similarities. For attributes that you want to collect on a type, all children classes and CIs will have those attribute fields.
      • Classes are a more specific grouping within a type. All objects within a class will have specific similarities. You can also use subclasses to further differentiate between CIs.
      • Individual CIs are individual instances of a class or subclass. All objects in a class will have the same attribute fields and behave the same, although the values of their attributes will likely differ.
      • Attributes may be discovered or nondiscoverable and manually added to CIs. The attributes are properties of the CI such as serial number, version, memory, processor speed, or asset tag.

      Use inheritance structures to simplify your configuration data model.

      An example CM Data Model is depicted.

      Assess the list of classes of configuration items against your requirements

      Types are general groupings, and the things within a type will have similarities. Each type will have its own table within the CMDB. Classes within a type are a more specific grouping of configuration items and may include subclasses.

      Review your vendor's CMDB documentation. Find the list of CI types or classes. Most CMDBs will have a default set of classes, like this standard list. If you need to build your own, use the table below as a starting point. Define anything required for unique classes. Create a list and consult with your installation partner.

      Sample list of classes organized by type

      Types Services Network Hardware Storage Compute App Environment Documents
      Classes
      • Application Service
      • Technical Service
      • IT Shared Service
      • Billable Service
      • Service Portfolio
      • Switch
      • Router
      • Firewall
      • Modem
      • SD-WAN
      • Load Balancer
      • UPS
      • Computer
      • Laptop
      • Server
      • Tablet
      • Database
      • Network-Attached Storage
      • Storage Array Network
      • Blob
      • Operating System
      • Hypervisor
      • Virtual Server
      • Virtual Desktop
      • Appliance
      • Virtual Application
      • Enterprise Application
      • Line of Business Application Software
      • Development
      • Test
      • Production
      • Contract
      • Business Impact Analysis
      • Requirements

      Review relationships to determine which ones will be most appropriate to map your dependencies

      Your CMDB should include multiple relationship types. Determine which ones will be most effective for your environment and ensure everyone is trained on how to use them. As CIs are mapped, verify they are correct and only manually map what is incorrect or not mapping through automation.

      Manually mapping CMDB relationships may be time consuming and prone to error, but where manual mapping needs to take place, ensure the team has a common view of the dependency types available and what is important to map.

      Use automated mapping whenever possible to improve accuracy, provide functional visualizations, and enable dynamic updates as the environment changes.

      Where a dependency maps to external providers, determine where it makes sense to discover and map externally provided CIs.

      • Only connect where there is value in mapping to vendor-owned systems.
      • Only connect where data and connections can be trusted and verified.

      Most common dependency mapping types

      A list of the most common dependency mapping types.

      2.1.2 Test configuration items against existing categories

      Time to complete: 1-2 hours

      1. Select a service to test.
      2. Identify the various components that make up the service, focusing on configuration items, not attributes
      3. Categorize configuration items against types and classes in the default settings of the CMDB.
      4. Using the default relationships within the CMDB, identify the relationships between the configuration items.
      5. Identify types, classes, and relationships that do not fit within the default settings. Determine if there are common terms for these items or determine most appropriate name.
      6. Validate these exceptions with the publisher.
      7. Document exceptions in the Configuration Management Standard Operating Procedures, Appendix 2: Types and Classes of Configuration Items
      Input

      Output

      • List of default settings for classes, types, and relationships
      • Small list of services for testing
      • List of CIs to map to at least one service
      • List of categories to add to the CMDB solution.
      MaterialsParticipants
      • Use Cases and Data Worksheet
      • Configuration Management Standard Operating Procedures
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      2.1.3 Create a configuration control board charter to define the board's responsibilities and protocols

      A charter will set the tone for meetings, ensure purpose is defined and meeting cadence is set for regular reviews.

      1. Open the Configuration Control Board Charter. Review the document and modify as appropriate for your CCB. This will include:
        • Purpose and mandate of the committee – Reference objectives from the project charter.
        • Team composition – Determine the right mix of team members. A team of six to ten people can provide a good balance between having a variety of opinions and getting work done.
        • Voting option – Determine the right quorum to approve changes.
        • Responsibilities – List responsibilities, starting with RACI chart items.
        • Authority – Define the control board's span of control.
        • Governing laws and regulations – List any regulatory requirements that will need to be met to satisfy your auditors.
        • Meeting preparation – Set expectations to ensure meetings are productive.
      2. Distribute the charter to CCB members.
      Input

      Output

      • Project team members
      • Project plan resources
      MaterialsParticipants
      • Configuration Control Board Charter
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Assess the default list of statuses for each state

      Align this list with your CMDB

      Minimize the number of customizations that will make it difficult to update the platform.

      1. Review the default status list within the tool.
      2. Identify which statuses will be most used. Write a definition for each status.
      3. Update this list as you update process documentation in Step 3.1. After initial implementation, this list should only be modified through change enablement.
      4. Record this list of statuses in the Configuration Management Standard Operating Procedures, Appendix 4: Statuses
      State Status Description
      Preparation Ordered Waiting delivery from the vendor
      In Planning Being created
      Received Vendor has delivered the item, but it is not ready for deployment
      Production In Stock Available to be deployed
      In Use Deployed
      On Loan Deployed to a user on a temporary basis
      For Removal Planning to be phased out but still deployed to an end user
      Offline In Transit Moving to a new location
      Under Maintenance Temporarily offline while a patch or change is applied
      Removed Decommissioned Item has been retired and is no longer in production
      Disposed Item has been destroyed and we are no longer in possession of it
      Lost Item has been lost
      Stolen Item has been stolen

      Step 2.2

      Document statuses, attributes, and data sources

      Activities

      2.2.1 Follow the packet and map out the in-scope services and data centers

      2.2.2 Build data model diagrams

      2.2.3 Determine access rights for your data

      This step will walk you through the following aspects of a configuration management system:

      • Statuses
      • Attributes for each class of CI

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project manager

      Outcomes of this step

      • Framework for approaching CI statuses
      • Attributes for each class of CI
      • Data sources for those attributes

      Service mapping approaches

      As you start thinking about dependency mapping, it's important to understand the different methods and how they work, as well as your CMDB's capabilities. These approaches may be all in the same tool, or the tool may only have the top-down options.

      Top down, most common

      Pattern-based

      Most common option, which includes indicators of connections such as code, access rights, scripting, host discovery, and APIs.

      Start with pattern-based, then turn on traffic-based for more detail. This combination will provide the most accuracy.

      Traffic-based

      Map against traffic patterns involving connection rules to get more granular than pattern-based.

      Traffic-based can add a lot of overhead with extraneous data, so you may not want to run it continuously.

      Tag-based

      Primarily used for cloud, containers, and virtual machines and will attach the cloud licenses to their dependent services and any related CIs.

      Tags work well with cloud but will not have the same hierarchical view as on-premises dependency mapping.

      Machine learning

      Machine learning will look for patterns in the traffic-based connections, match CIs to categories and help organize the data.

      Machine learning (ML) may not be in every solution, but if you have it, use it. ML will provide many suggestions to make the life of the data manager easier.

      Model hierarchy

      Automated data mapping will be helpful, but it won't be foolproof. It's critical to understand the data model to validate and map nondiscoverable CIs correctly.

      The framework consists of the business, enterprise, application, and implementation layers.

      The business layer encodes real-world business concepts via the conceptual model.

      The enterprise layer defines all enterprise data assets' details and their relationships.

      The application layer defines the data structures as used by a specific application.

      The implementation layer defines the data models and artifacts for use by software tools.

      An example of Model Hierarchy is depicted.

      Learn how to create data models with Info-Tech's blueprint Create and Manage Enterprise Data Models

      2.2.1 Follow the packet and map out the in-scope services and data centers

      Reference your network topology and architecture diagrams.

      Allot 1 hour for this activity.

      1. Start with a single service that is well understood and documented.
      2. Identify the technical components (hardware and applications) that make up the service.
      3. Determine if there is a need to further break down services into logical service groupings. For example, the email service to the right is broken down into authentication and mail flow.
      4. If you don't have a network diagram to follow, create a simple one to identify workflows within the service and components the service uses.
      5. Record the apps and underlying components in the Configuration Management Standard Operating Procedures, Appendix 1: Configuration Data Model Structure.

      This information will be used for CM project planning and validating the contents of the CMDB.

      an example of a Customer-facing service is shown, for Email sample topology.

      Download the Configuration Management Diagram Template Library to see an example.

      Build your configuration data model

      Rely on out-of-the-box functionality where possible and keep a narrow focus in the early implementation stages.

      1. If you have an enterprise architecture, then your configuration management data model should align with it.
      2. Keep a narrow focus in the early implementation stages. Don't fill up your CMDB until you are ready to validate and fix the data.
      3. Rely on out-of-the-box (OOTB) functionality where possible. If your configuration management database (CMDB) and platform do not have a data model OOTB, then rely on a publicly available data model.
      4. Map your business or IT service offering to the first few layers.

      Once this is built out in the system, you can let the automated dependency mapping take over, but you will still need to validate the accuracy of the automated mapping and investigate anything that is incorrect.

      Sample Configuration Data Model

      Every box represents a CI, and every line represents a relationship

      A sample configuration Data model is shown.

      Example: Data model and CMDB visualization

      Once the data model is entered into the CMDB, it will provide a more dynamic and complex view, including CIs shared with other services.

      An example of a Data Model Exercise

      CMDB View

      An example of a CMDB View of the Data Model Exercise

      2.2.2 Build data model diagrams

      Visualize the expected CI classes and relationships.

      Allot 45 minutes.

      1. Identify the different data model views you need. Use multiple diagrams to keep the information simple to read and understand. Common diagrams include:
        1. Network level: Outline expected CI classes and relationships at the network level.
        2. Application level: Outline the expected components and relationships that make up an application.
        3. Services level: Outline how business capability CIs and service CIs relate to each other and to other types of CIs.
      1. Use boxes to represent CI classes.
      2. Use lines to represent relationships. Include details such as:
        1. Relationship name: Write this name on the arrow.
        2. Direction: Have an arrow point to each child.

      Review samples in Configuration Management Diagram Template Library.
      Record these diagrams in the Configuration Management Standard Operating Procedures, Appendix 1: Configuration Data Model Structure.

      Input

      Output

      • List of default settings for classes, types, and relationships
      • Small list of services for testing
      • List of CIs to map to at least one service
      • List of additions of categories to add to the CMDB solution.
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Download the Configuration Management Diagram Template Library to see examples.

      Determine governance for data security, access, and validation

      Align CMDB access to the organization's access control policy to maintain authorized and secure access for legitimate staff performing their role.

      Data User Type Access Role
      Data consumers
      • View-only access
      • Will need to view and use the data but will not need to make modifications to it
      • Service desk
      • Change manager
      • Major incident manager
      • Finance
      CMDB owner
      • Read/write access with the ability to update and validate data as needed
      • Configuration manager
      Domain owner
      • Read/write access for specific domains
      • Data owner within their domain, which includes validating that data is in the database and that it is correctly categorized.
      • Enterprise architect
      • Application owner
      Data provider
      • Read/write access for specific domains
      • Ensures automated data has been added and adds nondiscoverable assets and attributes as needed
      • Server operations
      • Database management
      • Network teams
      CMDB administrator
      • View-only access for data
      • Will need to have access for modifying the structure of the product, including adding fields, as determined by the CCB
      • ITSM tool administrator

      2.2.3 Determine access rights for your data

      Allot 30 minutes for this discussion.

      1. Open the Configuration Management Standard Operating Procedures, section 5: Access Rights.
      2. Review the various roles from an access perspective.
        1. Who needs read-only access?
        2. Who needs read/write access?
        3. Should there be restrictions on who can delete data?
      1. Fill in the chart and communicate this to your CMDB installation vendor or your CMDB administrator.
      Input

      Output

      • Task assignments
      • Access rights and roles
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • IT service owners
      • Practice owners and managers
      • SCM practice manager
      • SCM project sponsor

      Phase 3

      Configuration Record Updates

      StrategyData StructureProcessesRoadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspects of a configuration management system:

      • ITSM Practices and Workflows
      • Discovery and Dependency Mapping Tools
      • Auditing and Data Validation Practices

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager
      • IT audit

      Harness Service Configuration Management Superpowers

      Step 3.1

      Keep CIs and relationships up to date through lifecycle process integrations

      Activities

      3.1.1 Define processes to bring new services into the CMDB

      3.1.2 Determine when each type of CI will be created in the CMDB

      3.1.3 Identify when each type of CI will be retired in the CMDB

      3.1.4 Record when and how attributes will change

      3.1.5 Institute configuration control and configuration baselines

      This step will walk you through the following aspects of a configuration management system:

      1. ITSM Practices and Workflows
      2. Discovery and Dependency Mapping Tools

      This phase involves the following participants:

      1. IT service owners
      2. Enterprise architects
      3. Practice owners and managers
      4. SCM practice manager
      5. Project manager

      Outcomes of this step

      • List of action items for updating interfacing practices and processes
      • Identification of where configuration records will be manually updated

      Incorporate CMDB updates into IT operations

      Determine which processes will prompt changes to the CMDB data

      Onboard new services - Offboard Redundant Services. Onboard new CIs - Offboard Redundant CIs; Maintain CIs - Update Attributes.

      Change enablement

      Identify which process are involved in each stage of data input, maintenance, and removal to build out a process for each scenario.

      Project management

      Change enablement

      Asset management

      Security controls

      Project management

      Incident management

      Deployment management

      Change enablement

      Asset management

      Security controls

      Project management

      Incident management

      Service management

      Formalize the process for adding new services to the CMDB

      As new services and products are introduced into the environment, you can improve your ability to correctly cost the service, design integrations, and ensure all operational capabilities are in place, such as data backup and business continuity plans.
      In addition, attributes such as service-level agreements (SLAs), availability requirements, and product, technical, and business owners should be documented as soon as those new systems are made live.

      • Introduce the technical team and CCB to the product early to ensure the service record is created before deployment and to quickly map the services once they are moved into the production environment.
      • Engage with project managers or business analysts to define the process to include security and technical reviews early.
      • Engage with the security and technical reviewers to start documenting the service as soon as it is approved.
      • Determine which practices will be involved in the creation and approval of new services and formalize the process to streamline entry of the new service, onboarding corresponding CIs and mapping dependencies.

      an example of the review and approval process for new service or products is shown.

      3.1.1 Define processes to bring new services into the CMDB

      Start with the most frequent intake methods, and if needed, use this opportunity to streamline the process.

      1. Discuss the methods for new services to be introduced to the IT environment.
      2. Critique existing methods to assess consistency and identify issues that could prevent the creation of services in the CMDB in a timely manner.
      3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
      4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
      5. Discuss the validation process and determine where control points are. Document these on the workflows.
      6. Complete the Configuration Management Standard Operating Procedures, section 8.1: Introduce New Service and Data Model.

      Possible intake opportunities:

      • Business-driven project intake process
      • IT-driven project intake process
      • Change enablement reviews
      • Vendor-driven product changes
      Input

      Output

      • Discussion
      • Intake processes
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Identify scenarios where CIs are added and removed in the configuration management database

      New CIs may be introduced with new services or may be introduced and removed as part of asset refreshes or through service restoration in incident management. Updates may be done by your own services team or a managed services provider.
      Determine the various ways the CIs may be changed and test with various CI types.
      Review attributes such as SLAs, availability requirements, and product, technical, and business owners to determine if changes are required.

      • Identify what will be updated automatically or manually. Automation could include discovery and dependency mapping or synchronization with AMDB or AIOps tools.
      • Engage with relevant program managers to define and validate processes.
      • Identify control points and review audit requirements.

      An example of New or refresh CI from Procurement.

      Info-Tech Insight

      Data deemed no longer current may be archived or deleted. Retained data may be used for tracing lifecycle changes when troubleshooting or meeting audit obligations. Determine what types of CIs and use cases require archived data to meet data retention policies. If none do, deletion of old data may be appropriate.

      3.1.2 Identify when each type of CI will be created in the CMDB

      Allot 45 minutes for discussion.

      1. Discuss the various methods for new CIs to be introduced to the IT environment.
      2. Critique existing methods to assess consistency and identify issues that could prevent the creation of CIs in the CMDB in a timely manner.
      3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
      4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
      5. Discuss the validation process and determine where control points are. Document these on the workflows.
      6. Complete Configuration Management Standard Operating Procedures, section 8.2: Introduce New Configuration Items to the CMDB

      Possible intake opportunities:

      • Business-driven project intake process
      • IT-driven project intake process
      • Change enablement reviews
      • Vendor-driven product changes
      • Incident management
      • Asset management, lifecycle refresh
      Input

      Output

      • Discussion
      • Retirement processes
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      3.1.3 Identify when each type of CI will be retired in the CMDB

      Allot 45 minutes for discussion.

      1. Discuss the various methods for CIs to be removed from the IT environment.
      2. Critique existing methods to assess consistency and identify issues that could prevent the retirement of CIs in the CMDB in a timely manner.
      3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
      4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
      5. Discuss the validation process and determine where control points are. Document these on the workflows.
      6. Discuss data retention. How long will retired information need to be archived? What are the potential scenarios where legacy information may be needed for analysis?
      7. Complete the Configuration Management Standard Operating Procedures, section 8.4: Retire and Archive Configuration Records.

      Possible retirement scenarios:

      • Change enablement reviews
      • Vendor-driven product changes
      • Incident management
      • Asset management, lifecycle refresh
      Input

      Output

      • Discussion
      • Intake processes
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration Management Diagram Template Library
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Determine appropriate actions for detecting new or changed CIs through discovery

      Automated detection will provide the most efficient way of recording planned changes to CIs as well as detected unplanned changes. Check with the tool to determine what reports or notifications are available for the configuration management process and define what actions will be appropriate.

      As new CIs are detected, identify the process by which they should have been introduced into configuration management and compare against those records. If your CMDB can automatically check for documentation, this may be easier. Weekly reporting will allow you to catch changes quickly, and alerts on critical CIs could enable faster remediation, if the tool allows for alerting. AIOps could identify, notify of, and process many changes in a highly dynamic environment.

      Type of Change

      Impacted Process

      Validation

      Findings

      Actions

      Configuration change to networking equipment or software

      Change management

      Check for request for change

      No RFC

      Add to CAB agenda, notify technical owner

      Configuration change to end-user device or software

      Asset management

      Check for service ticket

      No ticket

      Escalate to asset agenda, notify service manager

      New assets coming into service

      Security incident and event management

      Check for SIEM integration

      No SIEM integration

      Notify security operations team to investigate

      The configuration manager may not have authority to act but can inform the process owners of unauthorized changes for further action. Once the notifications are forwarded to the appropriate process owner, the configuration manager will note the escalation and follow up on data corrections as deemed appropriate by the associated process owner.

      3.1.4 Record when and how attributes will change

      These lists will help with configuration control plans and your implementation roadmap.

      1. List each attribute that will change in that CI type's life.
      2. Write all the times that each attribute will change. Identify:
        1. The name of the workflow, service request, process, or practice that modifies the attribute.
        2. Whether the update is made automatically or manually.
        3. The role or tool that updates the CMDB.
      1. Update the relevant process or procedure documentation. Explicitly identify when the configuration records are updated.

      Document these tables in Configuration Management Standard Operation Procedures, Section 8.7: Practices That Modify CIs.

      Network Equipment
      Attributes

      Practices That Modify This Attribute

      Status
      • Infra Deployment (updated manually by Network Engineering)
      • Change Enablement (updated manually by CAB or Network Engineering)
      Assigned User
      • IT Employee Offboarding or Role Change (updated manually by Network Engineering)
      Version
      • Patch Deployment (updated automatically by SolarWinds)
      End-User Computers
      Attributes
      Practices That Modify This Attribute
      Status
      • Device Deployment (updated manually by Desktop Support)
      • Device Recovery (updated manually by Desktop Support)
      • Employee Offboarding and Role Change (updated manually by Service Desk)
      Assigned User
      • Device Deployment (updated manually by Desktop Support)
      • Device Recovery (updated manually by Desktop Support)
      • Employee Offboarding and Role Change (updated manually by Service Desk)
      Version
      • Patch Deployment (updated automatically by ConfigMgr)

      Institute configuration control and configuration baselines where appropriate

      A baseline enables an assessment of one or more systems against the desired state and is useful for troubleshooting incidents or problems and validating changes and security settings.

      Baselines may be used by enterprise architects and system engineers for planning purposes, by developers to test their solution against production copies, by technicians to assess configuration drift that may be causing performance issues, and by change managers to assess and verify the configuration meets the target design.

      Configuration baselines are a snapshot of configuration records, displaying attributes and first-level relationships of the CIs. Standard configurations may be integral to the success of automated workflows, deployments, upgrades, and integrations, as well as prevention of security events. Comparing current CIs against their baselines will identify configuration drift, which could cause a variety of incidents. Configuration baselines are updated through change management processes.
      Configuration baselines can be used for a variety of use cases:

      • Version control – Management of software and hardware versions, https://dj5l3kginpy6f.cloudfront.net/blueprints/harness-configuration-management-superpowers-phases-1-4/builds, and releases.
      • Access control – Management of access to facilities, storage areas, and the CMS.
      • Deployment control – Take a baseline of CIs before performing a release so you can use this to check against actual deployment.
      • Identify accidental changes Everyone makes mistakes. If someone installs software on the wrong server or accidentally drops a table in a database, the CMS can alert IT of the unauthorized change (if the CI is included in configuration control).

      Info-Tech Insight

      Determine the appropriate method for evaluating and approving changes to baselines. Delegating this to the CCB every time may reduce agility, depending on volume. Discuss in CCB meetings.

      A decision tree for deploying requested changes.

      3.1.5 Institute configuration control and configuration baselines where appropriate

      Only baseline CIs and relationships that you want to control through change enablement.

      1. Determine criteria for capturing configuration baselines, including CI type, event, or processes.
      2. Identify who will use baselines and how they will use the data. Identify their needs.
      3. Identify CIs that will be out of scope and not have baselines created.
      4. Document requirements in the SOP.
      5. Ensure appropriate team members have training on how to create and capture baselines in the CMDB.
      6. Document in the Configuration Management Standard Operating Procedures, section 8.5: Establish and Maintain Configuration Baselines.
      Process Criteria Systems
      Change Enablement & Deployment All high-risk changes must have the baseline captured with version number to revert to stable version in the event of an unsuccessful change
      • Servers (physical and virtual)
      • Enterprise software
      • IaaS
      • Data centers
      Security Identify when configuration drift may impact risk mitigation strategies
      • Servers (physical and virtual)
      • Enterprise software
      • IaaS
      • Data centers
      Input

      Output

      • Discussion
      • Baseline configuration guidelines
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Step 3.2

      Validate data within the CMDB

      Activities

      3.2.1 Build an audit plan and checklist

      This step will walk you through the following aspects of a configuration management system:

      • Data validation and audit

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • Project manager
      • IT audit

      Outcomes of this step

      • Updates to processes for data validation
      • Plan for auditing and validating the data in the CMDB

      Audit and validate the CMDB

      Review the performance of the supporting technologies and processes to validate the accuracy of the CMDB.

      A screenshot of the CM Audit Plan.

      CM Audit Plan

      • CM policies
      • CM processes and procedures
      • Interfacing processes
      • Content within the CMDB

      "If the data in your CMDB isn't accurate, then it's worthless. If it's wrong or inaccurate, it's going to drive the wrong decisions. It's going to make IT worse, not better."
      – Valence Howden, Research Director, Info-Tech Research Group

      Ensure the supporting technology is working properly

      Does the information in the database accurately reflect reality?

      Perform functional tests during audits and as part of release management practices.

      Audit results need to have a clear status of "compliant," "noncompliant," or "compliant with conditions," and conditions need to be noted. The conditions will generally offer a quick win to improve a process, but don't use these audit results to quickly check off something as "done." Ensure the fix is useful and meaningful to the process.
      The audit should cover three areas:

      • Process: Are process requirements for the program well documented? Are the processes being followed? If there were updates to the process, were those updates to the process documented and communicated? Has behavior changed to suit those modified processes?
      • Physical: Physical configuration audits (PCAs) are audits conducted to verify that a configuration item, as built, conforms to the technical documentation that defines and describes it.
      • Functional: Functional configuration audits (FCAs) are audits conducted to verify that the development of a configuration item has been completed satisfactorily, the item has achieved the functional attributes specified in the functional or allocated baseline, and its technical documentation is complete and satisfactory.

      Build auditing and validation of processes whenever possible

      When technicians and analysts are working on a system, they should check to make sure the data about that system is correct. When they're working in the CMDB, they should check that the data they're working with is correct.

      More frequent audits, especially in the early days, may help move toward process adoption and resolving data quality issues. If audits are happening more frequently, the audits can include a smaller scope, though it's important to vary each one to ensure many different areas have been audited through the year.

      • Watch for data duplication from multiple discovery tools.
      • Review mapping to ensure all relevant CIs are attached to a product or service.
      • Ensure report data is logical.

      Ensure the supporting technology is working properly

      Does the information in the database accurately reflect reality?

      Perform functional tests during audits and as part of release management practices.

      Audit results need to have a clear status of "compliant," "noncompliant," or "compliant with conditions," and conditions need to be noted. The conditions will generally offer a quick win to improve a process, but don't use these audit results to quickly check off something as "done." Ensure the fix is useful and meaningful to the process.
      The audit should cover three areas:

      • Process: Are process requirements for the program well documented? Are the processes being followed? If there were updates to the process, were those updates to the process documented and communicated? Has behavior changed to suit those modified processes?
      • Physical: Physical configuration audits (PCAs) are audits conducted to verify that a configuration item, as built, conforms to the technical documentation that defines and describes it.
      • Functional: Functional configuration audits (FCAs) are audits conducted to verify that the development of a configuration item has been completed satisfactorily, the item has achieved the functional attributes specified in the functional or allocated baseline, and its technical documentation is complete and satisfactory.

      More frequent audits, especially in the early days, may help move toward process adoption and resolving data quality issues. If audits are happening more frequently, the audits can include a smaller scope, though it's important to vary each one to ensure many different areas have been audited through the year.

      • Watch for data duplication from multiple discovery tools.
      • Review mapping to ensure all relevant CIs are attached to a product or service.
      • Ensure report data is logical.

      Identify where processes break down and data is incorrect

      Once process stops working, data becomes less accurate and people find workarounds to solve their own data needs.

      Data within the CMDB often becomes incorrect or incomplete where human work breaks down

      • Investigate processes that are performed manually, including data entry.
      • Investigate if the process executors are performing these processes uniformly.
      • Determine if there are opportunities to automate or provide additional training.
      • Select a sample of the corresponding data in the CMS. Verify if the data is correct.

      Non-CCB personnel may not be completing processes fully or consistently

      • Identify where data in the CMS needs to be updated.
      • Identify whether the process practitioners are uniformly updating the CMS.
      • Discuss options for improving the process and driving consistency for data that will benefit the whole organization.

      Ensure that the data entered in the CMDB is correct

      • Confirm that there is no data duplication. Data duplication is very common when there are multiple discovery tools in your environment. Confirm that you have set up your tools properly to avoid duplication.
      • Build a process to respond to baseline divergence when people make changes without following change processes and when updates alter settings.
      • Audit the system for accuracy and completeness.

      3.2.1 Build an audit plan and checklist

      Use the audit to identify areas where processes are breaking down.

      Audits present you with the ability to address these pain points before they have greater negative impact.

      1. Identify which regulatory requirements and/or auditing bodies will be relevant to audit processes or findings.
      2. Determine frequency of practice audits and how they relate to internal audits or external audits.
      3. Determine audit scope, including requirements for data spot checks.
      4. Determine who will be responsible for conducting audits and validate this is consistent with the RACI chart.
      5. Record audit procedures in the Configuration Management Standard Operating Procedures section 8.6: Verify and Review the Quality of Information Through Auditing.
      6. Review the Configuration Management Audit and Validation Checklist and modify to suit your needs.

      Download the Configuration Management Audit and Validation Checklist

      Input

      Output

      • Discussion
      • Baseline configuration guidelines
      MaterialsParticipants
      • Configuration Management Standard Operating Procedures
      • Configuration control board
      • Configuration manager
      • Project sponsor
      • IT stakeholders

      Phase 4

      Service Configuration Roadmap

      StrategyData StructureProcessesRoadmap
      • Challenges and Goals
      • Use Cases and Data
      • Roles and Responsibilities
      • Services
      • Classifications
      • Data Modeling
      • Lifecycle Processes
      • Baselines
      • Audit and Data Validation
      • Metrics
      • Communications Plan
      • Roadmap

      This phase will walk you through the following aspect of a configuration management system:
      Roadmap
      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager

      Harness Service Configuration Management Superpowers

      Step 4.1

      Define measures of success

      Activities

      4.1.1 Identify key metrics to define configuration management success
      4.1.2 Brainstorm and record desired reports, dashboards, and analytics
      4.1.3 Build a configuration management policy

      This phase will walk you through the following aspects of a configuration management system:

      • Metrics
      • Policy

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager

      The value of metrics can be found in IT efficiency increases

      When determining metrics for configuration management, be sure to separate metrics needed to gauge configuration management success and those that will use data from the CMDB to provide metrics on the success of other practices.

      • Metrics provide accurate indicators for IT and business decisions.
      • Metrics help you identify IT efficiencies and problems and solve issues before they become more serious.
      • Active metrics tracking makes root cause analysis of issues much easier.
      • Proper application of metrics helps IT services identification and prioritization.
      • Operational risks can be prevented by identifying and implementing metrics.
      • Metrics analysis increases the confidence of the executive team and ensures that IT is working well.

      A funnel is shown. The output is IT Performance. The inputs are: Service Desk Metrics; Incident Metrics; Asset Mgmt. Metrics; Release Mgmt. Metrics; Change Mgmt. Metrics; Infra. Metrics

      4.1.1 Identify key metrics to define configuration management success

      Determine what metrics are specifically related to the practice and how and when metrics will be accessed.

      Success factors

      Key metrics

      Source

      Product and service configuration data is relevant

      • Stakeholder satisfaction with data access, accuracy, and usability
      • Stakeholder satisfaction with service configuration management interface, procedures, and reports

      Stakeholder discussions

      • Number of bad decisions made due to incorrect or insufficient data
      • Impact of bad decisions made due to incorrect or insufficient data

      Process owner discussions

      • Number and impact of data identified as incorrect
      • % of CMDB data verified over the period

      CMDB

      Cost and effort are continually optimized

      • Effort devoted to service configuration management
      • Cost of tools directly related to the process

      Resource management or scheduling

      ERP

      Progress reporting

      • Communication execution
      • Process
      • Communications and feedback

      Communications team and stakeholder discussions

      Data – How many products are in the CMDB and are fully and accurately discovered and mapped?

      CMDB

      Ability to meet milestones on time and with appropriate quality

      Project team

      Document metrics in the Configuration Management Standard Operating Procedures, section 7: Success Metrics

      Use performance metrics to identify areas to improve service management processes using CMDB data

      Metrics can indicate a problem with service management processes but cannot provide a clear path to a solution on their own.

      • The biggest challenge is defining and measuring the process and people side of the equation.
      • Expected performance may also need to be compared to actual performance in planning, budgeting, and improvements.
      • The analysis will need to include critical success factors (CSFs), data collection procedures, office routines, engineering practices, and flow diagrams including workflows and key relationships.
      • External benchmarking may also prove useful in identifying how similar organizations are managing aspects of their infrastructure, processing transactions/requests, or staffing. If using external benchmarking for actual process comparisons, clearly defining your internal processes first will make the data collection process smoother and more informative.

      Info-Tech Insight

      Using a service framework such as ITIL, COBIT, or ISO 20000 may make this job easier, and subscribing to benchmarking partners will provide some of the external data needed for comparison.

      4.1.2 Brainstorm and record desired reports, dashboards, and analytics with related practices

      The project team will use this list as a starting point

      Allot 45 minutes for this discussion.

      1. Create a table for each service or business capability.
        1. Have one column for each way of consuming data: reports, dashboards, and ad hoc analytics.
        2. Have one row for each stakeholder group that will consume the information.
      2. Use the challenges and use cases to brainstorm reports, dashboards, and ad hoc analytic capabilities that each stakeholder group will find useful.
      3. Record these results in your Configuration Management Standard Operating Procedures, section 7: Aligned Processes' Desired Analytical Capabilities.
      Stakeholder Groups Reports Dashboards
      Change Management
      • CI changes executed without an RFC
      • RFCs grouped by service
      • Potential collisions in upcoming changes
      Security
      • Configuration changes that no longer match the baseline
      • New configuration items discovered
      Finance
      • Service-based costs
      • Service consumption by department

      Download the blueprint Take Control of Infrastructure and Operations Metrics to create a complete metrics program.

      Create a configuration management policy and communicate it

      Policies are important documents to provide definitive guidelines and clarity around data collection and use, process adherence, and controls.

      • A configuration management policy will apply to IT as the audience, and participants in the program will largely be technical.
      • Business users will benefit from a great configuration management program but will not participate directly.
      • The policy will include objectives and scope, use of data, security and integrity of data, data models and criteria, and baseline configurations.
      • Several governing regulations and practices may intersect with configuration management, such as ITIL, COBIT, and NIST frameworks, as well as change enablement, quality management, asset management, and more.
      • As the policy is written, review processes to ensure policies and processes are aligned. The policy should enable processes, and it may require modifications if it hinders the collection, security, or use of data required to meet proposed use cases.
      • Once the policy is written and approved, ensure all stakeholders understand the importance, context, and repercussions of the policy.

      The approvals process is about appropriate oversight of the drafted policies. For example:

      • Do the policies satisfy compliance and regulatory requirements?
      • Do the policies work with the corporate culture?
      • Do the policies address the underlying need?

      If the draft is approved:

      • Set the effective date and a review date.
      • Begin communication, training, and implementation.

      Employees must know that there are new policies and understand the steps they must take to comply with the policies in their work.

      Employees must be able to interpret, understand, and know how to act upon the information they find in the policies.

      Employees must be informed on where to get help or ask questions and who to request policy exceptions from.

      If the draft is rejected:

      • Acquire feedback and make revisions.
      • Resubmit for approval.

      4.1.3 Build a configuration management policy

      This policy provides the foundation for configuration control.

      Use this template as a starting point.

      The Configuration Management Policy provides the foundation for a configuration control board and the use of configuration baselines.
      Instructions:

      1. Review and modify the policy statements. Ensure that the policy statements reflect your organization and the expectations you wish to set.
      2. If you don't have a CCB: The specified responsibilities can usually be assigned to either the configuration manager or the governing body for change enablement.
      3. Determine if you should apply this policy beyond SCM. As written, this policy may provide a good starting point for practices such as:
        • Secure baseline configuration management
        • Software configuration management

      Two screenshots from the Configuration Management Policy template

      Download the Configuration Management Policy template

      Step 4.2

      Build communications and a roadmap

      Activities

      4.2.1 Build a communications plan
      4.2.2 Identify milestones

      This phase will walk you through the following aspects of a configuration management system:

      • Communications plan
      • Roadmap

      This phase involves the following participants:

      • IT service owners
      • Enterprise architects
      • Practice owners and managers
      • SCM practice manager
      • SCM project manager

      Outcomes of this step

      • Documented expectations around configuration control
      • Roadmap and action items for the SCM project

      Do not discount the benefits of a great communications plan as part of change management

      Many configuration management projects have failed due to lack of organizational commitment and inadequate communications.

      • Start at the top to ensure stakeholder buy-in by verifying alignment and use cases. Without a committed project sponsor who believes in the value of configuration management, it will be difficult to draw the IT team into the vision.
      • Clearly articulate the vision, strategy, and goals to all stakeholders. Ensure the team understands why these changes are happening, why they are happening now, and what outcomes you hope to achieve.
      • Gain support from technical teams by clearly expressing organizational and departmental benefits – they need to know "what's in it for me."
      • Clearly communicate new responsibilities and obligations and put a feedback process in place to hear concerns, mitigate risk, and act on opportunities for improvement. Be prepared to answer questions as this practice is rolled out.
      • Be consistent in your messaging. Mixed messages can easily derail progress.
      • Communicate to the business how these efforts will benefit the organization.
      • Share documents built in this blueprint or workshop with your technical teams to ensure they have a clear picture of the entire configuration management practice.
      • Share your measures and view of success and communicate wins throughout building the practice.

      30%

      When people are truly invested in change, it is 30% more likely to stick.
      McKinsey

      82%

      of CEOs identify organizational change management as a priority.
      D&B Consulting

      6X

      Initiatives with excellent change management are six times more likely to meet objectives than those with poor change management.
      Prosci

      For a more detailed program, see Drive Technology Adoption

      Formulate a communications plan to ensure all stakeholders and impacted staff will be aware of the plan

      Communication is key to success in process adoption and in identifying potential risks and issues with integration with other processes. Engage as often as needed to get the information you need for the project and for adoption.

      Identify Messages

      Distinct information that needs to be sent at various times. Think about:

      • Who will be impacted and how.
      • What the goals are for the project/new process.
      • What the audience needs to know about the new process and how they will interface with each business unit.
      • How people can request configuration data.

      Identify Audiences

      Any person or group who will be the target of the communication. This may include:

      • Project sponsors and stakeholders.
      • IT staff who will be involved in the project.
      • IT staff who will be impacted by the project (i.e. who will benefit from it or have obligations to fulfill because of it).
      • Business sponsors and product owners.

      Document and Track

      Document messaging, medium, and responsibility, working with the communications team to refine messages before executing.

      • Identify where people can send questions and feedback to ensure they have the information they need to make or accept the changes.
      • Document Q&A and share in a central location.

      Determine Timing

      Successful communications plans consider timing of various messages:

      • Advanced high-level notice of improvements for those who need to see action.
      • Advanced detailed notice for those who will be impacted by workload.
      • Advanced notice for who will be impacted (i.e. who will benefit from it or have obligations to fulfill because of it) once the project is ready to be transitioned to daily life.

      Determine Delivery

      Work with your communications team, if you have one, to determine the best medium, such as:

      • Meeting announcement for stakeholders and IT.
      • Newsletter for those less impacted.
      • Intranet announcements: "coming soon!"
      • Demonstrations with vendors or project team.

      4.2.1 Build a communications plan

      The communications team will use this list as a starting point.

      Allot 45 minutes for this discussion.

      Identify stakeholders.

      1. Identify everyone who will be affected by the project and by configuration management.

      Craft key messages tailored to each stakeholder group.

      1. Identify the key messages that must be communicated to each group.

      Finalize the communication plan.

      1. Determine the most appropriate timing for communications with each group to maximize receptivity.
      2. Identify any communication challenges you anticipate and incorporate steps to address them into your communication plan.
      3. Identify multiple methods for getting the messages out (e.g. newsletters, emails, meetings).
      1. Identify how feedback will be collected (i.e. through interviews or surveys) to measure whether the changes were communicated well.
      Audience Message Medium Timing Feedback Mechanism
      Configuration Management Team Communicate all key processes, procedures, policies, roles, and responsibilities In-person meetings and email communications Weekly meetings Informal feedback during weekly meetings
      Input

      Output

      • Discussion
      • Rough draft of messaging for communications team
      MaterialsParticipants
      • Project plan
      • Configuration manager
      • Project sponsor
      • IT director
      • Communications team

      Build a realistic, high-level roadmap including milestones

      Break the work into manageable pieces

      1. Plan to have multiple phases with short-, medium-, and long-term goals/timeframes. Building a CMDB is not easy and should be broken into manageable sections.
      2. Set reasonable milestones. For each phase, document goals to define "done" and ensure they're reasonable for the resources you have available. If working with a vendor, include them in your discussions of what's realistic.
      3. Treat the first phase as a pilot. Focus on items you understand well:
        1. Well-understood user-facing and IT services
        2. High-maturity management and governance practices
        3. Trusted data sources
      4. Capture high-value, high-criticality services early. Depending on the complexity of your systems, you may need to split this phase into multiple phases.

      Document this table in the Configuration Management Project Charter, section 3.0: Milestones

      Timeline/Owner Milestone/Deliverable Details
      First four weeks Milestone: Plan defined and validated with ITSM installation vendor Define processes for intake, maintenance, and retirement.
      Rebecca Roberts Process documentation written, approved, and ready to communicate Review CI categories

      4.2.2 Identify milestones

      Build out a high-level view to inform the project plan

      Open the Configuration Management Project Charter, section 3: Milestones.
      Instructions:

      1. Identify high-level milestones for the implementation of the configuration management program. This may include tool evaluation and implementation, assignment of roles, etc.
      2. Add details to fill out the milestone, keeping to a reasonable level of detail. This may inform vendor discussion or further development of the project plan.
      3. Add target dates to the milestones. Validate they are realistic with the team.
      4. Add notes to the assumptions and constraints section.
      5. Identify risks to the plan.

      Two Screenshots from the Configuration Management Project Charter

      Download the Configuration Management Project Charter

      Workshop Participants

      R = Recommended
      O = Optional

      Participants Day 1 Day 2 Day 3 Day 4
      Configuration Management Strategy CMDB Data Structure Processes Communications & Roadmap
      Morning Afternoon Morning Afternoon Morning Afternoon Morning Afternoon
      Head of IT R O
      Project Sponsor R R O O O O O O
      Infrastructure, Enterprise Apps Leaders R R O O O O O O
      Service Manager R R O O O O O O
      Configuration Manager R R R R R R R R
      Project Manager R R R R R R R R
      Representatives From Network, Compute, Storage, Desktop R R R R R R R R
      Enterprise Architecture R R R R O O O O
      Owner of Change Management/Change Control/Change Enablement R R R R R R R R
      Owner of In-Scope Apps, Use Cases R R R R R R R R
      Asset Manager R R R R R R R R

      Related Info-Tech Research

      Research Contributors and Experts

      Thank you to everyone who contributed to this publication

      Brett Johnson, Senior Consultant, VMware

      Yev Khovrenkov, Senior Consultant, Solvera Solutions

      Larry Marks, Reviewer, ISACA New Jersey

      Darin Ohde, Director of Service Delivery, GreatAmerica Financial Services

      Jim Slick, President/CEO, Slick Cyber Systems

      Emily Walker, Sr. Digital Solution Consultant, ServiceNow

      Valence Howden, Principal Research Director, Info-Tech Research Group

      Allison Kinnaird, Practice Lead, IT Operations, Info-Tech Research Group

      Robert Dang, Principal Research Advisor, Security, Info-Tech Research Group

      Monica Braun, Research Director, IT Finance, Info-Tech Research Group

      Jennifer Perrier, Principal Research Director, IT Finance, Info-Tech Research Group

      Plus 13 anonymous contributors

      Bibliography

      An Introduction to Change Management, Prosci, Nov. 2019.
      BAI10 Manage Configuration Audit Program. ISACA, 2014.
      Bizo, Daniel, et al, "Uptime Institute Global Data Center Survey 2021." Uptime Institute, 1 Sept. 2021.
      Brown, Deborah. "Change Management: Some Statistics." D&B Consulting Inc. May 15, 2014. Accessed June 14, 2016.
      Cabinet Office. ITIL Service Transition. The Stationery Office, 2011.
      "COBIT 2019: Management and Governance Objectives. ISACA, 2018.
      "Configuration Management Assessment." CMStat, n.d. Accessed 5 Oct. 2022.
      "Configuration Management Database Foundation." DMTF, 2018. Accessed 1 Feb. 2021.
      Configuration Management Using COBIT 5. ISACA, 2013.
      "Configuring Service Manager." Product Documentation, Ivanti, 2021. Accessed 9 Feb. 2021.
      "Challenges of Implementing configuration management." CMStat, n.d. Accessed 5 Oct. 2022.
      "Determining if configuration management and change control are under management control, part 1." CMStat, n.d. Accessed 5 Oct. 2022.
      "Determining if configuration management and change control are under management control, part 2." CMStat, n.d. Accessed 5 Oct. 2022.
      "Determining if configuration management and change control are under management control, part 3." CMStat, n.d. Accessed 5 Oct. 2022.
      "CSDM: The Recipe for Success." Data Content Manager, Qualdatrix Ltd. 2022. Web.
      Drogseth, Dennis, et al., 2015, CMDB Systems: Making Change Work in the Age of Cloud and Agile. Morgan Kaufman.
      Ewenstein, B, et al. "Changing Change Management." McKinsey & Company, 1 July 2015. Web.
      Farrell, Karen. "VIEWPOINT: Focus on CMDB Leadership." BMC Software, 1 May 2006. Web.
      "How to Eliminate the No. 1 Cause of Network Downtime." SolarWinds, 4 April 2014. Accessed 9 Feb. 2021.
      "ISO 10007:2017: Quality Management -- Guidelines for Configuration Management." International Organization for Standardization, 2019.
      "IT Operations Management." Product Documentation, ServiceNow, version Quebec, 2021. Accessed 9 Feb. 2021.
      Johnson, Elsbeth. "How to Communicate Clearly During Organizational Change." Harvard Business Review, 13 June 2017. Web.
      Kloeckner, K. et al. Transforming the IT Services Lifecycle with AI Technologies. Springer, 2018.
      Klosterboer, L. Implementing ITIL Configuration Management. IBM Press, 2008.
      Norfolk, D., and S. Lacy. Configuration Management: Expert Guidance for IT Service Managers and Practitioners. BCS Learning & Development Limited, revised ed., Jan. 2014.
      Painarkar, Mandaar. "Overview of the Common Data Model." BMC Documentation, 2015. Accessed 1 Feb. 2021.
      Powers, Larry, and Ketil Been. "The Value of Organizational Change Management." Boxley Group, 2014. Accessed June 14, 2016.
      "Pulse of the Profession: Enabling Organizational Change Throughout Strategic Initiatives." PMI, March 2014. Accessed June 14, 2016.
      "Service Configuration Management, ITIL 4 Practice Guide." AXELOS Global Best Practice, 2020
      "The Guide to Managing Configuration Drift." UpGuard, 2017.

      Reduce Risk With Rock-Solid Service-Level Agreements

      • Buy Link or Shortcode: {j2store}365|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      Organizations can struggle to understand what service-level agreements (SLAs) are required and how they can differ depending on the service type. In addition, these other challenges can also cloud an organization’s knowledge of SLAs:

      • No standardized SLAs documents, service levels, or metrics
      • Dealing with lost productivity and revenue due to persistent downtime
      • Not understanding SLAs components and what service levels are required for a particular service
      • How to manage the SLA and hold the vendor accountable

      Our Advice

      Critical Insight

      SLAs need to have clear, easy-to-measure objectives, to meet expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to its obligations.

      Impact and Result

      This project will provide several benefits and learnings for almost all IT workers:

      • Better understanding of an SLA framework and required SLA elements
      • Standardized service levels and metrics aligned to the organization’s requirements
      • Reduced time in reviewing, evaluating, and managing service provider SLAs

      Reduce Risk With Rock-Solid Service-Level Agreements Research & Tools

      Start here – Read our Executive Brief

      Understand how to resolve your challenges with SLAs and their components and ensuring adequate metrics. Learn how to create meaningful SLAs that meet your requirements and manage them effectively.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand SLA elements – Understand the elements of SLAs, service types, service levels, metrics/KPIs, monitoring, and reporting

      • SLA Checklist
      • SLA Evaluation Tool

      2. Create requirements – Create your own SLA criteria and templates that meet your organization’s requirements

      • SLA Template & Metrics Reference Guide

      3. Manage obligations – Learn the SLA Management Framework to track providers’ performance and adherence to their commitments.

      • SLO Tracker & Trending Tool

      Infographic

      Workshop: Reduce Risk With Rock-Solid Service-Level Agreements

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand the Elements of SLAs

      The Purpose

      Understand key components and elements of an SLA.

      Key Benefits Achieved

      Properly evaluate an SLA for required elements.

      Activities

      1.1 SLA overview, objectives, SLA types, service levels

      1.2 SLA elements and objectives

      1.3 SLA components: monitoring, reporting, and remedies

      1.4 SLA checklist review

      Outputs

      SLA Checklist 

      Evaluation Process

      SLA Checklist

      Evaluation Process

      SLA Checklist

      Evaluation Process

      SLA Checklist

      Evaluation Process

      2 Create SLA Criteria and Management Framework

      The Purpose

      Apply knowledge of SLA elements to create internal SLA requirements.

      Key Benefits Achieved

      Templated SLAs that meet requirements.

      Framework to manage SLOs.

      Activities

      2.1 Creating SLA criteria and requirements

      2.2 SLA templates and policy

      2.3 SLA evaluation activity

      2.4 SLA Management Framework

      2.5 SLA monitoring, tracking, and remedy reconciliation

      Outputs

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Internal SLA Management Framework

      Evaluation of current SLAs

      SLA tracking and trending

      Further reading

      Reduce Risk With Rock-Solid Service-Level Agreements

      Hold Service Providers more accountable to their contractual obligations with meaningful SLA components & remedies

      EXECUTIVE BRIEF

      Analyst Perspective

      Reduce Risk With Rock-Solid Service-Level Agreements

      Every year organizations outsource more and more IT infrastructure to the cloud, and IT operations to managed service providers. This increase in outsourcing presents an increase in risk to the CIO to save on IT spend through outsourcing while maintaining required and expected service levels to internal customers and the organization. Ensuring that the service provider constantly meets their obligations so that the CIO can meet their obligation to the organization can be a constant challenge. This brings forth the importance of the Service Level Agreement.

      Research clearly indicates that there is a general lack of knowledge when comes to understanding the key elements of a Service Level Agreement (SLA). Even less understanding of the importance of the components of Service Levels and the Service Level Objectives (SLO) that service provider needs to meet so that the outsourced service consistently meets requirements of the organization. Most service providers are very good at providing the contracted service and they all are very good at presenting SLOs that are easy to meet with very few or no ramifications if they don’t meet their objectives. IT leaders need to be more resolute in only accepting SLOs that are meaningful to their requirements and have meaningful, proactive reporting and associated remedies to hold service providers accountable to their obligations.

      Ted Walker

      Principal Research Director, Vendor Practice

      Info-Tech Research Group

      Executive Brief

      Vendors provide service level commitments to customers in contracts to show a level of trust, performance, availability, security, and responsiveness in an effort create a sense of confidence that their service or platform will meet your organization’s requirements and expectations. Sifting through these promises can be challenging for many IT Leaders. Customers struggle to understand and evaluate what’s in the SLA – are they meaningful and protect your investment? Not understanding the details of SLAs applicable to various types of Service (SaaS, MSP, Service Desk, DR, ISP) can lead to financial and compliance risk for the organization as well as poor customer satisfaction.

      This project will provide IT leadership the knowledge & tools that will allow them to:

      • Understand what SLAs are and why they need them.
      • Develop standard SLAs that meet the organization’s requirements.
      • Negotiate meaningful remedies aligned to Service Levels metrics or KPIs.
      • Create SLA monitoring & reporting and remedies requirements to hold the provider accountable.

      This research:

      1. Is designed for:
      • The CIO or CFO who needs to better understand their provider’s SLAs.
      • The CIO or BU that could benefit from improved service levels.
      • Vendor management who needs to standardize SLAs for the organization IT leadership that needs consistent service levels to the business
      • The contract manager who needs a better understanding of contact SLAs
    • Will help you:
      • Understand what a Service Level Agreement is and what it’s for
      • Learn what the components are of an SLA and why you need them
      • Create a checklist of required SLA elements for your organization
      • Develop standard SLA template requirements for various service types
      • Learn the importance of SLA management to hold providers accountable
    • Will also assist:
      • Vendor management
      • Procurement and sourcing
      • Organizations that need to understand SLAs within contract language
      • With creating standardized monitoring & reporting requirements
      • Organizations get better position remedies & credits to hold vendors accountable to their commitments
    • Reduce Risk With Rock-Solid Service-Level Agreements (SLAs)

      Hold service providers more accountable to their contractual obligations with meaningful SLA components and remedies

      The Problem

      IT Leadership doesn't know how to evaluate an SLA.

      Misunderstanding of obligations given the type of service provided (SAAS, IAAS, DR/BCP, Service Desk)

      Expectations not being met, leading to poor service from the provider.

      No way to hold provider accountable.

      Why it matters

      SLAS are designed to ensure that outsourced IT services meet the requirements and expectations of the organization. Well-written SLAs with all the required elements, metrics, and remedies will allow IT departments to provide the service levels to their customer and avoid financial and contractual risk to the organization.

      The Solution

      1. Understand the key service elements within an SLA
      • Develop a solid understanding of the key elements within an SLA and why they're important.
    • Establish requirements to create SLA criteria
      • Prioritize contractual services and establish concise SLA checklists and performance metrics.
    • Manage SLA obligations to ensure commitments are met
      • Review the five steps for effective SLA management to track provider performance and deal with chronic issues.
    • Service types

      • Availability/Uptime
      • Response Times
      • Resolution Time
      • Accuracy
      • First-Call Resolution

      Agreement Types

      • SaaS/IaaS
      • Service Desk
      • MSP
      • Co-Location
      • DR/BCP
      • Security Ops

      Performance Metrics

      • Reporting
      • Remedies & Credits
      • Monitoring
      • Exclusion

      Example SaaS Provider

      • Response Times ✓
      • Availability/Uptime ✓
      • Resolution Time ✓
      • Update Times ✓
      • Coverage Time ✓
      • Monitoring ✓
      • Reporting ✓
      • Remedies/Credits ✓

      SLA Management Framework

      1. SLO Monitoring
      • SLOs must be monitored by the provider, otherwise they can't be measured.
    • Concise Reporting
      • This is the key element for the provider to validate their performance.
    • Attainment Tracking
      • Capturing SLO metric attainment provides performance trending for each provider.
    • Score carding
      • Tracking details provide input into overall vendor performance ratings.
    • Remedy Reconciliation
      • From SLO tracking, missed SLOs and associated credits needs to be actioned and consumed.
    • Executive Summary

      Your Challenge

      To understand which SLAs are required for your organization and how they can differ depending on the service type. In addition, these other challenges can also cloud your knowledge of SLAs

      • No standardized SLA documents, Service levels, or metrics
      • Dealing with lost productivity & revenue due to persistent downtime
      • Understanding SLA components and what service levels are requires for a particular service
      • How to manage the SLA and hold the vendor accountable

      Common Obstacles

      There are several unknowns that SLA can present to different departments within the organization:

      • Little knowledge of what service levels are required
      • Not knowing SLO standards for a service type
      • Lack of resources to manage vendor obligations
      • Negotiating required metrics/KPIs with the provider
      • Low understanding of the risk that poor SLAs can present to the organization

      Info-Tech's Approach

      Info-Tech has a three-step approach to effective SLAs

      • Understand the elements of an SLA
      • Create Requirements for your organization
      • Manage the SLA obligations

      There are some basic components that every SLA should have – most don’t have half of what is required

      Info-Tech Insight

      SLAs need to have clear, easy to measure objectives to meet your expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to their obligations.

      Your challenge

      This research is designed to help organizations gain a better understanding of what an SLA is, understand the importance of SLAs in IT contracts, and ensure organizations are provided with rock-solid SLAs that meet their requirements and not just what the vendor wants to provide.

      • Vendors can make SLAs weak and difficult to understand; sometimes the metrics are meaningless. Not fully understanding what makes up a good SLA can bring unknown risks to the organization.
      • Managing vendor SLA obligations effectively is important. Are adequate resources available? Does the vendor provide manual vs. automated processes and which do you need? Is the process proactive from the vendor or reactive from the customer?

      SLAs come in many variations and for many service types. Understanding what needs to be in them is one of the keys to reducing risk to your organization.

      “One of the biggest mistakes an IT leader can make is ignoring the ‘A’ in SLA,” adds Wendy M. Pfeiffer, CIO at Nutanix. “

      An agreement isn’t a one-sided declaration of IT capabilities, nor is it a one-sided demand of business requirements,” she says. “An agreement involves creating a shared understanding of desired service delivery and quality, calculating costs related to expectations, and then agreeing to outcomes in exchange for investment.” (15 SLA mistakes IT leaders still make | CIO)

      Common obstacles

      There are typically a lot of unknowns when it comes to SLAs and how to manage them.

      Most organizations don’t have a full understanding of what SLAs they require and how to ensure they are met by the vendor. Other obstacles that SLAs can present are:

      • Inadequate resources to create and manage SLAs
      • Poor awareness of standard or required SLA metrics/KPIs
      • Lack of knowledge about each provider’s commitment as well as your obligations
      • Low vendor willingness to provide or negotiate meaningful SLAs and credits
      • The know-how or resources to effectively monitor and manage the SLA’s performance

      SLAs need to address your requirements

      55% of businesses do not find all of their service desk metrics useful or valuable (Freshservice.com)

      27% of businesses spend four to seven hours a month collating metric reports (Freshservice.com)

      Executive Summary

      Info-Tech’s Approach

      • Understand the elements of an SLA
        • Availability
        • Monitoring
        • Response Times
        • SLO Calculation
        • Resolution Time
        • Reporting
        • Milestones
        • Exclusions
        • Accuracy
        • Remedies & Credits
      • Create standard SLA requirements and criteria
        • SLA Element Checklist
        • Corporate Requirements and Standards
        • SLA Templates and Policy
      • Effectively Manage the SLA Obligations
        • SLA Management Framework
          • SLO Monitoring
          • Concise Reporting
          • Attainment Tracking
          • Score Carding
          • Remedy Reconciliation

      Info-Tech’s three phase approach

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 1

      Understand SLA Elements

      Phase Content:

      • 1.1 What are SLAs, types of SLAs, and why are they needed?
      • 1.2 Elements of an SLA
      • 1.3 Obligation management monitoring, Reporting requirements
      • 1.4 Exclusions
      • 1.5 SLAs vs. SLOs vs. SLIs

      Outcome:

      This phase will present you with an understanding of the elements of an SLA: What they are, why you need them, and how to validate them.

      Phase 2

      Create Requirements

      Phase Content:

      • 2.1 Create a list of your SLA criteria
      • 2.2 Develop SLA policy & templates
      • 2.3 Create a negotiation strategy
      • 2.4 SLA Overachieving discussion

      Outcome:

      This phase will leverage knowledge gained in Phase 1 and guide you through the creation of SLA requirements, criteria, and templates to ensure that providers meet the service level obligations needed for various service types to meet your organization’s service expectations.

      Phase 3

      Manage Obligations

      Phase Content:

      • 3.1 SLA Monitoring, Tracking
      • 3.2 Reporting
      • 3.3 Vendor SLA Reviews & Optimizing
      • 3.4 Performance management

      Outcome:

      This phase will provide you with an SLA management framework and the best practices that will allow you to effectively manage service providers and their SLA obligations.

      Insight summary

      Overarching insight

      SLAs need to have clear, easy-to-measure objectives to meet your expectations and service level requirements, including meaningful reporting and remedies to hold the provider accountable to their obligations.

      Phase 1 insight

      Not understanding the required elements of an SLA and not having meaningful remedies to hold service providers accountable to their obligations can present several risk factors to your organization.

      Phase 2 insight

      Creating standard SLA criteria for your organization’s service providers will ensure consistent service levels for your business units and customers.

      Phase 3 insight

      SLAs can have appropriate SLOs and remedies but without effective management processes they could become meaningless.

      Tactical insight

      Be sure to set SLAs that are easily measurable from regularly accessible data and that are straight forward to interpret.

      Tactical insight

      Beware of low, easy to attain service levels and metrics/KPIs. Service levels need to meet your expectations and needs not the vendor’s.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      SLA Tracker & Trending Tool

      Track the provider’s SLO attainment and see how their performance is trending over time

      SLA Evaluation Tool

      Evaluate SLA service levels, metrics, credit values, reporting, and other elements

      SLA Template & Metrics Reference Guide

      Reference guide for typical SLA metrics with a generic SLA Template

      Service-Level Agreement Checklist

      Complete SLA component checklist for core SLA and contractual elements.

      Key deliverable:

      Service-Level Agreement Evaluation Tool

      Evaluate each component of the SLA , including service levels, metrics, credit values, reporting, and processes to meet your requirements

      Blueprint objectives

      Understand the components of an SLA and effectively manage their obligations

      • To provide an understanding of different types of SLAs, their required elements, and what they mean to your organization. How to identify meaningful service levels based on service types. We will break down the elements of the SLA such as service types and define service levels such as response times, availability, accuracy, and associated metrics or KPIs to ensure they are concise and easy to measure.
      • To show how important it is that all metrics have remedies to hold the service provider accountable to their SLA obligations.

      Once you have this knowledge you will be able to create and negotiate SLA requirements to meet your organization’s needs and then manage them effectively throughout the term of the agreement.

      InfoTech Insight:

      Right-size your requirements and create your SLO criteria based on risk mitigation and create measurements that motivate the desired behavior from the SLA.

      Blueprint benefits

      IT Benefits

      • An understanding of standard SLA service levels and metrics
      • Reduced financial risk through clear and concise easy-to-measure metrics and KPIs
      • Improved SLA commitments from the service provider
      • Meaningful reporting and remedies to hold the provider accountable
      • Service levels and metrics that meet your requirements to support your customers

      Business Benefits

      • Better understanding of an SLA framework and required SLA elements
      • Improved vendor performance
      • Standardized service levels and metrics aligned to your organization’s requirements
      • Reduced time in reviewing and comprehending vendor SLAs
      • Consistent performance from your service providers

      Measure the value of this blueprint

      1. Dollars Saved
      • Improved performance from your service provider
      • Reduced financial risk through meaningful service levels & remedies
      • Dollars gained through:
        • Reconciled credits from obligation tracking and management
        • Savings due to automated processes
    • Time Saved
      • Reduced time in creating effective SLAs through requirement templates
      • Time spent tracking and managing SLA obligations
      • Reduced negotiation time
      • Time spent tracking and reconciling credits
    • Knowledge Gained
      • Understanding of SLA elements, service levels, service types, reporting, and remedies
      • Standard metrics and KPIs required for various service types and levels
      • How to effectively manage the service provider obligations
      • Tactics to negotiate appropriate service levels to meet your requirements
    • Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way wound help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between three to six calls over the course of two to three months.

      Phase 1 - Understand

      • Call #1: Scope requirements, objectives, and your specific SLA challenges

      Phase 2 - Create Requirements

      • Call #2: Review key SLA and how to identify them
      • Call #3: Deep dive into SLA elements and why you need them
      • Call #4: Review your service types and SLA criteria
      • Call #5: Create internal SLA requirements and templates

      Phase 3 - Management

      • Call #6: Review SLA Management Framework
      • Call #7: Review and create SLA Reporting and Tracking

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2
      Understanding SLAs SLA Templating & Management
      Activities

      1.1 SLA overview, objectives, SLA types, service levels

      1.2 SLA elements and objectives

      1.3 SLA components – monitoring, reporting, remedies

      1.4 SLA Checklist review

      2.1 Creating SLA criteria and requirements

      2.2 SLA policy & template

      2.3 SLA evaluation activity

      2.4 SLA management framework

      2.5 SLA monitoring, tracking, remedy reconciliation

      Deliverables
      1. SLA Checklist
      2. SLA policy & template creation
      3. SLA management gap analysis
      1. Evaluation of current SLAs
      2. SLA tracking and trending
      3. Create internal SLA management framework

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 1

      Phase 1

      Understand SLA Elements

      Phase Steps

      • 1.1 What are SLAs, the types of SLAs, and why are they needed?
      • 1.2 Elements of an SLA
      • 1.3 Obligation management monitoring, Reporting requirements
      • 1.4 Exclusions and exceptions
      • 1.5 SLAs vs. SLOs vs. SLIs

      Create Requirements

      Manage Obligations

      1.1 What are SLAs, the types of SLAs, and why are they needed?

      SLA Overview

      What is a Service Level Agreement?

      An SLA is an overarching contractual agreement between a service provider and a customer (can be external or internal) that describes the services that will be delivered by the provider. It describes the service levels and associated performance metrics and expectations, how the provider will show it has attained the SLAs, and defines any remedies or credits that would apply if the provider fails to meet its commitments. Some SLAs also include a change or revision process.

      SLAs come in a few forms. Some are unique, separate, standalone documents that define the service types and levels in more detail and is customized to your needs. Some are separate documents that apply to a service and are web posted or linked to an MSA or SSA. The most common is to have them embedded in, or as an appendix to an MSA or SSA. When negotiating an MSA it’s generally more effective to negotiate better service levels and metrics at the same time.

      Objectives of an SLA

      To be effective, SLAs need to have clearly described objectives that define the service type(s) that the service provider will perform, along with commitment to associated measurable metrics or KPIs that are sufficient to meet your expectations. The goal of these service levels and metrics is to ensure that the service provider is committed to providing the service that you require, and to allow you to maintain service levels to your customers whether internal or external.

      1.1 What are SLAs, the types of SLAs, and why are they needed?

      Key Elements of an SLA

      Principle service elements of an SLA

      There are several more common service-related elements of an SLA. These generally include:

      • The Agreement – the document that defines service levels and commitments.
      • The service types – the type of service being provided by the vendor. These can include SaaS, MSP, Service Desk, Telecom/network, PaaS, Co-Lo, BCP, etc.
      • The service levels – these are the measurable performance objectives of the SLA. They include availability (uptime), response times, restore times, priority level, accuracy level, resolution times, event prevention, completion time, etc.
      • Metrics/KPIs – These are the targets or commitments associated to the service level that the service provider is obligated to meet.
      • Other elements – Reporting requirements, monitoring, remedies/credit values and process.

      Contractual Construct Elements

      These are construct components of an SLA that outline their roles and responsibilities, T&Cs, escalation process, etc.

      In addition, there are several contractual-type elements including, but not limited to:

      • A statement regarding the purpose of the SLA.
      • A list of services being supplied (service types).
      • An in-depth description of how services will be provided and when.
      • Vendor and customer requirements.
      • Vendor and customer obligations.
      • Acknowledgment/acceptance of the SLA.
      • They also list each party’s responsibilities and how issues will be escalated and resolved.

      Common types of SLAs explained

      Service-level SLA

      • This service-level agreement construct is the Service-based SLA. This SLA covers an identified service for all customers in general (for example, if an IT service provider offers customer response times for a service to several customers). In a service-based agreement, the response times would be the same and apply to all customers using the service. Any customer using the service would be provided the same SLA – in this case the same defined response time.

      Customer-based SLA

      • A customer-based SLA is a unique agreement with one customer. The entire agreement is defined for one or all service levels provided to a particular customer (for example, you may use several services from one telecom vendor). The SLAs for these services would be covered in one contract between you and the vendor, creating a unique customer-based vendor agreement. Another scenario could be where a vendor offers general SLAs for its services but you negotiate a specific SLA for a particular service that is unique or exclusive to you. This would be a customer-based SLA as well.

      Multi-level SLA

      • This service-level agreement construct is the multi-level SLA. In a multi-level SLA, components are defined to the organizational levels of the customer with cascading coverage to sublevels of the organization. The SLA typically entails all services and is designed to the cover each sub-level or department within the organization. Sometimes the multi-level SLA is known as a master organization SLA as it cascades to several levels of the organization.

      InfoTech Insight: Beware of low, easy to attain Service levels and metrics/KPIs. Service levels need to meet your requirements, expectations, and needs not the vendor’s.

      1.2 Elements of SLA-objectives, service types, and service levels

      Objectives of Service Levels

      The objective of the service levels and service credits are to:

      • Ensure that the services are of a consistently high quality and meet the requirements of the customer
      • Provide a mechanism whereby the customer can attain meaningful recognition of the vendors failure to deliver the level of service for which it was contracted to deliver
      • Incentivize the vendor or service provider to comply with and to expeditiously provide a remedy for any failure to attain the service levels committed to in the SLA
      • To ensure that the service provider fulfills the defined objectives of the outsourced service

      Service types

      There are several service types that can be part of an SLA. Service types are the different nature of services associated with the SLA that the provider is performing and being measured against. These can include:

      Service Desk, SaaS, PaaS, IaaS, ISP/Telecom/Network MSP, DR & BCP, Co-location security ops, SOW.

      Each service type should have standard service level targets or obligations that can vary depending on your requirements and reliance on the service being provided.

      Service levels

      Service levels are measurable targets, metrics, or KPIs that the service provider has committed to for the particular service type. Service levels are the key element of SLAs – they are the performance expectations set between you and the provider. The service performance of the provider is measured against the service level commitments. The ability of the provider to consistently meet these metrics will allow your organization to fully benefit from the objectives of the service and associated SLAs. Most service levels are time related but not all are.

      Common service levels are:

      Response times, resolution times per percent, restore/recovery times, accuracy, availability/uptime, completion/milestones, updating/communication, latency.

      Each service level has standard or minimum metrics for the provider. The metrics, or KPIs, should be relatively easy to measure and report against on a regular basis. Service levels are generally negotiable to meet your requirements.

      1.2.1 Activity SLA Checklist Tool

      1-2 hours

      Input

      • SLA content, Service elements
      • Contract terms & exclusions
      • Service metrices/KPIs

      Output

      • A concise list of SLA components
      • A list of missing SLA elements
      • Evaluation of the SLA

      Materials

      • Comprehensive checklist
      • Service provider SLA
      • Internal templates or policies

      Participants

      • Vendor or contract manager
      • IT or business unit manager
      • Legal
      • Finance

      Using this checklist will help you review a provider’s SLA to ensure it contains adequate service levels and remedies as well as contract-type elements.

      Instructions:

      Use the checklist to identify the principal service level elements as well as the contractual-type elements within the SLA.

      Review the SLA and use the dropdowns in the checklist to verify if the element is in the SLA and whether it is within acceptable parameters as well the page or section for reference.

      The checklist contains a list of service types that can be used for reference of what SLA elements you should expect to see in that service type SLA.

      Download the SLA Checklist Tool

      1.3 Monitoring, reporting requirements, remedies/credit process

      Monitoring & Reporting

      As mentioned, well-defined service levels are key to the success of the SLA. Validating that the metrics/KPIs are being met on a consistent basis requires regular monitoring and reporting. These elements of the SLA are how you hold the provider accountable to the SLA commitments and obligations. To achieve the service level, the service must be monitored to validate that timelines are met and accuracy is achieved.

      • Data or details from monitoring must then be presented in a report and delivered to the customer in an agreed-upon format. These formats can be in a dashboard, portal, spreadsheet, or csv file, and they must have sufficient criteria to validate the service-level metric. Reports should be kept for future review and to create historical trending.
      • Monitoring and reporting should be the responsibility of the service provider. This is the only way that they can validate to the customer that a service level has been achieved.
      • Reporting criteria and delivery timelines should be defined in the SLA and can even have a service level associated with it, such as a scheduled report delivery on the fifth day of the following month.
      • Reports need to be checked and balanced. When defining report criteria, be sure to define data source(s) that can be easily validated by both parties.
      • Report criteria should include compliance requirements, target metric/KPIs, and whether they were attained.
      • The report should identify any attainment shortfall or missed KPIs.

      Too many SLAs do not have these elements as often the provider tries to put the onus on the customer to monitor their performance of the service levels. .

      1.3.1 Monitoring, reporting requirements, remedies/credit process

      Remedies and Credits

      Service-level reports validate the performance of the service provider to the SLA metrics or KPIs. If the metrics are met, then by rights, the service provider is doing its job and performing up to expectations of the SLA and your organization.

      • What if the metrics are not being met either periodically or consistently? Solving this is the goal of remedies. Remedies are typically monetary costs (in some form) to the provider that they must pay for not meeting a service-level commitment. Credits can vary significantly and should be aligned to the severity of the missed service level. Sometimes there no credits offered by the vendor. This is a red flag in an SLA.
      • Typically expressed as a monetary credit, the SLA will have service levels and associated credits if the service-level metric/KPI is not met during the reporting period. Credits can be expressed in a dollar format, often defined as a percentage of a monthly fee or prorated annual fee. Although less common, some SLAs offer non-financial credits. These could include: an extension to service term, additional modules, training credits, access to a higher support level, etc.
      • Regardless of how the credit is presented, this is typically the only way to hold your provider accountable to their commitments and to ensure they perform consistently to expectations. You must do a rough calculation to validate the potential monetary value and if the credit is meaningful enough to the provider.

      Research shows that credit values that equate to just a few dollars, when you are paying the provider tens of thousands of dollars a month for a service or product, the credit is insignificant and therefore doesn’t incent the provider to achieve or maintain a service level.

      1.3.2 Monitoring, reporting requirements, remedies/credit process

      Credit Process

      Along with meaningful credit values, there must be a defined credit calculation method and credit redemption process in the SLA.

      Credit calculation. The credit calculation should be simple and straight forward. Many times, we see providers define complicated methods of calculating the credit value. In some cases complicated service levels require higher effort to monitor and report on, but this shouldn’t mean that the credit for missing the service level needs to require the same effort to calculate. Do a sample credit calculation to validate if the potential credit value is meaningful enough or meets your requirements.

      Credit redemption process. The SLA should define the process of how a credit is provided to the customer. Ideally the process should be fairly automated by the service provider. If the report shows a missed service level, that should trigger a credit calculation and credit value posted to account followed by notification. In many SLAs that we review, the credit process is either poorly defined or not defined at all. When it is defined, the process typically requires the customer to follow an onerous process and submit a credit request that must then be validated by the provider and then, if approved, posted to your account to be applied at year end as long as you are in complete compliance with the agreement and up-to-date on your account etc. This is what we need to avoid in provider-written SLAs. You need a proactive process where the service provider takes responsibility for missing an SLA and automatically assigns an accurate credit to your account with an email notice.

      Secondary level remedies. These are remedies for partial performance. For example, the platform is accessible but some major modules are not working (i.e.: the payroll platform is up and running and accessible but the tax table is not working properly so you can’t complete your payroll run on-time). Consider the requirement of a service level, metric, and remedy for critical components of a service and not just the platform availability.

      Info-Tech Insight SLA’s without adequate remedies to hold the vendor accountable to their commitments make the SLAs essentially meaningless.

      1.4 Exclusions indemnification, force majeure, scheduled maintenance

      Contract-Related Exclusions

      Attaining service-level commitments by the provider within an SLA can depend on other factors that could greatly influence their performance to service levels. Most of these other factors are common and should be defined in the SLA as exclusions or exceptions. Exceptions/exclusions can typically apply to credit calculations as well. Typical exceptions to attaining service levels are:

      • Denial of Service (DoS) attacks
      • Communication/ISP outage
      • Outages of third-party hosting
      • Actions or inactions of the client or third parties
      • Scheduled maintenance but not emergency maintenance
      • Force majeure events which can cover several different scenarios

      Attention should be taken to review the exceptions to ensure they are in fact not within the reasonable control of the provider. Many times the provider will list several exclusions. Often these are not reasonable or can be avoided, and in most cases, they allow the service provider the opportunity to show unjustified service-level achievements. These should be negotiated out of the SLA.

      1.5 Activity SLA Evaluation Tool

      1-2 hours

      Input

      • SLA content
      • SLA elements
      • SLA objectives
      • SLO calculation methods

      Output

      • Rating of the SLA service levels and objectives
      • Overall rating of the SLA content
      • Targeted list of required improvements

      Materials

      • SLA comprehensive checklist
      • Service provider SLA

      Participants

      • Vendor or contract manager
      • IT manager or leadership
      • Application or business unit manager

      The SLA Evaluation Tool will allow you evaluate an SLA for content. Enter details into the tool and evaluate the service levels and SLA elements and components to ensure the agreement contains adequate SLOs to meet your organization’s service requirements.

      Instructions:

      Review and identify SLA elements within the service provider’s SLA.

      Enter service-level details into the tool and rate the SLOs.

      Enter service elements details, validate that all required elements are in the SLA, and rate them accordingly.

      Capture and evaluate service-level SLO calculations.

      Review the overall rating for the SLA and create a targeted list for improvements with the service provider.

      Download the SLA Evaluation Tool

      1.5 Clarification: SLAs vs. SLOs vs. SLIs

      SLA – Service-Level Agreement The promise or commitment

      • This is the formal agreement between you and your service provider that contains their service levels and obligations with measurable metrics/KPIs and associated remedies. SLAs can be a separate or unique document, but are most commonly embedded within an MSA, SOW, SaaS, etc. as an addendum or exhibit.

      SLO – Service-Level Objective The goals or targets

      • This service-level agreement construct is the customer-based SLA. A Customer-based SLA is a unique agreement with one customer. The entire agreement is defined for one or all service levels provided to a particular customer. For example, you may use several services from one telecom vendor. The SLAs for these services would be covered in one contract between you and the Telco vendor, creating a unique customer-based to vendor agreement. Another scenario: a vendor offers general SLAs for its services and you negotiate a specific SLA for a particular service that is unique or exclusive to you. This would be a customer-based SLA as well.

      Other common names are Metrics and Key Performance Indicators (KPIs )

      SLI – Service-Level Indicator How did we do? Did we achieve the objectives?

      • An SLI is the actual metric attained after the measurement period. SLI measures compliance with an SLO (service level objective). So, for example, if your SLA specifies that your systems will be available 99.95% of the time, your SLO is 99.95% uptime and your SLI is the actual measurement of your uptime. Maybe it’s 99.96%. maybe 99.99% or even 99.75% For the vendor to be compliant to the SLA, the SLI(s) must meet or exceed the SLOs within the SLA document.

      Other common names: attainment, results, actual

      Info-Tech Insight:

      Web-posted SLAs that are not embedded within a signed MSA, can present uncertainty and risk as they can change at any time and typically without direct notice to the customer

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 2

      Understand SLA Elements

      Phase 2

      Create Requirements

      Phase Steps

      • 2.1 Create a list of your SLA criteria
      • 2.2 Develop SLA policy & templates
      • 2.3 Create a negotiation strategy
      • 2.4 SLA overachieving discussion

      Manage Obligations

      2.1 Create a list of your SLA criteria

      Principle Service Elements

      With your understanding of the types of SLAs and the elements that comprise a well-written agreement

      • The next step is to start to create a set of SLA criteria for service types that your organization outsources or may require in the future.
      • This criteria should define the elements of the SLA with tolerance levels that will require the provider to meet your service expectations.
      • Service levels, metrics/KPIs, associated remedies and reporting criteria. This criteria could be captured into table-like templates that can be referenced or inserted into service provider SLAs.
      • Once you have defined minimum service-level criteria, we recommend that you do a deeper review of the various service provider types that your organization has in place. The goal of the review is to understand the objective of the service type and associated service levels and then compare them to your requirements for the service to meet your expectations. Service levels and KPIs should be no less than if your IT department was providing the service with its own resources and infrastructure.
      • Most IT departments have service levels that they are required to meet with their infrastructure to the business units or organization, whether it’s App delivery, issue or problem resolution, availability etc. When any of these services are outsourced to an external service provider, you need to make all efforts to ensure that the service levels are equal to or better than the previous or existing internal expectations.
      • Additionally, the goal is to identify service levels and metrics that don’t meet your requirements or expectations and/or service levels that are missing.

      2.2 Develop SLA policies and templates

      Contract-type Elements

      After creating templates for minimum-service metrics & KPIs, reporting criteria templates, process, and timing, the next step should be to work on contract-type elements and additional service-level components. These elements should include:

      • Reporting format, criteria, and timelines
      • Monitoring requirements
      • Minimum acceptable remedy or credits process; proactive by provider vs. reactive by customer
      • Roles & responsibilities
      • Acceptable exclusion details
      • Termination language for persistent failure to meet SLOs

      These templates or criteria minimums can be used as guidelines or policy when creating or negotiating SLAs with a service provider.

      Start your initial element templates for your strategic vendors and most common service types: SaaS, IaaS, Service Desk, SecOps, etc. The goal of SLA templates is to create simple minimum guidelines for service levels that will allow you to meet your internal SLAs and expectations. Having SLA templates will show the service provider that you understand your requirements and may put you in a better negotiating position when reviewing with the provider.

      When considering SLO metrics or KPIs consider the SMART guidance:

      Simple: A KPI should be easy to measure. It should not be complicated, and the purpose behind recording it must be documented and communicated.

      Measurable: A KPI that cannot be measured will not help in the decision-making process. The selected KPIs must be measurable, whether qualitatively or quantitatively. The procedure for measuring the KPIs must be consistent and well-defined.

      Actionable: KPIs should contribute to the decision-making process of your organization. A KPI that does not make any such contributions serves no purpose.

      Relevant: KPIs must be related to operations or functions that a security team seeks to assess.

      Time-based: KPIs should be flexible enough to demonstrate changes over time. In a practical sense, an ideal KPI can be grouped together by different time intervals.

      (Guide for Security Operations Metrics)

      2.2.1 Activity: Review SLA Template & Metrics Reference Guide

      1-2 hours

      Input

      • Service level metrics
      • List of who is accountable for PPM decisions

      Output

      • SLO templates for service types
      • SLA criteria that meets your organization’s requirements

      Materials

      • SLA Checklist
      • SLA criteria list with SLO & credit values
      • PPM Decision Review Workbook

      Participants

      • Vendor manager
      • IT leadership
      • Procurement or contract manager
      1. Review the SLA Template and Metrics Reference Guide for common metrics & KPIs for the various service types. Each Service Type tab has SLA elements and SLO metrics typically associated with the type of service.
      2. Some service levels have common or standard credits* that are typically associated with the service level or metric.
      3. Use the SLA Template to enter service levels, metrics, and credits that meet your organization’s criteria or requirements for a given service type.

      Download the SLA Template & Metrics Reference Guide

      *Credit values are not standard values, rather general ranges that our research shows to be the typical ranges that credit values should be for a given missed service level

      2.3 Create a negotiation strategy

      Once you have created service-level element criteria templates for your organization’s requirements, it’s time to document a negotiation position or strategy to use when negotiating with service providers. Not all providers are flexible with their SLA commitments, in fact most are reluctant to change or create “unique” SLOs for individual customers. Particularly cloud vendors providing IaaS, SaaS, or PaaS, SLAs. ISP/Telcom, Co-Lo and DR/BU providers also have standard SLOs that they don’t like to stray far from. On the other hand, security ops (SIEM), service desk, hardware, and SOW/PS providers who are generally contracted to provide variable services are somewhat more flexible with their SLAs and more willing to meet your requirements.

      • Service providers want to avoid being held accountable to SLOs, and their SLAs are typically written to reflect that.

      The goal of creating internal SLA templates and policies is to set a minimum baseline of service levels that your organization is willing to accept, and that will meet their requirements and expectations for the outsourced service. Using these templated SLOs will set the basis for negotiating the entire SLA with the provider. You can set the SLA purpose, objectives, roles, and responsibilities and then achieve these from the service provider with solid SLOs and associated reporting and remedies.

      Info-Tech Insight

      Web-posted SLAs that are not embedded within a signed MSA can present uncertainty and risk as they can change at any time and typically without direct notice to the customer

      2.3.1 Negotiating strategy guidance

      • Be prepared. Create a negotiating plan and put together a team that understands your organization’s requirements for SLA.
      • Stay informed. Request provider’s recent performance data and negotiate SLOs to the provider’s average performance.
      • Know what you need. Corporate SLA templates or policies should be positioned to service providers as baseline minimums.
      • Show some flexibility. Be willing to give up some ground on one SLO in exchange for acceptance of SLOs that may be more important to your organization.
      • Re-group. Have a fallback position or Plan B. What if the provider can’t or won’t meet your key SLOs? Do you walk?
      • Do your homework. Understand what the typical standard SLOs are for the type of service level.

      2.4 SLO overachieving incentive discussion

      Monitoring & Reporting

      • SLO overachieving metrics are seen in some SLAs where there is a high priority for a service provider to meet and or exceed the SLOs within the SLA. These are not common terms but can be used to improve the overall service levels of a provider. In these scenarios the provider is sometimes rewarded for overachieving on the SLOs, either consistently or on a monthly or quarterly basis. In some cases, it can make financial sense to incent the service provider to overachieve on their commitments. Incentives can drive behaviors and improved performance by the provider that can intern improve the benefits to your organization and therefore justify an incent of some type.
      • Example: You could have an SLO for invoice accuracy. If not achieved, it could cost the vendor if they don’t meet the accuracy metric, however if they were to consistently overachieve the metric it could save accounts payable hours of time in validation and therefore you could pass on some of these measurable savings to the provider.
      • Overachieving incentives can add complexity to the SLA so they need to be easily measurable and simple to manage.
      • Overachieving incentives can also be used in provider performance improvement plans, where a provider might have poor trending attainment and you need to have them improve their performance in a short period of time. Incentives typically will motivate provider improvement and generally will cost much less than replacing the provider.
      • There is another school of thought that you shouldn’t have to pay a provider for doing their job; however, others are of the opinion that incentives or bonuses improve the overall performance of individuals or teams and are therefore worth consideration if both parties benefit from the over performance.

      Reduce Risk With Rock-Solid Service-Level Agreements

      Phase 3

      Understand SLA Elements

      Create Requirements

      Phase 3

      Manage Obligations

      Phase Steps

      • 3.1 SLA monitoring and tracking
      • 3.2 Reporting
      • 3.3 Vendor SLA reviews & optimizing
      • 3.4 Performance management

      3.1 SLA monitoring, tracking, and remedy reconciliation

      The next step to effective SLAs is the management component. It could be fruitless if you were to spend your time and efforts negotiating your required service levels and metrics and don’t have some level of managing the SLA. In that situation you would have no way of knowing if the service provider is attaining their SLOs.

      There are several key elements to effective SLA management:

      • SLO monitoring
      • Simple, concise reporting
      • SLO attainment tracking
      • Score carding & trending
      • Remedy reconciliation

      SLA Management framework

      SLA Monitoring → Concise Reporting → Attainment Tracking → Score Carding →Remedy Reconciliation

      “A shift we’re beginning to see is an increased use of data and process discovery tools to measure SLAs,” says Borowski of West Monroe. “While not pervasive yet, these tools represent an opportunity to identify the most meaningful metrics and objectively measure performance (e.g., cycle time, quality, compliance). When provided by the client, it also eliminates the dependency on provider tools as the source-of-truth for performance data.” – Stephanie Overby

      3.1 SLA management framework

      SLA Performance Management

      • SLA monitoring provides data for SLO reports or dashboards. Reports provide attainment data for tacking over time. Attainment data feeds scorecards and allows for trending analysis. Missed attainment data triggers remedies.
      • All service providers monitor their systems, platforms, tickets, agents, sensors etc. to be able to do their jobs. Therefore, monitoring is readily available from your service provider in some form.
      • One of the key purposes of monitoring is to generate data into internal reports or dashboards that capture the performance metrics of the various services. Therefore, service-level and metric reports are readily available for all of the service levels that a service provider is contracted or engaged to provide.
      • Monitoring and reporting are the key elements that validate how your service provider is meeting its SLA obligations and thus are very important elements of an SLA. SLO report data becomes attainment data once the metric or KPI has been captured.
      • As a component of effective SLA management, this attainment data needs to be tracked/recorded in an easy-to-read format or table over a period of time. Attainment data can then be used to generate scorecards and trending reports for your review both internally and with the provider as required.
      • If attainment data shows that the service provider is meeting their SLA obligations, then the SLA is meeting your requirements and expectations. If on the other hand, attainment data shows that obligations are not being met, then actions must be taken to hold the service provider accountable. The most common method is through remedies that are typically in the form of a credit through a defined process (see Sec. 1.3). Any credits due for missed SLOs should also be tracked and reported to stakeholders and accounting for validation, reconciliation, and collection.

      3.2 Reporting

      Monitoring & Reporting

      • Many SLAs are silent on monitoring and reporting elements and require that the customer, if aware or able, to monitor the providers service levels and attainment and create their own KPI and reports. Then if SLOs are not met there is an arduous process that the customer must go through to request their rightful credit. This manual and reactive method creates all kinds of risk and cost to the customer and they should make all attempts to ensure that the service provider proactively provides SLO/KPI attainment reports on a regular basis.
      • Automated monitoring and reporting is a common task for many IT departments. There is no reason that a service provider can’t send reports proactively in a format that can be easily interpreted by the customer. The ideal state would be to capture KPI report data into a customer’s internal service provider scorecard.
      • Automated or automatic credit posting is another key element that service providers tend to ignore, primarily in hopes that the customer won’t request or go through the trouble of the process. This needs to change. Some large cloud vendors already have automated processes that automatically post a credit to your account if they miss an SLO. This proactive credit process should be at the top of your negotiation checklist. Service providers are avoiding thousands of credit dollars every year based on the design of their credit process. As more customers push back and negotiate more efficient credit processes, vendors will soon start to change and may use it as a differentiator with their service.

      3.2.1 Performance tracking and trending

      What gets measured gets done

      SLO Attainment Tracking

      A primary goal of proactive and automated reporting and credit process is to capture the provider’s attainment data into a tracker or vendor scorecard. These tracking scorecards can easily create status reports and performance trending of service providers, to IT leadership as well as feed QBR agenda content.

      Remedy Reconciliation

      Regardless of how a credit is processed it should be tracked and reconciled with internal stakeholders and accounting to ensure credits are duly applied or received from the provider and in a timely manner. Tracking and reconciliation must also align with your payment terms, whether monthly or annually.

      “While the adage, ‘You can't manage what you don't measure,’ continues to be true, the downside for organizations using metrics is that the provider will change their behavior to maximize their scores on performance benchmarks.” – Rob Lemos

      3.2.1 Activity SLA Tracker and Trending Tool

      1-2 hours setup

      Input

      • SLO metrics/KPIs from the SLA
      • Credit values associated with SLO

      Output

      • Monthly SLO attainment data
      • Credit tracking
      • SLO trending graphs

      Materials

      • Service provider SLO reports
      • Service provider SLA
      • SLO Tracker & Trending Tool

      Participants

      • Contract or vendor managers
      • Application or service managers
      • Service provider

      An important activity in the SLA management framework is to track the provider’s SLO attainment on a monthly or quarterly basis. In addition, if an SLO is missed, an associated credit needs to be tracked and captured. This activity allows you to capture the SLOs from the SLA and track them continually and provide data for trending and review at vendor performance meetings and executive updates.

      Instructions: Enter SLOs from the SLA as applicable.

      Each month, from the provider’s reports or dashboards, enter the SLO metric attainment.

      When an SLO is met, the cell will turn green. If the SLO is missed, the cell will turn red and a corresponding cell in the Credit Tracker will turn green, meaning that a credit needs to be reconciled.

      Use the Trending tab to view trending graphs of key service levels and SLOs.

      Download the SLO Tracker and Trending Tool

      3.3 Vendor SLA reviews and optimizing

      Regular reviews should be done with providers

      Collecting attainment data with scorecards or tracking tools provides summary information on the performance of the service provider to their SLA obligations. This information should be used for regular reviews both internally and with the provider.

      Regular attainment reviews should be used for:

      • Performance trending upward or downward
      • Identifying opportunities to revise or improve SLOs
      • Optimizing SLO and processes
      • Creating a Performance Improvement Plan (PIP) for the service provider

      Some organizations choose to review SLA performance with providers at regular QBRs or at specific SLA review meetings

      This should be determined based on the criticality, risk, and strategic importance of the provider’s service. Providers that provide essential services like ERP, payroll, CRM, HRIS, IaaS etc. should be reviewed much more regularly to ensure that any decline in service is identified early and addressed properly in accordance with the service provider. Negative trending performance should also be documented for consideration at renewal time.

      3.4 Performance management

      Dealing with persistent poor performance and termination

      Service providers that consistently miss key service level metrics or KPIs present financial and security risk to the organization. Poor performance of a service provider reflects directly on the IT leadership and will affect many other business aspects of the organization including:

      • Ability to conduct day-to-day business activities
      • Meet internal obligations and expectations
      • Employee productivity and satisfaction
      • Maintain corporate policies or industry compliance
      • Meet security requirements

      Communication is key. Poor performance of a service provider needs to be dealt with in a timely manner in order to avoid more critical impact of the poor performance. Actions taken with the provider can also vary depending again on the criticality, risk, and strategic importance of the provider’s service.

      Performance reviews should provide the actions required with the goal of:

      • Making the performance problems into opportunities
      • Working with the provider to create a PIP with aggressive timelines and ramifications if not attained
      • Non-renewal or termination consideration, if feasible including provider replacement options, risk, costs, etc.
      • SLA renegotiation or revisions
      • Warning notifications to the service provider with concise issues and ramifications

      To avoid the issues and challenges of dealing with chronic poor performance, consider a Persistent or Chronic Failure clause into the SLA contract language. These clauses can define chronic failure, scenarios, ramifications there of, and defined options for the client including increased credit values, non-monetary remedies, and termination options without liability.

      Info-Tech Insight

      It’s difficult to prevent chronic poor performance but you can certainly track it and deal with it in a way that reduces risk and cost to your organization.

      SLA Hall of Shame

      Crazy service provider SLA content collection

      • Excessive list of unreasonable exclusions
      • Subcontractors’ behavior could be excluded
      • Downtime credit, equal to downtime percent x the MRC
      • Controllable FM events (internal labor issues, health events)
      • Difficult downtime or credit calculations that don’t make sense
      • Credits are not valid if agreement is terminated early or not renewed
      • Customer is not current on their account, SLA or credits do not count/apply
      • Total downtime = to prorated credit value (down 3 hrs = 3/720hrs = 0.4% credit)
      • SLOs don’t apply if customer fails to report the issue or request a trouble ticket
      • Downtime during off hours (overnight) do not count towards availability metrics
      • Different availability commitments based on different support-levels packages
      • Extending the agreement term by the length of downtime as a form of a remedy

      SLA Dos and Don’ts

      Dos

      • Do negotiate SLOs to vendor’s average performance
      • Do strive for automated reporting and credit processes
      • Do right-size and create your SLO criteria based on risk mitigation
      • Do review SLA attainment results with strategic service providers on a regular basis
      • Do ensure that all key elements and components of an SLA are present in the document or appendix

      Don'ts

      • Don’t accept the providers response that “we can’t change the SLOs for you because then we’d have to change them for everyone”
      • Don’t leave SLA preparation to the last minute. Give it priority as you negotiate with the provider
      • Don’t create complex SLAs with numerous service levels and SLOs that need to be reported and managed
      • Don’t aim for absolute perfection. Rather, prioritize which service levels are most important to you for the service

      Summary of Accomplishment

      Problem Solved

      Knowledge Gained

      • Understanding of the elements and components of an SLA
      • A list of SLO metrics aligned to service types that meet your organization’s criteria
      • SLA metric/KPI templates
      • SLA Management process for your provider’s service objectives
      • Reporting and tracking process for performance trending

      Deliverables Completed

      • SLA component and contract element checklist
      • Evaluation or service provider SLAs
      • SLA templates for strategic service types
      • SLA tracker for strategic service providers

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Related Info-Tech Research

      Improve IT-Business Alignment Through an Internal SLA

      • Understand business requirements, clarify current capabilities, and enable strategies to close service-level gaps.

      Data center Co-location SLA & Service Definition Template

      • In essence, the SLA defines the “product” that is being purchased, permitting the provider to rationalize resources to best meet the needs of varied clients, and permits the buyer to ensure that business requirements are being met.

      Ensure Cloud Security in IaaS, PaaS, and SaaS Environments

      • Keep your information security risks manageable when leveraging the benefits of cloud computing.

      Bibliography

      Henderson, George. “3 Most Common Types of Service Level Agreement (SLA).” Master of Project Academy. N.d. Web.

      “Guide to Security Operations Metrics.” Logsign. Oct 5, 2020. Web.

      Lemos, Rob. “4 lessons from SOC metrics: What your SpecOps team needs to know.” TechBeacon. N.d. Web.

      “Measuring and Making the Most of Service Desk Metrics.” Freshworks. N.d. Web.

      Overby, Stephanie. “15 SLA Mistakes IT Leaders Still Make.” CIO. Jan 21, 2021.

      Optimize Software Pricing in a Volatile Competitive Market

      • Buy Link or Shortcode: {j2store}566|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions

      Your challenge:

      • Rising supplier costs and inflation are eroding margins and impacting customers' budgets.
      • There is pressure from management to make a gut-feeling decision because of time, lack of skills, and process limitations.
      • You must navigate competing pricing-related priorities among product, sales, and finance teams.
      • Product price increases fail because discovery lacks understanding of costs, price/value equation, and competitive price points.
      • Customers can react negatively, and results are seen much later (more than 12 months) after the price decision.

      Our Advice

      Critical Insight

      Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and make ongoing adjustments based on an ability to monitor buyer, competitor, and product cost changes.

      Impact and Result

      • Success for many SaaS product managers requires a reorganization and modernization of pricing tools, techniques, and assumptions. Leaders will develop the science of tailored price changes versus across-the-board price actions and account for inflation exposure and the customers’ willingness to pay.
      • This will build skills on how to price new products or adjust pricing for existing products. The disciplines using our pricing strategy methodology will strengthen efforts to develop repeatable pricing models and processes and build credibility with senior management.

      Optimize Software Pricing in a Volatile Competitive Market Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Optimize Software Pricing in a Volatile Competitive Market Executive Brief - A deck to build your skills on how to price new products or adjust pricing for existing products.

      This Executive Brief will build your skills on how to price new products or adjust pricing for existing products.

      • Optimize Software Pricing in a Volatile Competitive Market Executive Brief

      2. Optimize Software Pricing in a Volatile Competitive Market Storyboard – A deck that provides key steps to complete the project.

      This blueprint will build your skills on how to price new products or adjust pricing for existing products with documented key steps to complete the pricing project and use the Excel workbook and customer presentation.

      • Optimize Software Pricing in a Volatile Competitive Market – Phases 1-3

      3. Optimize Software Pricing in a Volatile Competitive Market Workbook – A tool that enables product managers to simplify the organization and collection of customer and competitor information for pricing decisions.

      These five organizational workbooks for product pricing priorities, interview tracking, sample questions, and critical competitive information will enable the price team to validate price change data through researching the three pricing schemes (competitor, customer, and cost-based).

      • Optimize Software Pricing in a Volatile Competitive Market Workbook

      4. Optimize Software Pricing in a Volatile Competitive Market Presentation Template – A template that serves as a guide to communicating the Optimize Pricing Strategy team's results for a product or product line.

      This template includes the business case to justify product repricing, contract modifications, and packaging rebuild or removal for launch. This template calls for the critical summarized results from the Optimize Software Pricing in a Volatile Competitive Market blueprint and the Optimize Software Pricing in a Volatile Competitive Market Workbook to complete.

      • Optimize Software Pricing in a Volatile Competitive Market Presentation Template

      Infographic

      Further reading

      SoftwareReviews — A Division of INFO~TECH RESEARCH GROUP

      Optimize Software Pricing in a Volatile Competitive Market

      Leading SaaS product managers align pricing strategy to company financial goals and refresh the customer price/value equation to avoid leaving revenues uncaptured.

      Table of Contents

      Section Title Section Title
      1 Executive Brief 2 Key Steps
      3 Concluding Slides

      Optimize Software Pricing in a Volatile Competitive Market

      Leading SaaS product managers align pricing strategy to company financial goals and refresh the customer price/value equation to avoid leaving revenues uncaptured.

      EXECUTIVE BRIEF

      Analyst Perspective

      Optimized Pricing Strategy

      Product managers without well-documented and repeatable pricing management processes often experience pressure from “Agile” management to make gut-feel pricing decisions, resulting in poor product revenue results. When combined with a lack of customer, competitor, and internal cost understanding, these process and timing limitations drive most product managers into suboptimal software pricing decisions. And, adding insult to injury, the poor financial results from bad pricing decisions aren’t fully measured for months, which further compounds the negative effects of poor decision making.

      A successful product pricing strategy aligns finance, marketing, product management, and sales to optimize pricing using a solid understanding of the customer perception of price/value, competitive pricing, and software production costs.

      Success for many SaaS product managers requires a reorganization and modernization of pricing tools, techniques, and data. Leaders will develop the science of tailored price changes versus across-the-board price actions and account for inflation exposure and the customers’ willingness to pay.

      This blueprint will build your skills on how to price new products or adjust pricing for existing products. The discipline you build using our pricing strategy methodology will strengthen your team’s ability to develop repeatable pricing and will build credibility with senior management and colleagues in marketing and sales.

      Photo of Joanne Morin Correia, Principal Research Director, SoftwareReviews.

      Joanne Morin Correia
      Principal Research Director
      SoftwareReviews

      Executive Summary

      Organizations struggle to build repeatable pricing processes:
      • A lack of alignment and collaboration among finance, marketing, product development, and sales.
      • A lack of understanding of customers, competitors, and market pricing.
      • Inability to stay ahead of complex and shifting software pricing models.
      • Time is wasted without a deep understanding of pricing issues and opportunities, and revenue opportunities go unrealized.
      Obstacles add friction to the pricing management process:
      • Pressure from management to make quick decisions results in a gut-driven approach to pricing.
      • A lack of pricing skills and management processes limits sound decision making.
      • Price changes fail because discovery often lacks competitive intelligence and buyer value to price point understanding. Customers’ reactions are often observed much later, after the decision is made.
      • Economic disruptions, supplier price hikes, and higher employee salaries/benefits are driving costs higher.
      Use SoftwareReviews’ approach for more successful pricing:
      • Organize for a more effective pricing project including roles & responsibilities as well as an aligned pricing approach.
      • Work with CFO/finance partner to establish target price based on margins and key factors affecting costs.
      • Perform a competitive price assessment and understand the buyer price/value equation.
      • Arrive at a target price based on the above and seek buy-in and approvals.

      SoftwareReviews Insight

      Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and they will make ongoing adjustments based on an ability to monitor buyers, competitors, and product cost changes.

      What is an optimized price strategy?

      “Customer discovery interviews help reduce the chance of failure by testing your hypotheses. Quality customer interviews go beyond answering product development and pricing questions.” (Pricing Strategies, Growth Ramp, March 2022)

      Most product managers just research their direct competitors when launching a new SaaS product. While this is essential, competitive pricing intel is insufficient to create a long-term optimized pricing strategy. Leaders will also understand buyer TCO.

      Your customers are constantly comparing prices and weighing the total cost of ownership as they consider your competition. Why?

      Implementing a SaaS solution creates a significant time burden as buyers spend days learning new software, making sure tools communicate with each other, configuring settings, contacting support, etc. It is not just the cost of the product or service.

      Optimized Price Strategy Is…
      • An integral part of any product plan and business strategy.
      • Essential to improving and maintaining high levels of margins and customer satisfaction.
      • Focused on delivering the product price to your customer’s business value.
      • Understanding customer price-value for your software segment.
      • Monitoring your product pricing with real-time data to ensure support for competitive strategy.
      Price Strategy Is Not…
      • Increasing or decreasing price on a gut feeling.
      • Changing price for short-term gain.
      • Being wary of asking customers pricing-related questions.
      • Haphazardly focusing entirely on profit.
      • Just covering product costs.
      • Only researching direct competitors.
      • Focusing on yourself or company satisfaction but your target customers.
      • Picking the first strategy you see.

      SoftwareReviews Insight

      An optimized pricing strategy establishes the “best” price for a product or service that maximizes profits and shareholder value while considering customer business value vs. the cost to purchase and implement – the total cost of ownership (TCO).

      Challenging environment

      Product managers are currently experiencing the following:
      • Supplier costs and inflation are rising, eroding product margins and impacting customers’ budgets.
      • Pressure from management to make a gut-feeling decision because of time, lack of skills, and process limitations.
      • Navigating competing pricing-related priorities among product, sales, and finance.
      • Product price increases that fail because discovery lacks understanding of costs, price/value equation, and competitive price points.
      • Slowing customer demand due to poorly priced offerings may not be fully measured for many months following the price decision.
      Doing nothing is NOT an option!
      Offense Double Down

      Benefit: Leverage long-term financial and market assets

      Risk: Market may not value those assets in the future
      Fight Back

      Benefit: Move quickly

      Risk: Hard to execute and easy to get pricing wrong
      Defense Retrench

      Benefit: Reduce threats from new entrants through scale and marketing

      Risk: Causes managed decline and is hard to sell to leadership
      Move Away

      Benefit: Seize opportunities for new revenue sources

      Risk: Diversification is challenging to pull off
      Existing Markets and Customers New Markets and Customers

      Pricing skills are declining

      Among product managers, limited pricing skills are big obstacles that make pricing difficult and under-optimized.

      Visual of a bar chart with descending values, each bar has written on it: 'Limited - Limits in understanding of engineering, marketing, and sales expectations or few processes for pricing and/or cost', 'Inexperienced - Inexperience in pricing project skills and corporate training', 'Lagging - Financial lag indicators (marketing ROI, revenue, profitability, COGs)', 'Lacking - Lack of relevant competitive pricing/packaging information', 'Shifting - Shift to cloud subscription-based revenue models is challenging'.

      The top three weakest product management skills have remained constant over the past five years:
      • Competitive analysis
      • Pricing
      • End of life
      Pricing is the weakest skill and has been declining the most among surveyed product professionals every year. (Adapted from 280 Group, 2022)

      Key considerations for more effective pricing decisions

      Pricing teams can improve software product profitability by:
      • Optimizing software profit with four critical elements: properly pricing your product, giving complete and accurate quotations, choosing the terms of the sale, and selecting the payment method.
      • Implementing tailored price changes (versus across-the-board price actions) to help account for inflation exposure, customer willingness to pay, and product attribute changes.
      • Accelerating ongoing pricing decision-making with a dedicated cross-functional team ready to act quickly.
      • Resetting discounting and promotion, and revisiting service-level agreements.
      Software pricing leaders will regularly assess:

      Has it been over a year since prices were updated?

      Have customers told you to raise your prices?

      Do you have the right mix of customers in each pricing plan?

      Do 40% of your customers say they would be very disappointed if your product disappeared? (Adapted from Growth Ramp, 2021)

      Case Study

      Middleware Vendor

      INDUSTRY
      Technology Middleware
      SOURCE
      SoftwareReviews Custom Pricing Strategy Project
      A large middleware vendor, who is running on Microsoft Azure, known for quality development and website tools, needed to react strategically to the March 2022 Microsoft price increase.

      Key Initiative: Optimize New Pricing Strategy

      The program’s core objective was to determine if the vendor should implement a price increase and how the product should be packaged within the new pricing model.

      For this initiative, the company interviewed buyers using three key questions: What are the core capabilities to focus on building/selling? What are the optimal features and capabilities valued by customers that should be sold together? And should they be charging more for their products?

      Results
      This middleware vendor saw buyer support for a 10% price increase to their product line and restructuring of vertical contract terms. This enabled them to retain customers over multi-year subscription contracts, and the price increase enabled them to protect margins after the Microsoft price increase.

      The Optimize New Pricing Strategy included the following components:

      Components: 'Product Feature Importance & Satisfaction', 'Correlation of Features and Value Drivers', 'Fair Cost to Value Average for Category', 'Average Discounting for Category', 'Customer Value Is an Acceptable Multiple of Price'. First four: 'Component fails into the scope of optimizing price strategy to value'; last one: 'They are optimizing their price strategy decisions'.

      New product price approach

      As a collaborative team across product management, marketing, and finance, we see leaders taking a simple yet well-researched approach when setting product pricing.

      Iterating to a final price point is best done with research into how product pricing:

      • Delivers target margins.
      • Is positioned vs. key competitors.
      • Delivers customer value at a fair price/value ratio.
      To arrive at our new product price, we suggest iterating among 3 different views:

      New Target Price:

      • Buyer Price vs. Value
      • Cost - Plus
      • Vs. Key Competitors
      We analyzed:
      • Customer price/value equation interviews
      • Impacts of Supplier cost increases
      • Competitive pricing research
      • How product pricing delivers target margins

      Who should care about optimized pricing?

      Product managers and marketers who:

      • Support the mandate for optimizing pricing and revenue generation.
      • Need a more scientific way to plan and implement new pricing processes and methods to optimize revenues and profits.
      • Want a way to better apply customer and competitive insights to product pricing.
      • Are evaluating current pricing and cost control to support a refreshed pricing strategy.

      Finance, sales, and marketing professionals who are pricing stakeholders in:

      • Finding alternatives to current pricing and packaging approaches.
      • Looking for ways to optimize price within the shifting market momentum.

      How will they benefit from this research?

      • Refine the ability to effectively target pricing to specific market demands and customer segments.
      • Strengthen product team’s reputation for reliable and repeatable price-management capabilities among senior leadership.
      • Recognize and plan for new revenue opportunities or cost increases.
      • Allow for faster, more accurate intake of customer and competitive data. 
      • Improve pricing skills for professional development and business outcomes.
      • Create new product price, packaging, or market opportunities. 
      • Reduce financial costs and mistakes associated with manual efforts and uneducated guessing.
      • Price software products that better achieve financial goals optimizing revenue, margins, or market share.
      • Enhance the product development and sales processes with real competitive and customer expectations.

      Is Your Pricing Strategy Optimized?

      With the right pricing strategy, you can invest more money into your product, service, or growth. A 1% price increase will improv revenues by:

      Three bars: 'Customer acquisition, 3.32%', 'Customer retention, 6.71%', 'Price monetization, 12.7%'.

      Price monetization will almost double the revenue increases over customer acquisition and retention. (Pricing Strategies, Growth Ramp, March 2022)

      DIAGNOSE PRICE CHALLENGES

      Prices of today's cloud-based services/products are often misaligned against competition and customers' perceived value, leaving more revenues on the table.
      • Do you struggle to price new products with confidence?
      • Do you really know your SaaS product's costs?
      • Have you lost pricing power to stronger competitors?
      • Has cost focus eclipsed customer value focus?
      If so, you are likely skipping steps and missing key outputs in your pricing strategy.

      OPTIMIZE THESE STEPS

      ALIGNMENT
      1. Assign Team Responsibilities
      2. Set Timing for Project Deliverables
      3. Clarify Financial Expectations
      4. Collect Customer Contacts
      5. Determine Competitors
      6. BEFORE RESEARCH, HAVE YOU
        Documented your executive's financial expectations? If "No," return.

      RESEARCH & VALIDATE
      1. Research Competitors
      2. Interview Customers
      3. Test Pricing vs. Financials
      4. Create Pricing Presentation
      5. BEFORE PRESENTING, HAVE YOU:
        Clarified your customer and competitive positioning to validate pricing? If "No," return.

      BUY-IN
      1. Executive Pricing Presentation
      2. Post-Mortem of Presentation
      3. Document New Processes
      4. Monitor the Pricing Changes
      5. BEFORE RESEARCH, HAVE YOU:
        Documented your executive's financial expectations? If "No," return.

      DELIVER KEY OUTPUTS

      Sponsoring executive(s) signs-offs require a well-articulated pricing plan and business case for investment that includes:
      • Competitive features and pricing financial templates
      • Customer validation of price value
      • Optimized price presentation
      • Repeatable pricing processes to monitor changes

      REAP THE REWARDS

      • Product pricing is better aligned to achieve financial goals
      • Improved pricing skills or professional development
      • Stronger team reputation for reliable price management

      Key Insights

      1. Gain a competitive edge by using market and customer information to optimize product financials, refine pricing, and speed up decisions.
      2. Product leaders will best set software product price based on a deep understanding of buyer/price value equation, alignment with financial strategy, and an ongoing ability to monitor buyer, competitor, and product costs.

      SoftwareReviews’ methodology for optimizing your pricing strategy

      Steps

      1.1 Establish the Team and Responsibilities
      1.2 Educate/Align Team on Pricing Strategy
      1.2 Document Portfolio & Target Product(s) for Pricing Updates
      1.3 Clarify Product Target Margins
      1.4 Establish Customer Price/Value
      1.5 Identify Competitive Pricing
      1.6 Establish New Price and Gain Buy-In

      Outcomes

      1. Well-organized project
      2. Clarified product pricing strategy
      3. Customer value vs. price equation
      4. Competitive price points
      5. Approvals

      Insight summary

      Modernize your price planning

      Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and make ongoing adjustments based on an ability to monitor buyer, competitor, and product cost changes.

      Ground pricing against financials

      Meet and align with financial stakeholders.
      • Give finance a heads-up that you want to work with them.
      • Find out the CFO’s expectations for pricing and margins.
      • Ask for a dedicated finance team member.

      Align on pricing strategy

      Lead stakeholders in SaaS product pricing decisions to optimize pricing based on four drivers:
      • Customer’s price/value
      • Competitive strategy
      • Reflective of costs
      • Alignment with financial goals

      Decrease time for approval

      Drive price decisions, with the support of the CFO, to the business value of the suggested change:
      • Reference current product pricing guidelines
      • Compare to the competition and our strategy and weigh results against our customer’s price/value
      • Compare against the equation to business value for the suggested change
      Develop the skill of pricing products

      Increase product revenues and margins by enhancing modern processes and data monetization. Shift from intuitive to information-based pricing decisions.

      Look at other options for revenue

      Adjust product design, features, packaging, and contract terms while maintaining the functionality customers find valuable to their business.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
      Key deliverable:

      New Pricing Strategy Presentation Template

      Capture key findings for your price strategy with the Optimize Your Pricing in a Volatile Competitive Market Strategy Presentation Template

      Sample of the 'Acme Corp New Product Pricing' blueprint.

      Optimize Software Pricing in a Volatile Competitive Market Executive Brief

      This executive brief will build your knowledge on how to price new products or adjust pricing for existing products.

      Sample of the 'Optimize Software Pricing in a Volatile Competitive Market' blueprint.

      Optimize Software Pricing in a Volatile Competitive Market Workbook

      This workbook will help you prioritize which products require repricing, hold customer interviews, and capture competitive insights.

      Sample of the 'Optimize Software Pricing in a Volatile Competitive Market' workbook.

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with a SoftwareReviews analyst to help implement our best practices in your organization.

      A typical GI is 4 to 8 calls over the course of 2 to 4 months.

      What does a typical GI on optimizing software pricing look like?

      Alignment

      Research & Reprice

      Buy-in

      Call #1: Share the pricing team vision and outline activities for the pricing strategy process. Plan next call – 1 week.

      Call #2: Outline products that require a new pricing approach and steps with finance. Plan next call – 1 week.

      Call #3: Discuss the customer interview process. Plan next call – 1 week.

      Call #4 Outline competitive analysis. Plan next call – 1 week.

      Call #5: Review customer and competitive results for initial new pricing business case with finance for alignment. Plan next call – 3 weeks.

      Call #6: Review the initial business case against financial plans across marketing, sales, and product development. Plan next call – 1 week.

      Call #7 Review the draft executive pricing presentation. Plan next call – 1 week.

      Call #8: Discuss gaps in executive presentation. Plan next call – 3 days.

      SoftwareReviews Offers Various Levels of Support to Meet Your Needs

      Included in Advisory Membership Optional add-ons

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Desire a Guided Implementation?

      • A GI is where your SoftwareReviews engagement manager and executive advisor/counselor will work with SoftwareReviews research team members to craft with you a Custom Key Initiative Plan (CKIP).
      • A CKIP guides your team through each of the major steps, outlines responsibilities between members of your team and SoftwareReviews, describes expected outcomes, and captures actual value delivered.
      • A CKIP also provides you and your team with analyst/advisor/counselor feedback on project outputs, helps you communicate key principles and concepts to your team, and helps you stay on project timelines.
      • If Guided Implementation assistance is desired, contact your engagement manager.

      Workshop overview

      Contact your account representative for more information.
      workshops@infotech.com1-888-670-8889
      Day 1 Day 2 Day 3 Day 4 Day 5
      Align Team, Identify Customers, and Document Current Knowledge
      Validate Initial Insights and Identify Competitors and Market View
      Schedule and Hold Buyer Interviews
      Summarize Findings and Provide Actionable Guidance to Stakeholders
      Present, Go Forward, and Measure Impact and Results
      Activities

      1.1 Identify Team Members, roles, and responsibilities

      1.2 Establish timelines and project workflow

      1.3 Gather current product and future financial margin expectations

      1.4 Review the Optimize Software Executive Brief and Workbook Templates

      1.4 Build prioritized pricing candidates hypothesis

      2.1 Identify customer interviewee types by segment, region, etc.

      2.2 Hear from industry analysts their perspectives on the competitors, buyer expectations, and price trends

      2.3 Research competitors for pricing, contract type, and product attributes

      3.2 Review pricing and attributes survey and interview questionnaires

      3.2 Hold interviews and use interview guides (over four weeks)

      A gap of up to 4 weeks for scheduling of interviews.

      3.3 Hold review session after initial 3-4 interviews to make adjustments

      4.1 Review all draft price findings against the market view

      4.2 Review Draft Executive Presentation

      5.1 Review finalized pricing strategy plan with analyst for market view

      5.2 Review for comments on the final implementation plan

      Deliverables
      1. Documented steering committee and working team
      2. Current and initial new pricing targets for strategy
      3. Documented team knowledge
      1. Understanding of market and potential target interviewee types
      2. Objective competitive research
      1. Initial review – “Are we going in the right direction with surveys?”
      2. Validate or adjust the pricing surveys to what you hear in the market
      1. Complete findings and compare to the market
      2. Review and finish drafting the Optimize Software Pricing Strategy presentation
      1. Final impute on strategy
      2. Review of suggested next steps and implementation plan

      Our process

      Align team, perform research, and gain executive buy-in on updated price points

      1. Establish the team and responsibilities
      2. Educate/align team on pricing strategy
      3. Document portfolio & target product(s) for pricing updates
      4. Clarify product target margins
      5. Establish customer price/value
      6. Identify competitive pricing
      7. Establish new price and gain buy-in

      Optimize Software Pricing in a Volatile Competitive Market

      Our process will help you deliver the following outcomes:

      • Well-organized project
      • Clarified product pricing strategy
      • Customer value vs. price equation
      • Competitive price points
      • Approvals

      This project involves the following participants:

      • Product management
      • Program leadership
      • Product marketing
      • CFO or finance representative/partner
      • Others
      • Representative(s) from Sales

      1.0 Assign team responsibilities

      Input: Steering committee roles and responsibilities, Steering committee interest and role

      Output: List of new pricing strategy steering committee and workstream members, roles, and timelines, Updated Software Pricing Strategy presentation

      Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template

      Participants: CFO, sponsoring executive, Functional leads – development, product marketing, product management, marketing, sales, customer success/support

      1-2 hours
      1. The product manager/member running this pricing/repricing program should review the entire Optimize Software Pricing in a Volatile Competitive Market blueprint and each blueprint attachment.
      2. The product manager should also refer to slide 19 of the Optimize Software Pricing in a Volatile Competitive Market blueprint and decide if help via a Guided Implementation (GI) is of value. If desired, alert your SoftwareReviews engagement manager.
      1-2 hours
      1. The product manager should meet with the chief product officer/CPO and functional leaders, and set the meeting agenda to:
        1. Nominate steering committee members.
        2. Nominate work-stream leads.
        3. Establish key pricing project milestones.
        4. Schedule both the steering committee (suggest monthly) and workstream lead meetings (suggest weekly) through the duration of the project.
        5. Ask the CPO to craft, outside this meeting, his/her version of the "Message from the chief product officer.”
        6. If a Guided Implementation is selected, inform the meeting attendees that a SoftwareReviews analyst will join the next meeting to share his/her Executive Brief on Pricing Strategy.
      2. Record all above findings in the Optimize Software Pricing in a Volatile Competitive Market Presentation Template.

      Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

      SoftwareReviews Advisory Insight:

      Pricing steering committees are needed to steer overall product, pricing, and packaging decisions. Some companies include the CEO and CFO on this committee and designate it as a permanent body that meets monthly to give go/no-go decisions to “all things product and pricing related” across all products and business units.

      2.0 Educate the team

      1 hour

      Input: Typically, a joint recognition that pricing strategies need upgrading and have not been fully documented, Steering committee and working team members

      Output: Communication of team members involved and the makeup of the steering committee and working team, Alignment of team members on a shared vision of “why a new price strategy is critical” and what key attributes define both the need and impact on business

      Materials: Optimize Your Software Strategy Executive Brief PowerPoint presentation

      Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales, SoftwareReviews marketing analyst (optional)

      1. Walk the team through the Optimize Software Pricing in a Volatile Competitive Market Executive Brief PowerPoint presentation.
      2. Optional – Have the SoftwareReviews Advisory (SRA) analyst walk the team through the Optimize Software Pricing in a Volatile Competitive Market Executive Brief PowerPoint presentation as part of your session. Contact your engagement manager to schedule.
      3. Walk the team through the current version of the Optimize Software Pricing in a Volatile Competitive Market Presentation Template outlining project goals, steering committee and workstream make-up and responsibilities, project timeline and key milestones, and approach to arriving at new product pricing.
      4. Set expectations among team members of their specific roles and responsibilities for this project, review the frequency of steering committee and workstream meetings to set expectations of key milestones and deliverable due dates.

      Download the Optimize Software Pricing in a Volatile Competitive Market Executive Brief

      3.0 Document portfolio and target products for pricing update

      1-3 Hours

      Input: List of entire product portfolio

      Output: Prioritized list of product candidates that should be repriced

      Materials: Optimize Software Pricing in a Volatile Competitive Market Executive Brief presentation, Optimize Software Pricing in a Volatile Competitive Market Workbook

      Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales

      1. Walk the team through the current version of Optimize Software Pricing in a Volatile Competitive Market workbook, tab 2: “Product Portfolio Organizer.” Modify sample attributes to match your product line where necessary.
      2. As a group, record the product attributes for your entire portfolio.
      3. Prioritize the product price optimization candidates for repricing with the understanding that it might change after meeting with finance.

      Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

      4.0 Clarify product target margins

      2-3 sessions of 1 Hour each

      Input: Finance partner/CFO knowledge of target product current and future margins, Finance partner/CFO who has information on underlying costs with details that illustrate supplier contributions

      Output: Product finance markup target percentage margins and revenues

      Materials: Finance data on the product family, Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

      Participants: Initiative manager, Finance partner/CFO

      1. Schedule a meeting with your finance partner/CFO to validate expectations for product margins. The goal is to understand the detail of underlying costs/margins and if the impacts of supplier costs affect the product family. The information will be placed into the Optimize Software Pricing in a Volatile Competitive Market Workbook on tab 2, Product Portfolio Organizer under the “Unit Margins” heading.
      2. Arrive at a final “Cost-Plus New Price” based on underlying costs and target margins for each of the products. Record results in the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 2, under the “Cost-Plus New Price” heading.
      3. Record product target finance markup price under “Cost-Plus” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9, and details in Appendix, “Cost-Plus Analysis,” slide 11.
      4. Repeat this process for any other products to be repriced.

      Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

      Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

      5.0 Establish customer price to value

      1-4 weeks

      Input: Identify segments within which you require price-to-value information, Understand your persona insight gaps, Review Sample Interview Guide using the Optimize Software Pricing in a Volatile, Competitive Market Workbook, Tab 4. Interview Guide.

      Output: List of interviewees, Updated Interview Guide

      Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

      Participants: Initiative manager, Customer success to help identify interviewees, Customers, prospects

      1. Identify a list of customers and prospects that best represent your target persona when interviewed. Choose interviewees who will inform key differences among key segments (geographies, company size, a mix of customers and prospects, etc.) and who are decision makers and can best inform insights on price/value and competitors.
      2. Recruit interviewees and schedule 30-minute interviews.
      3. Keep track of interviewees using the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 3: “Interviewee Tracking.”
      4. Review the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 4: “Interview Guide,” and modify/update it where appropriate.
      5. Record interviewee perspectives on the “price they are willing to pay for the value received” (price/value equation) using the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 4: “Interview Guide.”
      6. Summarize findings to result in an average “customer’s value price.” Record product target ”customer’s value price” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9 and supporting details in Appendix, “Customer Pricing Analysis,” slide 12.

      Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

      Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

      6.0 Identify competitive pricing

      1-2 weeks

      Input: Identify price candidate competitors, Your product pricing, contract type, and product attribute information to compare against, Knowledge of existing competitor information, websites, and technology research sites to guide questions

      Output: Competitive product average pricing

      Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

      Participants: Initiative manager, Customers, prospects

      1. Identify the top 3-5 competitors’ products that you most frequently compete against with your selected product.
      2. Perform competitive intelligence research on deals won or lost that contain competitive pricing insights by speaking with your sales force.
      3. Use the interviews with key customers to also inform competitive pricing insights. Include companies which you may have lost to a competitor in your customer interviewee list.
      4. Modify and add key competitive pricing, contract, or product attributes in the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 5: “Competitive Information.”
      5. Place your product’s information into the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 5: “Competitive Information.”
      6. Research your competitors’ summarized pricing and product attribute insights into the workbook.
      7. Record research in the Summarize research on competitors to arrive at an average “Competitors Avg. Price”. Record in ”Customer’s Value Price” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9, and details in Appendix, “Competitor Pricing Analysis,” slide 13.

      Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

      Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

      7.0 Establish new price and gain buy-in

      2-3 hours

      Input: Findings from competitive, cost-plus, and customer price/value analysis

      Output: Approvals for price change

      Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template

      Participants: Initiative manager, Steering committee, Working team – typically representatives in product marketing, product management, sales

      1. Using prior recorded findings of Customer’s Value Price, Competitors’ Avg. Price, and Finance Markup Price, arrive at a recommended “New Price” and record in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9 and the Appendix for Project Analysis Details.
      2. Present findings to steering committee. Be prepared to show customer interviews and competitive analysis results to support your recommendation.
      3. Plan internal and external communications and discuss the timing of when to “go live” with new pricing. Discuss issues related to migration to a new price, how to handle currently low-priced customers, and how to migrate them over time to the new pricing.
      4. Identify if it makes sense to target a date to launch the new pricing in the future, so customers can be alerted in advance and therefore take advantage of “current pricing” to drive added revenues.
      5. Confer with IT to assess times required to implement within CPQ systems and with product marketing for time to change sales proposals, slide decks, and any other affected assets and systems.

      Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

      Summary of Accomplishment

      Problem Solved

      With the help of this blueprint, you have deepened your and your company’s understanding of how to look at new pricing opportunities and what the market and the buyer will pay for your product. You are among the minority of product and marketing leaders that have thoroughly documented their new pricing strategy and processes – congratulations!

      The benefits of having led your team through the process are significant and include the following:

      • Allow for faster, more accurate intake of customer and competitive data 
      • Refine the ability to effectively target pricing to specific market demands and customer segments 
      • Understand the association between the value proposition of products and services
      • Reduce financial costs and mistakes associated with manual efforts & uneducated guessing
      • Recognize and plan for new revenue opportunities or cost increases
      • Create new market or product packaging opportunities
      And finally, by bringing your team along with you in this process, you have also led your team to become more customer-focused while pricing your products – a strategic shift that all organizations should pursue.

      If you would like additional support, contact us and we’ll make sure you get the professional expertise you need.

      Contact your account representative for more information.

      info@softwarereviews.com
      1-888-670-8889

      Bibliography

      “Chapter 4 Reasons for Project Failure.” Kissflow's Guide to Project Management. Kissflow, n.d. Web.

      Edie, Naomi. “Microsoft Is Raising SaaS Prices, and Other Vendors Will, Too.” CIO Dive, 8 December 2021. Web.

      Gruman, Galen, Alan S. Morrison, and Terril A. Retter. “Software Pricing Trends.” PricewaterhouseCoopers, 2018. Web.

      Hargrave, Marshall. “Example of Economic Exposure.” Investopedia, 12 April 2022. Web.

      Heaslip, Emily. “7 Smart Pricing Strategies to Attract Customers.” CO—, 17 November 2021. Web.

      Higgins, Sean. “How to Price a Product That Your Sales Team Can Sell.” HubSpot, 4 April 2022. Web.

      “Pricing Strategies.” Growth Ramp, March 2022. Web.

      “Product Management Skills Benchmark Report 2021.” 280 Group, 9 November 2021. Web.

      Quey, Jason. “Price Increase: How to Do a SaaS Pricing Change in 8 Steps.” Growth Ramp, 22 March 2021. Web.

      Steenburg, Thomas, and Jill Avery. “Marketing Analysis Toolkit: Pricing and Profitability Analysis.” Harvard Business School, 16 July 2010. Web.

      “2021 State of Competitive Intelligence.” Crayon and SCIO, n.d. Web.

      Valchev, Konstantin. “Cost of Goods Sold (COGS) for Software-as-a-Service (SaaS) Business.” OpenView Venture Partners, OV Blog, 20 April 2020. Web.

      “What Is Price Elasticity?” Market Business News, n.d. Web.

      Improve Your Statements of Work to Hold Your Vendors Accountable

      • Buy Link or Shortcode: {j2store}233|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $10,638 Average $ Saved
      • member rating average days saved: 16 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • SOW reviews are tedious, and reviewers may lack the skills and experience to effectively complete the process.
      • Vendors draft provisions that shift the performance risk to the customer in subtle ways that are often overlooked or not identified by customers.
      • Customers don’t understand the power and implications of SOWs, treating them as an afterthought or formality.

      Our Advice

      Critical Insight

      • There is often a disconnect between what is sold and what is purchased. To gain the customer’s approval, vendors will present a solution- or outcome-based proposal. However, the SOW is task or activity based, shifting the risk for success to the customer.
      • A good SOW takes time and should not be rushed. The quality of the requirements and of the SOW wording drive success. Not allocating enough time to address both increases the risk of the project’s failure.

      Impact and Result

      • Info-Tech’s guidance and insights will help you navigate the complex process of SOW review and identify the key details necessary to maximize the protections for your organization and hold vendors accountable.
      • This blueprint provides direction on spotting vendor-biased terms and conditions and offers tips for mitigating the risk associated with words and phrases that shift responsibilities and obligations from the vendor to the customer.

      Improve Your Statements of Work to Hold Your Vendors Accountable Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should spend more time assessing your statements of work, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess SOW Terms and Conditions

      Use Info-Tech’s SOW review guidance to find common pitfalls and gotchas, to maximize the protections for your organization, and to hold vendors accountable.

      • Improve Your Statements of Work to Hold Your Vendors Accountable – Storyboard
      • Contract or SOW Guide
      • SOW Maps Tool
      • Red-Flag Words and Phrases Tool
      [infographic]

      Workshop: Improve Your Statements of Work to Hold Your Vendors Accountable

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess SOW Terms and Conditions

      The Purpose

      Gain a better understanding of common SOW clauses and phrases.

      Key Benefits Achieved

      Reduce risk

      Increase vendor accountability

      Improve negotiation positions

      Activities

      1.1 Review sample SOW provisions, identify the risks, and develop a negotiation position.

      1.2 Review Info-Tech tools.

      Outputs

      Awareness and increased knowledge

      Familiarity with the Info-Tech tools

      The Importance of Clear Communication During an IT Incident

      IT incidents—such as outages, software bugs, or security alerts—are a routine part of managing business technology. The effectiveness of incident management depends not only on technical resolution but also on how clearly the situation is communicated across the organization.

      Distinguishing Technical Issues from Business Impact

      It’s important that communication during an IT incident separates technical details from business impact.

      Technical communications focus on the nature of the incident, technical root cause, and steps to resolution.
      Business communications address what the incident means for users, customers, and ongoing operations.
      Tactical vs. Strategic Impact
      A key aspect of effective communication is differentiating between tactical and strategic impact:

      Tactical Impact

      This refers to the immediate, short-term effects of the incident. For example, a payment processing outage might delay customer transactions or require manual workarounds. Tactical impact is about “what’s happening right now,” how it disrupts daily operations, and what steps are being taken to restore service.

      Strategic Impact

      This concerns whether the incident has any meaningful effect on the organization’s long-term goals, strategic initiatives, or overall direction. In most cases, IT incidents do not affect strategic objectives. Communication should make it clear to leadership and stakeholders if an incident is limited to tactical impact, helping to avoid unnecessary escalation or concern.

      Tailoring Communication to Audience Levels

      1. Technical Teams
      “The payment gateway service is returning intermittent 503 errors due to a backend database lock. We are currently restarting the affected services and monitoring log files for additional errors. No data loss has been detected, and all failed transactions are being queued for reprocessing.”

      2. Business Operations
      “We are experiencing a temporary issue with our payment processing system. Some transactions may be delayed. Our IT team is actively working on a resolution, and we expect normal operations to resume within the hour. In the meantime, please inform customers of the delay and assure them that no payments have been lost.”

      3. Executive Leadership
      “There is a temporary disruption in our payment processing system that is affecting transaction completion for some customers. The issue is strictly tactical and does not have any impact on our strategic initiatives or financial targets. The technical team is addressing the problem, and we anticipate full resolution shortly. No long-term risk or reputational impact is expected.”

      Best Practices

      Segment communications by audience and need.
      Be explicit about whether an incident has any strategic impact—most do not.
      Use plain language for non-technical stakeholders, focusing on what matters to them.
      Provide timely updates and clarify as the situation evolves.

      Clear communication during IT incidents means more than just relaying facts—it means ensuring that all audiences understand the scope of the impact, especially the difference between tactical disruptions and strategic threats. Consistently making this distinction helps manage expectations, reduces unnecessary concern, and supports more effective incident management.

       

       

       

      Enterprise Architecture Trends

      • Buy Link or Shortcode: {j2store}584|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy & Operating Model
      • Parent Category Link: /strategy-and-operating-model
      • The digital transformation journey brings business and technology increasingly closer.
      • Because the two become more and more intertwined, the role of the enterprise architecture increases in importance, aligning the two in providing additional efficiencies.
      • The current need for an accelerated digital transformation elevates the importance of enterprise architecture.

      Our Advice

      Critical Insight

      • Enterprise architecture is impacted and has an increasing role in the following areas:
        • Business agility
        • Security
        • Innovation
        • Collaborative EA
        • Tools and automation

      Impact and Result

      EA’s role in brokering and negotiating overlapping areas can lead to the creation of additional efficiencies at the enterprise level.

      Enterprise Architecture Trends Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Enterprise Architecture Trends Deck – A trend report to support executives as they digitally transform the enterprise.

      In an accelerated path to digitization, the increasingly important role of enterprise architecture is one of collaboration across siloes, inside and outside the enterprise, in a configurable way that allows for quick adjustment to new threats and conditions, while embracing unprecedented opportunities to scale, stimulating innovation, in order to increase the organization’s competitive advantage.

      • Enterprise Architecture Trends Report

      Infographic

      Further reading

      Enterprise Architecture Trends

      Supporting Executives to Digitally Transform the Enterprise

      Analyst Perspective

      Enterprise architecture, seen as the glue of the organization, aligns business goals with all the other aspects of the organization, providing additional effectiveness and efficiencies while also providing guardrails for safety.

      In an accelerated path to digitization, the increasingly important role of enterprise architecture (EA) is one of collaboration across siloes, inside and outside the enterprise, in a configurable way that allows for quick adjustment to new threats and conditions while embracing unprecedented opportunities to scale, stimulating innovation to increase the organization’s competitive advantage.

      Photo of Milena Litoiu, Principal/Senior Director, Enterprise Architecture, Info-Tech Research Group.

      Milena Litoiu
      Principal/Senior Director, Enterprise Architecture
      Info-Tech Research Group

      Accelerated digital transformation elevates the importance of EA

      The Digital transformation journey brings Business and technology increasingly closer.

      Because the two become more and more intertwined, the role OF Enterprise Architecture increases in importance, aligning the two in providing additional efficiencies.

      THE Current need for an accelerated Digital transformation elevates the importance of Enterprise Architecture.

      More than 70% of organizations revamp their enterprise architecture programs. (Info-Tech Tech Trends 2022 Survey)

      Most organizations still see a significant gap between the business and IT.

      Enterprise Architecture (EA) is impacted and has an increasing role in the following areas

      Accelerated Digital Transformation

      • Business agility Business agility, needed more that ever, increases reliance on enterprise strategies.
        EA creates alignment between business and IT to improve business nimbleness.
      • Security More sophisticated attacks require more EA coordination.
        EA helps adjust to the increasing sophistication of external threats. Partnering with the CISO office to develop strategies to protect the enterprise becomes a prerequisite for survival.
      • Innovation EA's role in an innovation increases synergies at the enterprise level.
        EA plays an increasingly stronger role in innovation, from business endeavors to technology, across business units, etc.
      • Collaborative EA Collaborative EA requires new ways of working.
        Enterprise collaboration gains new meaning, replacing stiff governance.
      • Tools & automation Tools-based automation becomes increasingly common.
        Tools support as well as new artificial intelligence or machine- learning- powered approaches help achieve tools-assisted coordination across viewpoints and teams.

      Info-Tech Insight

      EA's role in brokering and negotiating overlapping areas can lead to the creation of additional efficiencies at the enterprise level.

      EA Enabling Business Agility

      Trend 01 — Business Agility is needed more than ever and THIS increases reliance on enterprise Strategies. to achieve nimbleness, organizations need to adapt timely to changes in the environment.

      Approaches:
      A plethora of approaches are needed (e.g. architecture modularity, data integration, AI/ML) in addition to other Agile/iterative approaches for the entire organization.

      Assess Your Cybersecurity Insurance Policy

      • Buy Link or Shortcode: {j2store}255|cart{/j2store}
      • member rating overall impact: 9.1/10 Overall Impact
      • member rating average dollars saved: $33,656 Average $ Saved
      • member rating average days saved: 7 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Organizations must adapt their information security programs to accommodate insurance requirements.
      • Organizations need to reduce insurance costs.
      • Some organizations must find alternatives to cyber insurance.

      Our Advice

      Critical Insight

      • Shopping for insurance policies is not step one.
      • First and foremost, we must determine what the organization is at risk for and how much it would cost to recover.
      • The cyber insurance market is still evolving. As insurance requirements change, effectively managing cyber insurance requires that your organization proactively manages risk.

      Impact and Result

      Perform an insurance policy comparison with scores based on policy coverage and exclusions.

      Assess Your Cybersecurity Insurance Policy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess Your Cybersecurity Insurance Policy Storyboard - A step-by-step document that walks you through how to acquire cyber insurance, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Use this blueprint to score your potential cyber insurance policies and develop skills to overcome common insurance pitfalls.

      • Assess Your Cybersecurity Insurance Policy Storyboard

      2. Acquire cyber insurance with confidence – Learn the essentials of the requirements gathering, policy procurement, and review processes.

      Use these tools to gather cyber insurance requirements, prepare for the underwriting process, and compare policies.

      • Threat and Risk Assessment Tool
      • DRP Business Impact Analysis Tool
      • Legacy DRP Business Impact Analysis Tool
      • DRP BIA Scoring Context Example
      • Cyber Insurance Policy Comparison Tool
      • Cyber Insurance Controls Checklist

      Infographic

      Make Prudent Decisions When Increasing Your Salesforce Footprint

      • Buy Link or Shortcode: {j2store}134|cart{/j2store}
      • member rating overall impact: 8.9/10 Overall Impact
      • member rating average dollars saved: $55,224 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • Too often, organizations fail to achieve economy of scale. They neglect to negotiate price holds, do not negotiate deeper discounts as volume increases, or do not realize there are already existing contracts within the organization.
      • Understand what to negotiate. Organizations do not know what can and cannot be negotiated, which means value gets left on the table.
      • Integrations with other applications must be addressed from the outset. Many users buy the platform only to realize later on that the functionality they wanted does not exist and may be an extra expense with customization.

      Our Advice

      Critical Insight

      • Buying power dissipates when you sign the contract. Get the right product for the right number of users for the right term and get it right the first time.
      • Getting the best price does not assure a great total cost of ownership or ROI. There are many components as part of the purchasing process that if unaccounted for can lead to dramatic and unbudgeted spend.
      • Avoid buyer’s remorse through due diligence before signing the deal. If you need to customize the software or extend it with a third-party add-in, identify your costs and timelines upfront. Plan for successful adoption.

      Impact and Result

      • Centralize purchasing instead of enabling small deals to maximize discount levels by creating a process to derive a cost-effective methodology when subscribing to Sales Cloud, Service Cloud, and Force.com.
      • Educate your organization on Salesforce’s licensing methods and contract types, enabling informed purchasing decisions. Critical components of every agreement that need to be negotiated are a renewal escalation cap, term protection, and license metrics to document what comes with each. Re-bundling protection is also critical in case a product is no longer desired.
      • Proactively addressing integrations and business requirements will enable project success and enable the regular upgrades the come with a multi-tenant cloud services SaaS solution.

      Make Prudent Decisions When Increasing Your Salesforce Footprint Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you need to understand and document your Salesforce licensing strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish software requirements

      Begin your journey by understanding whether Salesforce is the right CRM. Also proactively approach Salesforce licensing by understanding which information to gather and assessing the current state and gaps.

      • Make Prudent Decisions When Increasing Your Salesforce Footprint – Phase 1: Establish Software Requirements
      • Salesforce Licensing Purchase Reference Guide
      • RASCI Chart

      2. Evaluate licensing options

      Review current products and licensing models to determine which licensing models will most appropriately fit the organization's environment.

      • Make Prudent Decisions When Increasing Your Salesforce Footprint – Phase 2: Evaluate Licensing Options
      • Salesforce TCO Calculator
      • Salesforce Discount Calculator

      3. Evaluate agreement options

      Review Salesforce’s contract types and assess which best fits the organization’s licensing needs.

      • Make Prudent Decisions When Increasing Your Salesforce Footprint – Phase 3: Evaluate Agreement Options
      • Salesforce Terms and Conditions Evaluation Tool

      4. Purchase and manage licenses

      Conduct negotiations, purchase licensing, finalize a licensing management strategy, and enhance your CRM with a Salesforce partner.

      • Make Prudent Decisions When Increasing Your Salesforce Footprint – Phase 4: Purchase and Manage Licenses
      • Controlled Vendor Communications Letter
      • Vendor Communication Management Plan
      [infographic]

      Workshop: Make Prudent Decisions When Increasing Your Salesforce Footprint

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish Software Requirements

      The Purpose

      Assess current state and align goals; review business feedback.

      Interview key stakeholders to define business objectives and drivers.

      Key Benefits Achieved

      Have a baseline for whether Salesforce is the right solution.

      Understand Salesforce as a solution.

      Examine all CRM options.

      Activities

      1.1 Perform requirements gathering to review Salesforce as a potential solution.

      1.2 Gather your documentation before buying or renewing.

      1.3 Confirm or create your Salesforce licensing team.

      1.4 Meet with stakeholders to discuss the licensing options and budget allocation.

      Outputs

      Copy of your Salesforce Master Subscription Agreement

      RASCI Chart

      Salesforce Licensing Purchase Reference Guide

      2 Evaluate Licensing Options

      The Purpose

      Review product editions and licensing options.

      Review add-ons and licensing rules.

      Key Benefits Achieved

      Understand how licensing works.

      Discuss licensing rules and their application to your current environment.

      Determine the product and license mix that is best for your requirements.

      Activities

      2.1 Determine the editions, licenses, and add-ons for your Salesforce CRM solution.

      2.2 Calculate total cost of ownership.

      2.3 Use the Salesforce Discount Calculator to ensure you are getting the discount you deserve.

      2.4 Meet with stakeholders to discuss the licensing options and budget allocation.

      Outputs

      Salesforce CRM Solution

      Salesforce TCO Calculator

      Salesforce Discount Calculator

      Salesforce Licensing Purchase Reference Guide

      3 Evaluate Agreement Options

      The Purpose

      Review terms and conditions of Salesforce contracts.

      Review vendors.

      Key Benefits Achieved

      Determine if MSA or term agreement is best.

      Learn what specific terms to negotiate.

      Activities

      3.1 Perform a T&Cs review and identify key “deal breakers.”

      3.2 Decide on an agreement that nets the maximum benefit.

      Outputs

      Salesforce T&Cs Evaluation Tool

      Salesforce Licensing Purchase Reference Guide

      4 Purchase and Manage Licenses

      The Purpose

      Finalize the contract.

      Discuss negotiation points.

      Discuss license management and future roadmap.

      Discuss Salesforce partner and implementation strategy.

      Key Benefits Achieved

      Discuss negotiation strategies.

      Learn about licensing management best practices.

      Review Salesforce partner options.

      Create an implementation plan.

      Activities

      4.1 Know the what, when, and who to negotiate.

      4.2 Control the flow of communication.

      4.3 Assign the right people to manage the environment.

      4.4 Discuss Salesforce partner options.

      4.5 Discuss implementation strategy.

      4.6 Meet with stakeholders to discuss licensing options and budget allocation.

      Outputs

      Salesforce Negotiation Strategy

      Vendor Communication Management Plan

      RASCI Chart

      Info-Tech’s Core CRM Project Plan

      Salesforce Licensing Purchase Reference Guide

      Implement and Optimize Application Integration Governance

      • Buy Link or Shortcode: {j2store}361|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Enterprise Integration
      • Parent Category Link: /enterprise-integration
      • Enterprises begin integrating their applications without recognizing the need for a managed and documented governance model.
      • Application Integration (AI) is an inherently complex concept, involving the communication among multiple applications, groups, and even organizations; thus developing a governance model can be overwhelming.
      • The options for AI Governance are numerous and will vary depending on the size, type, and maturity of the organization, adding yet another layer of complexity.

      Our Advice

      Critical Insight

      • Governance is essential with integrated applications. If you are planning to integrate your applications, you should already be considering a governance model.
      • Proper governance requires oversight into chains of responsibility, policy, control mechanisms, measurement, and communication.
      • People and process are key. Technology options to aid in governance of integrated apps exist, but will not greatly contribute to the success of AI.

      Impact and Result

      • Assess your capabilities and determine which area of governance requires the most attention to achieve success in AI.
      • Form an Integration Center of Competency to oversee AI governance to ensure compliance and increase success.
      • Conduct ongoing training with your personnel to ensure up-to-date skills and end user understanding.
      • Frequently revisit your AI governance strategy to ensure alignment with business goals.

      Implement and Optimize Application Integration Governance Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Implement and optimize Application Integration Governance

      Know where to start and where to focus your attention in the implementation of an AI governance strategy.

      • Storyboard: Implement and Optimize Application Integration Governance

      2. Assess the organization's capabilities in AI Governance

      Assess your current and target states in AI Governance.

      • Application Integration Governance Gap Analysis Tool

      3. Create an Integration Center of Competency

      Have a governing body to oversee AI Governance.

      • Integration Center of Competency Charter Template

      4. Establish AI Governance principles and guidelines

      Create a basis for the organization’s AI governance model.

      • Application Integration Policy and Principles Template

      5. Create an AI service catalog

      Keep record of services and interfaces to reduce waste.

      • Integration Service Catalog Template
      [infographic]

      Application Development Throughput

      • Buy Link or Shortcode: {j2store}27|cart{/j2store}
      • Related Products: {j2store}27|crosssells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Applications
      • Parent Category Link: /applications

      The challenge

      • As we work more and more using agile techniques, teams tend to optimize their areas of responsibility.
      • IT will still release lower-quality applications when there is a lack of clarity around the core SDLC processes.
      • Software development teams continue to struggle with budget and time constraints within their releases.
      • Typically each group claims to be optimized, yet the final deliverable falls short of the expected quality.

      Our advice

      Insight

      • Database administrators know this all too well: Optimizing can you perform worse. The software development lifecycle (SDLC) must be optimized holistically, not per area or team.
      • Separate how you work from your framework. You do not need "agile" or "extreme" or "agifall" or "safe" to optimize your SDLC.
      • SDLC optimization is a continuous effort. Start from your team's current capabilities and improve over time.

      Impact and results 

      • You can assume proper accountability for the implementation and avoid over-reliance on the systems integrator.
      • Leverage the collective knowledge and advice of additional IT professionals
      • Review the pitfalls and lessons learned from failed integrations.
      • Manage risk at every stage.
      • Perform a self-assessment at various stages of the integration path.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand our approach to SDLC optimization and why we advocate a holistic approach for your company.

      Document your current state

      This phase helps you understand your business goals and priorities. You will document your current SDLC process and find where the challenges are.

      • Create a Horizontally Optimized SDLC to Better Meet Business Demands – Phase 1: Document the Current State of the SDLC (ppt)
      • SDLC Optimization Playbook (xls)

      Find out the root causes, define how to move forward, and set your target state

      • Create a Horizontally Optimized SDLC to Better Meet Business Demands – Phase 2: Define Root Causes, Determine Optimization Initiatives, and Define Target State (ppt)

      Develop the roll-out strategy for SDLC optimization

      Prioritize your initiatives and formalize them in a roll-out strategy and roadmap. Communicate your plan to all your stakeholders.

      • Create a Horizontally Optimized SDLC to Better Meet Business Demands – Phase 3: Develop a Rollout Strategy for SDLC Optimization (ppt)
      • SDLC Communication Template (ppt)

       

      Adopt an Exponential IT Mindset

      • Buy Link or Shortcode: {j2store}103|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation

      New technologies such as generative AI, quantum computing, 5G cellular networks, and next-generation robotics are ushering in an exciting new era of business transformation. By adopting an exponential IT mindset, IT leaders will be able to lead the autonomization of business capabilities.

      To capitalize on this upcoming opportunity, exponential IT leaders will have to become business advisors who unlock exponential value for the business and help mitigate exponential risk.

      Adopt a renewed focus on business outcomes to achieve autonomization

      An exponential IT mindset means that IT leaders will need to take a lead role in transforming business capabilities.

      • Embrace an expanded role as business advisors: CIOs will be tasked with greater responsibility for determining business strategy alongside the C-suite.
      • Know the rewards and mitigate the risks: New value chain opportunities and efficiency gains will create significant ROI. Protect these returns by mitigating higher risks to business continuity, information security, and delivery performance.
      • Plan to fully leverage technologies such as AI: It will be integral for IT to enable autonomous technologies in this new era of exponential technology progress.

      Adopt an Exponential IT Mindset Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Adopt an Exponential IT Mindset Deck – An introduction to IT’s role in the autonomization era

      The role of IT has evolved throughout the past couple generations to enable fundamental business transformations. In the autonomization era, it will have to evolve again to lead the business through a world of exponential opportunity.

      • Adopt an Exponential IT Mindset Storyboard

      Infographic

      Further reading

      Adopt an Exponential IT Mindset

      Thrive through the next paradigm shift

      Executive Summary

      For more than 40 years, information technology has significantly transformed businesses, from the computerization of operations to the digital transformation of business models. As technological disruption accelerates exponentially, a world of exponential business opportunity is within reach.

      Newly emerging technologies such as generative AI, quantum computing, 5G cellular networks, and next-generation robotics are enabling autonomous business capabilities.

      The role of IT has evolved throughout the past couple generations to enable business transformations. In the autonomization era, it will have to evolve again. IT will have a new mission, an adapted governance structure, innovative capabilities, and an advanced partnership model.

      CIOs embracing exponential IT require a new mindset. Their IT practices will need to progress to the top of the maturity ladder as they make business outcomes their own.

      Over the past two generations, we have witnessed major technology-driven business transformations

      1980s

      Computerization

      The use of computer devices, networks, and applications became widespread in the enterprise. The focus was on improving the efficiency of back-office tasks.

      2000s

      Digitalization

      As the world became connected through the internet, new digitally enabled business models emerged in the enterprise. Orders were now being received online, and many products and services were partially or fully digitized for online fulfillment.

      Recent pandemic measures contributed to a marked acceleration in the digitalization of organizations

      The massive disruption resulting from pandemic measures led businesses to shift to more digital interactions with customers.

      The global average share of customer interactions that are digital went from 36% in December 2019 to 58% in July 2020.

      The global average share of customer interactions that are digital went from 36% to 58% in less than a year.*

      Moreover, companies across business areas have accelerated the digitization of their offerings.

      The global average share of partially or fully digitized products went from 35% in 2019 to 55% in July 2020.

      The global average share of partially or fully digitized products went from 35% to 55% in the same period.*

      The adoption of digitalized business models has accelerated during the pandemic. Post-pandemic, it is unlikely for adoption to recede.

      With more business applications ported to the cloud and more data available online, “digital-first” organizations started to envisage a next wave of automation.

      *Source: “How COVID-19 has pushed companies over the technology tipping point—and transformed business forever,” McKinsey & Company, 2020

      A majority of IT leaders plan to use artificial intelligence within their organizations in 2023

      In August 2022, Info-Tech surveyed 506 IT leaders and asked which tasks would involve AI in their organizations in 2023.

      Graph showing tasks that would involve AI in organizations in 2023.

      We found that 63% of IT leaders plan to use AI within their organizations to automate repetitive, low-level tasks by the end of 2023.

      With the release of the ChatGPT prototype in November 2022, setting a record for the fastest user growth (reaching 100 million active users just two months after launch), we foresee that AI adoption will accelerate significantly and its use will extend to more complex tasks.

      Newly emerging technologies and business realities are ushering in the next business transformation

      1980s

      Computerization

      2000s

      Digitalization

      2020s

      Autonomization

      As digitalization accelerates, a post-pandemic world with a largely online workforce and digitally transformed enterprise business models now enters an era where more business capabilities become autonomous, with humans at the center of a loop* that is gradually becoming larger.

      Deep Learning, Quantum Computing, 5G Networks, Robotics

      * Download Info-Tech’s CIO Trend Report 2019 – Become a Leader in the Loop

      The role of IT needs to evolve as it did through the previous two generations

      1980s

      Computerization

      IT professionals gathered functional requirements from the business to help automate back-office tasks and improve operational efficiency.

      2000s

      Digitalization

      IT professionals acquired business analysis skills and leveraged the SMAC (social, mobile, analytics, and cloud) stack to accelerate the automation of the front office and enable the digital transformation of business models.

      2020s

      Autonomization

      IT professionals will become business advisors and enable the establishment of autonomous yet differentiated business processes and capabilities.

      The autonomization era brings enormous opportunity for organizations, coupled with enormous risk

      Graph of Risk Severity versus Value Opportunity. Autonomization has a high value of opportunity and high risk severity.

      While some analysts have been quick to announce the demise of the IT department and the transition of the role of IT to the business, the budgets that CIOs control have continued to rise steadily over time.

      In a high-risk, high-reward endeavor to make business processes autonomous, the role of IT will continue to be pivotal, because while everyone in the organization will rush to seize the value opportunity, the technology risk will be left for IT to manage.

      Exponential IT represents a necessary change in a CIO’s focus to lead through the next paradigm shift

      EXPONENTIAL RISK

      Autonomous processes will integrate with human-led processes, creating risks to business continuity, information security, and quality of delivery. Supplier power will exacerbate business risks.

      EXPONENTIAL REWARD

      The efficiency gains and new value chains created through artificial intelligence, robotics, and additive manufacturing will be very significant. Most of this value will be realized through the augmentation of human labor.

      EXPONENTIAL DEMAND

      Autonomous solutions for productivity and back-office applications will eventually become commoditized and provided by a handful of large vendors. There will, however, be a proliferation of in-house algorithms and workflows to autonomize the middle and front office, offered by a busy landscape of industry-centric capability vendors.

      EXPONENTIAL IT

      Exponential IT involves IT leading the cognitive reengineering of the organization with evolved practices for:

      • IT governance
      • Asset management
      • Vendor management
      • Data management
      • Business continuity management
      • Information security management

      To succeed, IT will have to adopt different priorities in its mission, governance, capabilities, and partnerships

      Digitalization

      A Connected World

      Progressive IT

      • Mission

        Enable the digital transformation of the business
      • Governance

        Service metrics, security perimeters, business intelligence, compliance management
      • Capabilities

        Service management, business analysis, application portfolio management, data management
      • Partnerships

        Management of technology service agreements

      Autonomization

      An Exponential World

      Exponential IT

      • Mission

        Lead the business through autonomization.
      • Governance

        Outcome-based metrics, zero trust, ESG reporting, digital trust
      • Capabilities

        Experience management, business advisory, enterprise innovation, data differentiation
      • Partnerships

        Management of business capability agreements

      Fortune favors the bold: The CIO now has an opportunity to cement their role as business leader

      Levels of digital maturity.  From bottom: Unstable - inability to consistently deliver basic services, Firefighter - Reliable infrastructure and IT service desk, Trusted Operator - Enablement of business through applications and work orders, Business Partner - Effective delivery of strategic business projects, Innovator - Information and technology as a competitive advantage.

      Research has shown that companies that are more digitally mature have higher growth than the industry average. In these companies, the CIO is part of the executive management team.

      And while the role of the CIO is generally tied to their mandate within the organization, we have seen their role progress from doer to leader as IT climbs the maturity ladder.

      As companies strive to succeed in the next phase of technology-driven transformation, CIOs have an opportunity to demonstrate their business leadership. To do so, they will have to provide exceptionally mature services while owning business targets.

      Identify Opportunities to Mature the Security Architecture

      • Buy Link or Shortcode: {j2store}385|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Secure Cloud & Network Architecture
      • Parent Category Link: /secure-cloud-network-architecture
      • Organizations do not have a solid grasp on the complexity of their infrastructure and are unaware of the overall risk to their infrastructure posed by inadequate security.
      • Organizations do not understand how to properly create and deliver value propositions of technical security solutions.

      Our Advice

      Critical Insight

      • The security architecture is a living, breathing thing based on the risk profile of your organization.
      • Compliance and risk mitigation create an intertwined relationship between the business and your security architecture. The security architecture roadmap must be regularly assessed and continuously maintained to ensure security controls align with organizational objectives.

      Impact and Result

      • A right-sized security architecture can be created by assessing the complexity of the IT department, the operations currently underway for security, and the perceived value of a security architecture within the organization. This will bring about a deeper understanding of the organizational infrastructure.
      • Developing a security architecture should also result in a list of opportunities (i.e. initiatives) that an organization can integrate into a roadmap. These initiatives will seek to improve security operations and strengthen the IT department’s understanding of security’s role within the organization.
      • A better understanding of the infrastructure will help to save time on determining the correct technologies required from vendors and therefore cut down on the amount of vendor noise.
      • Creating a defensible roadmap will assist with justifying future security spend.

      Identify Opportunities to Mature the Security Architecture Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop a right-sized security architecture, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify the organization’s ideal security architecture

      Complete three unique assessments to define the ideal security architecture maturity for your organization.

      • Identify Opportunities to Mature the Security Architecture – Phase 1: Identify the Organization's Ideal Security Architecture
      • Security Architecture Recommendation Tool
      • None

      2. Create a security program roadmap

      Use the results of the assessments from Phase 1 of this research to create a roadmap for improving the security program.

      • Identify Opportunities to Mature the Security Architecture – Phase 2: Create a Security Program Roadmap
      [infographic]

      Master the MSA for Your Managed Services Providers

      • Buy Link or Shortcode: {j2store}235|cart{/j2store}
      • member rating overall impact: 9.7/10 Overall Impact
      • member rating average dollars saved: $9,869 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Master Services Agreements and Service Level Agreements are tedious, and reviewers may lack the skills and experience to effectively complete the process.
      • Managed services providers have a repository of contract terms and conditions that are road-tested and prepackaged, and which are often biased in their favor.
      • With many different pricing options, it is difficult to choose the services you need.

      Our Advice

      Critical Insight

      • Manage your managed services providers. Added value is realized when managed service providers are in tune with your IT strategies, goals, and mission.
      • Negotiate an agreement that is beneficial to both parties. The most successful partnerships are a win-win agreement.
      • Lawyers can’t ensure you get the best business deal. They tend to look at general terms and conditions and may overlook IT-specific components.

      Impact and Result

      • Understanding managed services providers, including their roles and pricing models, will give you valuable insight into negotiating the best deal for your organization.
      • Info-Tech’s contract review methodology will help you navigate the complex process of managed services provider contract evaluation and review all the key details to maximize the benefits to your organization.
      • This blueprint provides guidance on catching vendor-biased terms and conditions, and suggests tips for getting managed services providers to take on their fair share of responsibilities.

      Master the MSA for Your Managed Services Providers Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should master the MSA for your MSPs, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Review terms and conditions for your MSP contract

      Use Info-Tech’s MSA Contract Review Tool to locate and track improvement areas in your MSAs.

      • Master the MSA for Your Managed Services Providers – Phase 1: Review Terms and Conditions of Your MSP Contract
      • MSA Contract Review Tool
      [infographic]

      Take a Realistic Approach to Disaster Recovery Testing

      • Buy Link or Shortcode: {j2store}414|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity

      You have made significant investments in availability and disaster recovery – but your ability to recover hasn’t been tested in years. Testing will:

      • Improve your DR capabilities.
      • Identify required changes to planning documentation and procedures.
      • Validate DR capabilities for interested customers and auditors.

      Our Advice

      Critical Insight

      • If you treat testing as a pass/fail exercise, you aren’t meeting the end goal of improving organizational resilience.
      • Focus on identifying gaps and risks, and addressing them, before a real disaster hits.
      • Take a realistic, iterative approach to resilience testing that starts with small, low-risk tests and builds on lessons learned.

      Impact and Result

      • Identify testing scenarios and scope that can deliver value to your organization.
      • Create practical test plans with Info-Tech’s template.
      • Demonstrate value from testing to gain buy-in for additional tests.

      Take a Realistic Approach to Disaster Recovery Testing Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Take a Realistic Approach to Disaster Recovery Testing Storyboard – A guide to establishing a right-sized approach to DR testing that delivers durable value to your organization.

      Use this research to understand the different types of tests, prioritize and plan tests for your organization, review the results, and establish a cadence for testing.

      • Take a Realistic Approach to Disaster Recovery Testing Storyboard

      2. Disaster Recovery Test Plan Template – A template to document your organization's DR test plan.

      Use this template to document scope and goals, participants, key pre-test milestones, the test-day schedule, and your findings from the testing exercise.

      • Disaster Recovery Test Plan Template

      3. Disaster Recovery Testing Program Summary – A template to outline your organization's DR testing program.

      Identify the tests you will run over the next year and the expertise, governance, process, and funding required to support testing.

      • Disaster Recovery Testing Program Summary

      [infographic]

       

      Further reading

      Take a Realistic Approach to Disaster Recovery Testing

      Reduce costly downtime with a right-sized testing program that improves IT resilience.

      Analyst Perspective

      Reduce costly downtime with a right-sized testing program that improves IT resilience.

      Andrew Sharp

      Most businesses make significant investments in disaster recovery and technology resilience. Redundant sites and systems, monitoring, intrusion prevention, backups, training, documentation: it all costs time and money.

      But does this investment deliver expected value? Specifically, can you deliver service continuity in a way that meets business requirements?

      You can’t know the answer without regularly testing recovery processes and systems. And more than just validation, testing helps you deliver service continuity by finding and addressing gaps in your plans and training your staff on recovery procedures.

      Use the insights, tools, and templates in this research to create a streamlined and effective resilience testing program that helps validate recovery capabilities and enhance service reliability, availability, and continuity.

      Andrew Sharp

      Research Director, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      You have made significant investments in availability and disaster recovery (DR) – but your ability to recover hasn’t been tested in years. Testing will:

      • Improve your DR capabilities.
      • Identify required changes to planning documentation and procedures.
      • Validate DR capabilities for interested customers and auditors.

      Common Obstacles

      Despite the value testing can offer, actually executing on DR tests is difficult because:

      • Testing is often an IT-driven initiative, and it can be difficult to secure business buy-in to redirect resources away from other urgent projects or accept risks that come with testing.
      • Previous tests have been overly complex and challenging to coordinate and leave a hangover so bad that no one wants to do them again.

      Info-Tech's Approach

      Take a realistic approach to resilience testing by starting with small, low-risk tests, then iterating with the lessons you’ve learned:

      • Identify testing scenarios and scope that can deliver value to your organization.
      • Create practical test plans with Info-Tech’s template.
      • Get buy-in for regular DR testing from key stakeholders with a testing program summary.

      Info-Tech Insight

      If you treat testing as a pass/fail exercise, you aren’t meeting the end goal of improving organizational resilience. Focus on identifying gaps and risks so you can address them before a real disaster hits.

      Process and Outputs

      This research is accompanied by templates to help you achieve your goals faster.

      1 - Establish the business rationale for DR testing.
      2 - Review a range of options for testing.
      3 - Prioritize tests that are most valuable to your business.
      4 - Create a disaster recovery test plan.
      5 - Establish a Test Program to support a regular testing cycle.

      Outputs:

      DR Test Plan
      DR Testing Program Summary

      Example Orange Activity slide.
      Orange activity slides like the one on the left provide directions to help you make key decisions.

      Key Deliverable:

      Disaster Recovery Test Plan Template

      Build a plan for your first disaster recovery test.

      This document provides a complete example you can use to quickly build your own plan, including goals, milestones, participants, the test-day schedule, and findings from the after-action review.

      Why test?

      Testing helps you avoid costly downtime

      • In a disaster scenario, speed matters. Immediately after an outage, the impact on the organization is small, but impact increases rapidly the longer the outage continues.
      • A quick and reliable response and recovery can protect the organization from significant losses.
      • A DRP testing and maintenance program helps ensure you’re ready to recover when you need to, rather than figuring it out as you go.

      “Routine testing is vital to survive a disaster… that’s when muscle memory sets in. If you don’t test your DR plan it falls [in importance], and you never see how routine changes impact it.”

      – Jennifer Goshorn
      Chief Administrative Officer
      Gunderson Dettmer LLP

      Info-Tech members estimated even one day of system downtime could lead to significant revenue losses. Estimated loss of revenue over 24 hours. Core Infrastructure has the highest potential for lost revenue.

      Average estimated potential loss* in thousands of USD due to a 24-hour outage (N=41)

      *Data aggregated from 41 business impact analyses (BIAs) conducted with Info-Tech advisory assistance. BIAs evaluate potential revenue loss due to a full day of system downtime, at the worst possible time.

      Run tests to enhance disaster recovery plans

      Testing improves organizational resilience

      • Identify and address gaps in your plans before a real disaster strikes.
      • Cross-train staff on systems recovery.
      • Go beyond testing technology to test recovery processes.
      • Establish a culture that centers resilience in everyday decision-making.

      Testing keeps DR documentation ready for action

      • Update documentation ahead of tests to prepare for the testing exercise.
      • Update documentation after testing to incorporate any lessons learned.

      Testing validates that investments in resilience deliver value

      • Confirm your organization can meet defined recovery time objectives (RTOs) and recovery point objectives (RPOs).
      • Provide proof of testing for auditors, prospective customers, and insurance applications

      Overcome testing challenges

      Despite the value of effective recovery testing, most IT organizations struggle to test recovery plans

      Common challenges

      • Key resources don’t have time for testing exercises.
      • You don’t have the technology to support live recovery testing.
      • Tests are done ad hoc and lessons learned are lost.
      • A lack of business support for test exercises as the value isn’t understood.
      • Tests are always artificially simple because RTOs and RPOs must be met to satisfy customer or auditor inquiries

      Overcome challenges with a realistic approach:

      • Start small with tabletop and recovery tests for specific systems.
      • Include recovery tests in operational tasks (e.g. restore systems when you have a maintenance window).
      • Create testing plans for larger testing exercises.
      • Build on successful tests to streamline testing exercises in the future.
      • Don’t make testing a pass-fail exercise. Focus on identifying gaps and risks so you can address them before a real disaster hits.

      Go beyond traditional testing

      Different test techniques help validate recovery against different threats

      • There are many threats to service continuity, including ransomware, severe weather events, geopolitical conflict, legacy systems, staff turnover, and day-to-day outages caused by human error, software updates, hardware failures, or network outages.
      • At its core, disaster recovery planning is about recovery. A plan for service recovery will help you mitigate against many threats at once. The testing approaches on the right will help you validate different aspects of that recovery process.
      • This research will provide an overview of the approaches outlined on the right and help you prioritize tests that are most valuable to your organization.
      Different test techniques for disaster recover training: System Failover tests, tabletop exercises, ransomware recovery tests, etc.

      00 Identify a working group

      30 minutes

      Identify a group of participants who can fill the following roles and inform the discussions around testing in this research. A single person could fill multiple roles and some roles could be filled by multiple people. Many participants will be drawn from the larger DRP team.

      Roles and expectations for Disaster Recovery Planning. DRP sponsor, Testing coordinator, System testers, business liaisons, executive team.

      Input

      • Organizational context

      Output

      • A list of key participants for test planning and execution

      Participants

      • Typically, start by identifying the sponsor and coordinator and have them identify the other members of the working group.

      Start by updating your disaster recovery plan (DRP)

      Use Info-Tech’s Create a Right-Sized Disaster Recovery Plan research to identify recovery objectives based on business impact and outline recovery processes. Both are tremendously valuable inputs to your test plans.

      Overall Business Continuity Plan

      IT Disaster Recovery Plan

      A plan to restore IT services (e.g. applications and infrastructure) following a disruption. A DRP:

      • Identifies critical applications and dependencies.
      • Defines appropriate recovery objectives based on a business impact analysis (BIA).
      • Creates a step-by-step incident response plan.

      BCP for Each Business Unit

      A set of plans to resume business processes for each business unit. A business continuity plan (BCP) is also sometimes called a continuity of operations plan (COOP).

      BCPs are created and owned by each business unit, and creating a BCP requires deep involvement from the leadership of each business unit.

      Info-Tech’s Develop a Business Continuity Plan blueprint provides a methodology for creating business unit BCPs as part of an overall BCP for the organization.

      Crisis Management Plan

      A plan to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage.

      Info-Tech’s Implement Crisis Management Best Practices blueprint provides a framework for planning a response to any crisis, from health and safety incidents to reputational damage.

      01 Confirm: why test at all?

      15-30 minutes

      Identify the value recovery testing for your organization. Use language appropriate for a nontechnical audience. Start with the list below and add, modify, or delete bullet points to reflect your own organization.

       

      Drivers for testing – Examples:

       

      • Improve service continuity.
      • Identify and address gaps in recovery plans before a real disaster strikes.
      • Cross-train staff on systems recovery to minimize single points of failure.
      • Identify how we coordinate across teams during a major systems outage.
      • Exercise both recovery processes and technology.
      • Support a culture that centers system resilience in everyday decision-making.
      • Keep recovery documentation up-to-date and ready for action.
      • Confirm that our stated recovery objectives can be met.
      • Provide proof of testing for auditors, prospective customers, and insurance applications.
      • We require proof of testing to pass audits and renew cybersecurity insurance.

      Info-Tech Insight

      Time-strapped technical staff will sometimes push back on planning and testing, objecting that the team will “figure it out” in a disaster. But the question isn’t whether recovery is possible – it’s whether the recovery aligns with business needs. If your plan is to “MacGyver” a solution on the fly, you can’t know if it’s the right solution for your organization.

      Input

      • Business drivers and context for testing

      Output

      • Specific goals that are driving testing

      Participants

      • DR sponsor
      • Test coordinator

      Think about what and how you test

      Different layers of the stack to test: Network, Authentication, compute and storage, visualization platforms, database services, middleware, app servers, web servers.

      Find gaps and risks with tabletop testing

      Tabletop planning had the greatest impact on meeting recovery objectives (RTOs/RPOs).

      In a tabletop planning exercise, the team walks through a disaster scenario to outline the recovery workflow, and risks or gaps that could disrupt that workflow.

      Tabletops are particularly effective because:

      • It enables you to play out a wider range of scenarios than technology-based testing (e.g. full-scale, parallel) due to cost and complexity factors.
      • It is non-intrusive, so it can be executed more easily than other testing methodologies.
      • The exercise translates into recovery documentation: you create a workflow as you go.
      • A major site or service recovery scenario will review all aspects of the recovery process and create the backbone of your recovery plan.

      02 Run a tabletop exercise

      2 hours

      Tabletop testing is part of our core DRP methodology, Create a Right-Sized Disaster Recovery Plan. This exercise can be run using cue cards, sticky notes, or on a whiteboard; many of our facilitators find building the workflow directly in flowchart software to be very effective.

      Use our Recovery Workflow Template as a starting point.

      Some tips for running your first tabletop exercise:

      Do

      • Review the complete workflow from notification all the way to user acceptance testing.
      • Keep focused; stay on task and on time.
      • Revisit each step and record gaps and risks (and known solutions, but don’t dwell on this).
      • Revise and improve the plan with task owners.

      Don't

      • Get weighed down by tools.
      • Try to find solutions to every gap/risk as you go. Save in-depth research/discussion for later.
      • Document the details right away – stick to the high-level plan for the first exercise.
      1. Ahead of the exercise, decide on a scenario, identify participants, and book a meeting time.
        • For your first walkthrough of a DR scenario, we often recommend a scenario that considers a site failure requiring failover to a DR site.
        • For the first exercise, focus on technical aspects of recovery before bringing in members of the business. The technical team may need space to discuss the appropriate steps in the recovery process before you bring in business liaisons to discuss user acceptance testing (UAT).
        • A complete failover considers all systems, the viability of your second site, and can help identify parts of the process that require additional exercises.
      2. Review the scenario with participants. Then, discuss and document the recovery process, starting with initial notification of an event.
        • Record steps in the process on white cards or boxes.
        • On yellow and red cards, document gaps and risks in people process and technology requirements.
      3. Once you’ve walked through the process, return to the start.
        • Record the time required to complete each step. Consider identifying who is responsible for key steps. Identify any additional gaps and risks.
      4. Clean up and record the results of the workflow. Save a copy with your DRP documentation.

      Input

      • Expert knowledge on systems recovery

      Output

      • Recovery workflow, including gaps and risks

      Participants

      • Test coordinator
      • Technical SMEs

      Move from tabletop testing to functional exercises

      See how your plans fare in the real world

      In live exercises, some portion of your recovery plans are executed in a way that mimics a real recovery scenario. Some advantages of live testing:

      • See how standby systems behave. A tabletop exercise can miss small issues that can make or break the recovery process. For example, connectivity or integration issues on a new subnet might be difficult to predict prior to actually running services in that environment.
      • Hands-on practice: Familiarize the team with the steps, commands, and interfaces of your recovery toolset.
      • Manage the pressure of the DR scenario: Nothing’s quite like the real thing, but a live exercise may be the closest your team can get to a disaster situation without experiencing it firsthand.

      Examples of live exercises

      Boot and smoke test Turn on a standby system and confirm it boots up correctly.
      Restore and validate data Restore data or servers from backup. Confirm data integrity.
      Parallel testing Send familiar transactions to production and standby systems. Confirm both systems produce the same result.
      Failover systems Shut down the production system and use the standby system in production.

      Run local tests ahead of releases

      Think small

      Most unacceptable downtime is caused by localized issues, such as hardware or software failures, rather than widespread destructive events. Regular local testing can help validate the recovery plan for local issues and improve overall service continuity.

      Make local testing a standard step in maintenance work and new deployments to embed resilience considerations in day-to-day activities. Run the same tests in both your primary and your DR environment.

      Some examples of localized tests:

      • Review backup logs and check for errors.
      • Restore files or whole systems from backup.
      • Run application-based tests as part of release management, including unit, regression, and performance tests.
        • Ensure application tests are run for both the primary and DR environment.
        • For a deep-dive on application testing, see Info-Tech’s research Automate Testing to Get More Done.

      Info-Tech Insight

      Local tests will vary between different services, and local test design is usually best left to the system SMEs. At the same time, centralize reporting to understand where tests are being done.

      Investigate whether your IT Service Management or ticketing system can create recurring tasks or work orders to schedule, document, and track test exercises. Tasks can be pre-populated with checklists and documentation to support the test and provide a record of completed tests to support oversight and reporting.

      Have the business validate recovery

      If your business doesn’t think a system’s recovered, it’s not recovered.

      User acceptance testing (UAT) after system recovery is a key step in the recovery process. Like any step in the process, there’s value in testing it before it actually needs to be done. Assign responsibility for building UATs to the person who will be responsible for executing them.

      An acceptance test script might look something like the checklist below.

      • Does the application open?
      • Does the interface look right?
      • Do you see any unusual notifications or warnings?
      • Can you conduct a key transaction with dummy data?
      • Can you run key reports?

      “I cannot stress how important it is to assign ownership of responsibilities in a test; this is the only way to truly mitigate against issues in a test.”

      – Robert Nardella
      IT Service Management
      Certified z/OS Mainframe Professional

      Info-Tech Insight

      Build test scripts and test transactions ahead of time to minimize the amount of new work required during a recovery scenario.

      Beyond the Basics: Full Failover Testing

      • A failover test – a full failover of your production environment to a secondary environment – is what many IT and businesspeople think about when they think of disaster recovery testing.
      • A full test can validate previous local or tabletop tests, identify additional gaps and risks, and provide hands-on training experience with recovery processes and technologies.
      • Setting a date for failover testing can also inject some urgency into otherwise low-priority (but high importance) disaster recovery planning and documentation exercises, which need to be completed prior to the test.
      • Despite these benefits, full failover tests carry significant risk and require a great deal of effort and cost. Typically, only businesses that already have an active-active environment capable of supporting in-scope production systems are able to run a full environment failover.
      • This is especially true the first time you test. While in theory a DR plan should be ready to go at any time, there will be documents to update, gaps to address, and risks to mitigate before you go ahead with the test.

      Full Failover Testing

      What you get:

      • Provide hands-on experience with recovery processes and technology.
      • Confirm that site failover works in practice as you assumed in tabletop or local testing exercises.
      • Identify critical gaps you might have missed without a full failover test.

      What you need:

      • An active-active secondary site, with sufficient standby equipment, data, and licensed standby software to support production.
      • A completed tabletop exercise and documented recovery workflow.
      • A documented test plan, backout plan, and formal sign-off.
      • An off-hours downtime window.
      • Time from technical SMEs and business resources, both for creating the plan and executing the test.

      Beyond the Basics: Site Reliability Engineering

      • Site reliability engineering (SRE) is an application of skills and approaches from software engineering to improve system resilience.
      • SRE is focused on “availability, latency, performance, efficiency, change management, monitoring, emergency response, and capacity planning” across a set portfolio of services (Sloss, 2017).
      • In many organizations, SRE is implemented as a team that supports separate applications teams.
      • Applications must have defined and granular resilience requirements, translated into service objectives. The SRE team and applications teams will work together to meet these objectives.
      • Site reliability engineers (the folks that do SRE, and often also abbreviated as SREs) are expected to build solutions and processes to ensure services remain stable and performant, not just respond when they fail. For example, Google allows their SREs to spend just half their time on incident response, with the rest of their time focused on development and automation tasks.

      Site Reliability Testing

      What you get:

      • Improved reliability and reduced frequency and impact of downtime.
      • Increased use of automation to address problems before they cause an incident.
      • Granular resilience objectives.

      What you need:

      • Systems running on software-defined infrastructure.
      • Specialized skills in programming, infrastructure-as-code.
      • Business & product owners able to define and fund acceptable and appropriate resilience objectives.
      • Technical experts able to translate product requirements into technical design requirements.

      Beyond the Basics: Chaos Engineering

      • Chaos engineering, a term and approach first popularized by the team at Netflix, aims to improve the resilience of particularly large and distributed systems by simulating system failures and evaluating performance against a baseline.
      • Experiments simulate a variety of real-world events that could cause outages (e.g. network slowdowns or server failures). Experiments run continuously, and the recommendation is to run them in production where feasible while minimizing the impact on customers.
      • Tools to help you run chaos testing exist, including open-source toolkits like Chaos Monkey or Mangle and paid software as a service (SaaS) solutions like Gremlin.
      • Deciding whether the long-term benefits of tests that can degrade production are worth the potential risk of system slowdowns or outages is a business or product decision. Technical considerations aside, if the business owner of a particular system doesn’t see the value of continuous testing outweighing the introduced risk, this approach to testing isn’t going to happen.

      Chaos Engineering

      What you get:

      • Confidence that systems can weather volatile and unpredictable conditions in a production environment.
      • An embedded resilience culture.

      What you need:

      • High-maturity IT incident, monitoring and event practices.
      • Standby/resilient systems to minimize downtime impact.
      • Business buy-in for introducing risk into the production environment.
      • Specialized skills to identify, develop, and run tests that degrade production performance in a controlled way.
      • Budget and time to act on issues identified through testing.

      Beyond the Basics: Security Event Simulations

      • Ransomware is driving demands for proof of recovery testing from customers, executives, auditors, and insurance companies. Systems recovery is part of ransomware recovery, but recovering from a breach includes detection, analysis, containment, and eradication of the attack vector before systems recovery can begin.
      • Beyond technical recovery, internal legal and communications teams will have a role, as will your insurance provider, consultants specialized in ransomware recovery, or professional ransom negotiators.
      • A tabletop exercise focused on ransomware incident response is a key first step. You can find Info-Tech’s methodology for a ransomware tabletop in Phase 3 of Build Resilience Against Ransomware Attacks.
      • Live testing approaches can offer hands-on experience and further insight into how your systems are vulnerable to malware. A variety of open source and proprietary tools can simulate ransomware and help you identify problems, though it’s important to understand the limitations of different simulators (Allon, 2022).
      • A “red team” exercise simulates an adversarial attack against your processes and systems. A specialized penetration tester will often take on the role of the red team and provide a report of identified gaps and risks after the engagement.

      Security Event Simulation

      What you get:

      • Hands-on experience managing and recovering from a ransomware attack in a controlled environment.
      • A better understanding of gaps in your response process.

      What you need:

      • A completed ransomware tabletop exercise and mature security incident response processes.
      • For Ransomware Simulators: An air-gapped sandbox environment hosting a copy of your production systems and security tools, and time from your technical SMEs.
      • For Red Team Exercises: A trusted provider, scope for your testing plans, and time from your security incident response team.

      Prioritize tests by asking these three questions

      1. Will the scope of this test deliver sufficient value?

      • Yes, these are critical systems with low tolerance for downtime or data loss.
      • Yes, major changes or new systems require validation of DR capabilities.
      • Yes, there’s high probability of an outage, or recent experience of an outage.
      • •Yes, we have audit requirements or customer demands for testing.

      2. Are we ready for this test?

      • Yes, recovery plans and recovery objectives are documented.
      • Yes, key technical and business resources have time to commit to testing exercises.
      • Yes, technology is currently able to support proposed tests.

      3. Is it easy to do?

      • Yes, effort required to complete the test is low (i.e. minimal work, few participants).
      • Yes, the risks related to testing are low.
      • Yes, it won’t cost much.

      Info-Tech Insight

      More complex, challenging, risky, or costly tests, such as full failover tests, can deliver value. But do the high-value, low-effort stuff first!

      03 Brainstorm and prioritize test ideas

      30-60 minutes

      Even if you have an idea of what you need to test and how you want to run those tests, this brainstorming exercise can generate useful ideas for testing that might otherwise have been missed.

        1. Review the slides above to develop ideas on how and what you want to test. These slides may be enough to kickstart a brainstorming process. Don’t debate or discount ideas at this point. Write down these ideas in a space where all participants can see them (e.g. whiteboard or shared screen).

      The next steps will help you prioritize the list – if needed – to tests that are highest value and lowest effort.

      1. Discuss where you have the greatest need to test. Assign a score of 0 – 3 for each test, with a score of 3 being high-need and a score of zero being low-need. Consider whether:
        • These applications have a low tolerance for downtime.
        • There’s a high chance of an outage, or recent experience with an outage.
        • There’s a need to train or cross-train staff on recovery for the system(s) in question.
        • Major changes require a review or validation of DR capabilities.
        • Audit requirements or customer/executive demands can be met via testing.
      2. Discuss which tests will require the least effort to complete – where readiness is high and tests are easier to do. Assign a score between 0 and 3 for each test, with a score of 3 being least effort and a score of 0 being high effort. Consider whether:
        • Recovery plans and recovery objectives are documented for these systems.
        • Technical experts are available to work on testing exercises.
        • For active testing, standby/sandbox systems are available and capable of supporting proposed tests.
        • The effort required to complete the test is low (e.g. minimal new work, few participants).
        • The risks related to testing are low.
        • You will need to secure additional funding.
      3. Sum together the assigned scores for each test. Higher scores should be the highest priority, but of course use your judgement to validate the results and select one or two tests to execute in the coming year.

      “There are different levels of testing and it is very progressive. I do not recommend my clients to do anything, unless they do it in a progressive fashion. Don’t try to do a live failover test with your users, right out of the box.”

      – Steve Tower
      Principal Consultant
      Prompta Consulting Group

      Input

      • Organizational and technical context

      Output

      • Prioritize list of DR testing ideas

      Participants

      • DR sponsor
      • Test coordinator

      04 Build a test plan

      3-5 days

      Building a test plan helps the test run smoothly and can uncover issues with the underlying DRP as you dig into the details.

      The test coordinator will own the plan document but will rely on the sponsor to confirm scope and goals, technical SMEs to develop system recovery plans, and business liaisons to create UAT scripts.

      Download Info-Tech’s Disaster Recovery Test Plan Template. Use the structure of the template to build your own document, deleting example data as you go. Consider saving a separate copy of this document as an example and working from a second copy.

      Key sections of the document include:

      • Goals, scenario, and scope of the test.
      • Assumptions, constraints, risks, and mitigation strategies.
      • Test participants.
      • Key pre-test milestones, and test-day schedule.
      • After-action review.

      Download the Disaster Recovery Test Plan Template

      Input

      • Scope
      • High-level goals

      Output

      • Test plan, including goals, scope, key milestones, risks and mitigations, and test-day schedule

      Participants

      • Test coordinator develops the plan with support from:
        • Technical SMEs
        • Business liaisons
        • DR sponsor

      05 Run an after-action review

      30-60 minutes

      Take time after test exercises – especially large-scale tests with many participants – to consider what went well, what didn’t, and where you can improve future testing exercises. Track lessons learned and next steps at the bottom of your test plan.

      1. Start with a short (5-10 minute) debrief of the test and allow participants to ask questions. Confirm:
        • Did we meet the goals we set for the exercise, including RTOs and RPOs?
        • What was done well? What issues, gaps, and risks were identified?
      2. Work through variations of the following questions:
        • Was the test plan effective, and was the test well organized?
        • Was the documentation effective? Where did we follow the plan as documented, and where did we deviate from the plan?
        • Was our communication/collaboration during the test effective?
        • Have gaps and issues found during the test been reported to the testing coordinator? Could some of the issues uncovered apply more broadly to other IT services as well?
        • What could we test next, based on what was discovered?
        • Are there other tools or approaches that could be useful?

      Input

      • Insights and experience from a recent testing exercise

      Output

      • Identified gaps and risks, and action items to address them
      • Ideas to improve future test exercises

      Participants

      • Test coordinator develops the plan with support from:
        • Test coordinator
        • Test participants

      Follow a testing cycle

      All tests are expected to drive actions to improve resilience, as appropriate. Experience from previous tests will be applied to future testing exercises.

      The testing cycle: 1. Plan a test, 2. Run test, 3. Take action.

      Use your experience to simplify testing

      The fifth testing exercise should be easier than the first

      Outputs and lessons learned from testing should help you run future tests.

      • With past experience under their belt, participants should have a better understanding of their role, and of their peers’ roles, and the goal of the exercise.
      • Facilitators will be more comfortable facilitating the exercise, and everyone should be more confident in the steps required to recover their systems.
      • Gather feedback from participants through after-action reviews to identify what worked and what didn’t.
      • Documentation from previous tests can provide a template for future tests.
      • Gaps identified in previous tests can provide ideas for future tests.

      Experience, lessons learned, improved process, new test targets, repeat.

      Info-Tech Insight

      Testing should get easier over time. But if you’re easily passing every test, it’s a sign that you’re ready to run more challenging tests.

      06 Create a test program summary

      2-4 hours

      Regular testing allows you to build on prior tests and helps keep plans current despite changes to your environment.

      Keeping a regular testing schedule requires expertise, a process to coordinate your efforts, and a level of governance to provide oversight and ensure testing continues to deliver value. Create a call to action using Info-Tech’s Disaster Recovery Testing Program Summary Template.

      The result is a summary document that:

      • Identifies key takeaways and testing goals
      • Presents key elements of the testing program
      • Outlines the testing cycle
      • Lists expected milestones for the next year
      • Identifies participants
      • Recommends next steps

      “It is extremely important in the early stages of development to concentrate the focus on actual recoverability and data protection, enhancing these capabilities over time into a fully matured program that can truly test the recovery, and not simply focusing on the testing process itself.”

      – Joe Starzyk
      Senior Business Development Executive
      IBM Global Services

      Research Contributors and Experts

      • Bernard A. Jones, Business Continuity & Disaster Recovery Expert
      • Robert Nardella, IT Service Management, Certified z/OS Mainframe Professional
      • Larry Liss, Chief Technology Officer, Blank Rome LLP
      • Jennifer Goshorn, Chief Administrative and Chief Compliance Officer, Gunderson Dettmer LLP
      • Paul Kirvan, FBCI, CISA, Independent IT Consultant/Auditor, Paul Kirvan Associates
      • Steve Tower, Principal Consultant, Prompta Consulting Group
      • Joe Starzyk, Senior Business Development Executive, IBM Global Services
      • Thomas Bronack, Enterprise Resiliency and Corporate Certification Consultant, DCAG
      • Paul S. Randal, CEO & Owner, SQLskills.com
      • Tom Baumgartner, Disaster Recovery Analyst, Catholic Health

      Bibliography

      Alton, Yoni. “Ransomware simulators – reality or a bluff?” Palo Alto Blog, 2 May 2022. Accessed 31 Jan 2023.
      https://www.paloaltonetworks.com/blog/security-operations/ransomware-simulators-reality-or-a-bluff/

      Brathwaite, Shimon. “How to Test your Business Continuity and Disaster Recovery Plan,” Security Made Simple, 13 Nov 2022. Accessed 31 Jan 2023.
      https://www.securitymadesimple.org/cybersecurity-blog/how-to-test-your-business-continuity-and-disaster-recovery-plan

      The Business Continuity Institute. Good Practice Guidelines: 2018 Edition. The Business Continuity Institute, 2017.

      Emigh, Jacqueline. “Disaster Recovery Testing: Ensuring Your DR Plan Works,” Enterprise Storage Forum, 28 May 2019. Accessed 31 Jan 2023.
      Disaster Recovery Testing: Ensuring Your DR Plan Works | Enterprise Storage Forum

      Gardner, Dana. "Case Study: Strategic Approach to Disaster Recovery and Data Lifecycle Management Pays off for Australia's SAI Global." ZDNet. BriefingsDirect, 26 Apr 2012. Accessed 31 Jan 2023.
      http://www.zdnet.com/article/case-study-strategic-approach-to-disaster-recovery-and-data-lifecycle-management-pays-off-for-australias-sai-global/.

      IBM. “Section 11. Testing the Disaster Recovery Plan.” IBM, 2 Aug 2021. Accessed 31 Jan 2023. Section 11. Testing the disaster recovery plan - IBM Documentation Lutkevich, Ben and Alexander Gillis. “Chaos Engineering”. TechTarget, Jun 2021. Accessed 31 Jan 2023.
      https://www.techtarget.com/searchitoperations/definition/chaos-engineering

      Monperrus, Martin. “Principles of Antifragility.” Arxiv Forum, 7 June 2017. Accessed 31 Jan 2023.
      https://arxiv.org/ftp/arxiv/papers/1404/1404.3056.pdf

      “Principles of Chaos Engineering.” Principles of Chaos Engineering, 2019 March. Accessed 31 Jan 2023.
      https://principlesofchaos.org/

      Sloss, Benjamin Treynor. “Introduction.” Site Reliability Engineering. Ed. Betsy Beyer. O’Reilly Media, 2017. Accessed 31 Jan 2023.
      https://sre.google/sre-book/introduction/

      Develop a Project Portfolio Management Strategy

      • Buy Link or Shortcode: {j2store}331|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $111,064 Average $ Saved
      • member rating average days saved: 33 Average Days Saved
      • Parent Category Name: Project Management Office
      • Parent Category Link: /project-management-office
      • As an IT leader, you oversee a project environment in which the organizational demand for new products, services, and enhancements far outweighs IT’s resource capacity to adequately deliver on everything.
      • As a result, project throughput suffers. IT starts a lot of projects, but has constant difficulties delivering the bulk of them on time, on budget, in scope, and of high quality. What’s more, many of the projects that consume IT’s time are of questionable value to the business.
      • You need a project portfolio management (PPM) strategy to help bring order to IT’s project activity. With the right PPM strategy, you can ensure that you’re driving the throughput of the best projects and maximizing stakeholder satisfaction with IT.

      Our Advice

      Critical Insight

      • IT leaders commonly conflate PPM and project management, falsely believing that they already have a PPM strategy via their project management playbook. While the tactical focus of project management can help ensure that individual projects are effectively planned, executed, and closed, it is no supplement for the insight into “the big picture” that a PPM strategy can provide.
      • Many organizations falter at PPM by mistaking a set of processes for a strategy. While processes are no doubt important, without an end in mind – such as that provided by a deliberate strategy – they inevitably devolve into inertia or confusion.
      • Executive layer buy-in is a critical prerequisite for the success of a PPM strategy. Without it, any efforts to reconcile supply and demand, and improve the strategic value of IT’s project activity, could be quashed by irresponsible, non-compliant stakeholders.

      Impact and Result

      • Manage the portfolio as more than just the sum of its parts. Create a coherent strategy to maximize the sum of values that projects deliver as a whole – as a project portfolio, rather than a collection of individual projects.
      • Get to value early. Info-Tech’s methodology tackles one of PPM’s most pressing challenges upfront by helping you to articulate a strategy and get executive buy-in for it before you define your process goals. When senior management understands why a PPM strategy is necessary and of value to them, the path to implementation is much more stable.
      • Create PPM processes you can sustain. Translate your PPM strategy into specific, tangible near-term and long-term goals, which are realized through a suite of project portfolio management processes tailored to your organization and its culture.

      Develop a Project Portfolio Management Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop a project portfolio management strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Develop a Project Portfolio Management Strategy – Executive Brief
      • Develop a Project Portfolio Management Strategy – Phases 1-3

      1. Get executive buy-in for your PPM strategy

      Choose the right PPM strategy for your organization and get executive buy-in before you start to set PPM process goals.

      • Develop a Project Portfolio Management Strategy – Phase 1: Get Executive Buy-In for Your PPM Strategy
      • PPM High-Level Supply-Demand Calculator
      • PPM Strategic Plan Template
      • PPM Strategy-Process Goals Translation Matrix Template

      2. Align PPM processes to your strategic goals

      Use the advice and tools in this phase to align the PPM processes that make up the infrastructure around projects with your new PPM strategy.

      • Develop a Project Portfolio Management Strategy – Phase 2: Align PPM Processes to Your Strategic Goals
      • PPM Strategy Development Tool

      3. Complete your PPM strategic plan

      Refine your PPM strategic plan with inputs from the previous phases by adding a cost-benefit analysis and PPM tool recommendation.

      • Develop a Project Portfolio Management Strategy – Phase 3: Complete Your PPM Strategic Plan
      • Project Portfolio Analyst / PMO Analyst
      [infographic]

      Workshop: Develop a Project Portfolio Management Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Get Executive Buy-In for Your PPM Strategy

      The Purpose

      Choose the right PPM strategy for your organization and ensure executive buy-in.

      Set process goals to address PPM strategic expectations and steer the PPM strategic plan.

      Key Benefits Achieved

      A right-sized PPM strategy complete with executive buy-in for it.

      A prioritized list of PPM process goals.

      Activities

      1.1 Assess leadership mandate.

      1.2 Determine potential resource capacity.

      1.3 Create a project inventory.

      1.4 Prepare to communicate your PPM strategy to key stakeholders.

      1.5 Translate each strategic goal into process goals.

      1.6 Set metrics and preliminary targets for PPM process goals.

      Outputs

      Choice of PPM strategy and the leadership mandate

      Analysis of current project capacity

      Analysis of current project demand

      PPM Strategic Plan – Executive Brief

      PPM strategy-aligned process goals

      Metrics and long-term targets for PPM process goals

      2 Align PPM Processes to Your Strategic Goals

      The Purpose

      Examine your current-state PPM processes and create a high-level description of the target-state process for each of the five PPM processes within Info-Tech’s PPM framework.

      Build a sound business case for implementing the new PPM strategy by documenting roles and responsibilities for key PPM activities as well as the time costs associated with them.

      Key Benefits Achieved

      Near-term and long-term goals as well as an organizationally specific wireframe for your PPM processes.

      Time cost assumptions for your proposed processes to ensure sustainability.

      Activities

      2.1 Develop and refine the project intake, prioritization, and approval process.

      2.2 Develop and refine the resource management process.

      2.3 Develop and refine the portfolio reporting process.

      2.4 Develop and refine the project closure process

      2.5 Develop and refine the benefits realization process.

      Outputs

      Process capability level

      Current-state PPM process description

      Retrospective examination of the current-state PPM process

      Action items to achieve the target states

      Time cost of the process at current and target states

      3 Complete Your PPM Strategic Plan

      The Purpose

      Perform a PPM tool analysis in order to determine the right tool to support your processes.

      Estimate the total cost-in-use of managing the project portfolio, as well as the estimated benefits of an optimized PPM strategy.

      Key Benefits Achieved

      A right-sized tool selection to help support your PPM strategy.

      A PPM strategy cost-benefit analysis.

      Activities

      3.1 Right-size the PPM tools for your processes.

      3.2 Conduct a cost-benefit analysis of implementing the new PPM strategy.

      3.3 Define roles and responsibilities for the new processes.

      3.4 Refine and consolidate the near-term action items into a cohesive plan.

      Outputs

      Recommendation for a PPM tool

      Cost-benefit analysis

      Roles and responsibilities matrix for each PPM process

      An implementation timeline for your PPM strategy

      Further reading

      Develop a Project Portfolio Management Strategy

      Drive IT project throughput by throttling resource capacity.

      Analyst Perspective

      “Tactics without strategy is the noise before defeat.” – Sun Tzŭ

      "Organizations typically come to project portfolio management (PPM) with at least one of two misconceptions: (1) that PPM is synonymous with project management and (2) that a collection of PPM processes constitutes a PPM strategy.

      Both foundations are faulty: project management and PPM are separate disciplines with distinct goals and processes, and a set of processes do not comprise a strategy – they should flow from a strategy, not precede one. When built upon these foundations, the benefits of PPM go unrealized, as the means (i.e. project and portfolio processes) commonly eclipse the ends of a PPM strategy – e.g. a portfolio better aligned with business goals, improved project throughput, increased stakeholder satisfaction, and so on.

      Start with the end in mind: articulate a PPM strategy that is truly project portfolio in nature, i.e. focused on the whole portfolio and not just the individual parts. Then, let your PPM strategy guide your process goals and help to drive successful outcomes, project after project." (Barry Cousins, Senior Director of Research, PMO Practice, Info-Tech Research Group)

      Our understanding of the problem

      This Research Is Designed For:

      • CIOs who want to maximize IT’s fulfillment of both business strategic goals and operational needs.
      • CIOs who want to better manage the business and project sponsors’ expectations and satisfaction.
      • CIOs, PMO directors, and portfolio managers who want a strategy to set the best projects for the highest chance of success.

      This Research Will Help You:

      • Get C-level buy-in on a strategy for managing the project portfolio and clarify their expectations on how it should be managed.
      • Draft strategy-aligned, high-level project portfolio management process description.
      • Put together a strategic plan for improving PPM processes to reclaim wasted project capacity and increase business satisfaction of IT.

      This Research Will Also Assist:

      • Steering committee and C-suite management who want to maximize IT’s value to business.
      • Project sponsors who seek clarity and fairness on pushing their projects through a myriad of priorities and objectives.
      • CIOs, PMO directors, and portfolio managers who want to enable data-driven decisions from the portfolio owners.

      This Research Will Help Them:

      • Optimize IT’s added value to the business through project delivery.
      • Provide clarity on how IT’s project portfolio should be managed and the expectations for its management.
      • Improve project portfolio visibility by making trustworthy project portfolio data available, with which to steer the portfolio.

      Executive Summary

      Situation

      • As CIO, there are too many projects and not enough resource capacity to deliver projects on time, on budget, and in scope with high quality.
      • Prioritizing projects against one another is difficult in the face of conflicting priorities and agenda; therefore, projects with dubious value/benefits consume resource capacity.

      Complication

      • Not all IT projects carry a direct value to business; IT is accountable for keeping the lights on and it consumes a significant amount of resources.
      • Business and project sponsors approve projects without considering the scarcity of resource capacity and are frustrated when the projects fail to deliver or linger in the backlog.

      Resolution

      • Create a coherent strategy to maximize the total value that projects deliver as a whole portfolio, rather than a collection of individual projects.
      • Ensure that the steering committee or senior executive layer buys into the strategy by helping them understand why the said strategy is necessary, and more importantly, why the strategy is valuable to them.
      • Translate the strategic expectations to specific, tangible goals, which are realized through a suite of project portfolio management processes tailored to your organization and its culture.
      • Putting into place people, processes, and tools that are sustainable and manageable, plus a communication strategy to maintain the stakeholder buy-in.

      Info-Tech Insight

      1. Time is money; therefore, the portfolio manager is an accountant of time. It is the portfolio manager’s responsibility to provide the project portfolio owners with reliable data and close the loop on portfolio decisions.
      2. Business satisfaction is driven by delivering projects that align to and maximize business value. Use Info-Tech’s method for developing a PPM strategy and synchronize its definition of “best projects” with yours.

      Projects that deliver on strategic goals of the business is the #1 driver of business satisfaction for IT

      Info-Tech’s CIO Business Vision Survey (N=21,367) has identified a direct correlation between IT project success and overall business satisfaction with IT.

      Comparative rankings of IT services in two columns 'Reported Importance' and 'Actual Importance' with arrows showing where each service moved to in the 'Actual Importance' ranking. The highlighted move is 'Projects' from number 10 in 'Reported' to number 1 in 'Actual'. 'Reported' rankings from 1 to 12 are 'Network Infrastructure', 'Service Desk', 'Business Applications', 'Data Quality', Devices', 'Analytical Capability', 'Client-Facing Technology', 'Work Orders', 'Innovation Leadership', 'Projects', 'IT Policies', and 'Requirements Gathering'. 'Actual' rankings from 1 to 12 are 'Projects', 'Work Orders', 'Innovation Leadership', 'Business Applications', 'Requirements Gathering', 'Service Desk', 'Client-Facing Technology', 'Network Infrastructure', 'Analytical Capability', 'Data Quality', 'IT Policies', and 'Devices'.

      Reported Importance: Initially, when CIOs were asked to rank the importance of IT services, respondents ranked “projects” low on the list – 10 out of a possible 12.

      Actual Importance: Despite this low “reported importance,” of those organizations that were “satisfied” to “fully satisfied” with IT, the service that had the strongest correlation to high business satisfaction was “projects,” i.e. IT’s ability to help plan, support, and execute projects and initiatives that help the business achieve its strategic goals.

      On average, executives perceive IT as being poorly aligned with business strategy

      Info-Tech’s CIO Business Vision Survey data highlights the importance of IT projects in supporting the business achieve its strategic goals. However, Info-Tech’s CEO-CIO Alignment Survey (N=124) data indicates that CEOs perceive IT to be poorly aligned to business’ strategic goals:

      • 43% of CEOs believe that business goals are going unsupported by IT.
      • 60% of CEOs believe that improvement is required around IT’s understanding of business goals.
      • 80% of CIOs/CEOs are misaligned on the target role for IT.
      • 30% of business stakeholders* are supporters of their IT departments.
      • (Source: Info-Tech CIO/CEO Alignment Diagnostics, * N=32,536)

      Efforts to deliver on projects are largely hampered by causes of project failure outside a project manager’s control

      The most recent data from the Project Management Institute (PMI) shows that more projects are meeting their original goals and business intent and less projects are being deemed failures. However, at the same time, more projects are experiencing scope creep. Scope creeps result in schedule and cost overrun, which result in dissatisfied project sponsors, stakeholders, and project workers.

      Graph of data from Project Management Institute comparing projects from 2015 to 2017 that 'Met original goals/business intent', 'Experienced scope creep', and were 'Deemed failures'. Projects from the first two categories went up in 2017, while projects that were deemed failures went down.

      Meanwhile, the primary causes of project failures remain largely unchanged. Interestingly, most of these primary causes can be traced to sources outside of a project manager’s control, either entirely or in part. As a result, project management tactics and processes are limited in adequately addressing them.

      Relative rank

      Primary cause of project failure

      2015

      2016

      2017

      Trend

      Change in organization's priorities 1st 1st 1st Stable
      Inaccurate requirements gathering 2nd 3rd 2nd Stable
      Change in project objectives 3rd 2nd 3rd Stable
      Inadequate vision/goal for project 6th 5th 4th Rising
      Inadequate/poor communication 5th 7th 5th Stable
      Poor change management 11th 9th 6th Rising
      (Source: Project Management Institute, Pulse of the Profession, 2015-2017)

      Project portfolio management (PPM) can improve business alignment of projects and reduce chance of project failure

      PPM is about “doing the right things.”

      The PMI describes PPM as:

      Interrelated organizational processes by which an organization evaluates, selects, prioritizes, and allocates its limited internal resources to best accomplish organizational strategies consistent with its vision, mission, and values. (PMI, Standard for Portfolio Management, 3rd ed.)

      Selecting and prioritizing projects with the strongest alignment to business strategy goals and ensuring that resources are properly allocated to deliver them, enable IT to:

      1. Improve business satisfaction and their perception of IT’s alignment with the business.
      2. Better engage the business and the project customers.
      3. Minimize the risk of project failure due to changing organizational/ project vision, goals, and objectives.

      "In today’s competitive business environment, a portfolio management process improves the linkage between corporate strategy and the selection of the ‘right’ projects for investment. It also provides focus, helping to ensure the most efficient and effective use of available resources." (Lou Pack, PMP, Senior VP, ICF International (PMI, 2015))

      PPM is a common area of shortcomings for IT, with much room for improvement

      Info-Tech’s IT Management & Governance Survey (N=879) shows that PPM tends to be regarded as neither an effective nor an important process amongst IT organizations.

      Two deviation from median charts highlighting Portfolio Management's ranking compared to other IT processes in 'Effectiveness scores' and 'Importance scores'. PPM ranks 37th out of 45 in Effectiveness and 33rd out of 45 in Importance.

      55% ... of IT organizations believe that their PPM processes are neither effective nor important.

      21% ... of IT organizations reported having no one responsible or accountable for PPM.

      62% ... of projects in organizations effective in PPM met/exceeded the expected ROI (PMI, 2015).

      In addition to PPM’s benefits, improving PPM processes presents an opportunity for getting ahead of the curve in the industry.

      Info-Tech’s methodology for developing a PPM strategy delivers extraordinary value, fast

      Our methodology is designed to tackle your hardest challenge first to deliver the highest-value part of the deliverable. For developing a PPM strategy, the biggest challenge is to get the buy-in of the executive layer.

      "Without senior management participation, PPM doesn’t work, and the organization is likely to end up with, or return to, a squeaky-wheel-gets-the-grease mindset for all those involved." (Mark Price Perry, Business Driven Project Portfolio Management)

      In the first step of the blueprint, you will be guided through the following steps:

      1. Choose the right PPM strategy: driven by the executives, supported by management.
      2. Objectively assess your current project portfolio with minimal effort to build a case for the PPM strategy.
      3. Engage the executive layer to get the critical prerequisite of a PPM strategy: their buy-in.

      A PPM strategic plan is the end deliverable of this blueprint. In the first step, download the pre-filled template with content that represents the most common case. Then, throughout the blueprint, customize with your data.

      Use this blueprint to develop, or refine, a PPM strategy that works for your organization

      Get buy-in for PPM strategy from decision makers.

      Buy-in from the owners of project portfolio (Steering Committee, C-suite management, etc.) is a critical prerequisite for any PPM strategy. This blueprint will give you the tools and templates to help you make your case and win the buy-in of portfolio owners.

      Connect strategic expectations to PPM process goals.

      This blueprint offers a methodology to translate the broad aim of PPM to practical, tactical goals of the five core PPM processes, as well as how to measure the results. Our methodology is supported with industry-leading frameworks, best practices, and our insider research.

      Develop your PPM processes.

      This blueprint takes you through a series of steps to translate the process goals into a high-level process description, as well as a business case and a roadmap for implementing the new PPM processes.

      Refine your PPM processes.

      Our methodology is also equally as applicable for making your existing PPM processes better, and help you draft a roadmap for improvement with well-defined goals, roles, and responsibilities.

      Info-Tech’s PPM model consists of five core processes

      There are five core processes in Info-Tech’s thought model for PPM.

      Info-Tech's Process Model detailing the steps and their importance in project portfolio management. Step 3: 'Status and Progress Reporting' sits above the others as a process of importance throughout the model. In the 'Intake' phase of the model are Step 1: 'Intake, Approval, and Prioritization' and Step 2: 'Resource Management'. In the 'Execution' phase is 'Project Management', the main highlighted section, and a part of Step 3, the overarching 'Status and Progress Reporting'. In the 'Closure' phase of the model are Step 4: 'Project Closure' and Step 5: 'Benefits Tracking'.

      These processes create an infrastructure around projects, which aims to enable:

      1. Initiation of the “best” projects with the right resources and project information.
      2. Timely and trustworthy reporting to facilitate the flow of information for better decision making.
      3. Proper closure of projects, releasing resources, and managing benefits realization.

      PPM has many moving pieces. To ensure that all of these processes work in harmony, you need a PPM strategy.

      De-couple project management from PPM to break down complexity and create flexibility

      Tailor project management (PM) processes to fit your projects.

      Info-Tech’s PPM thought model enables you to manage your project portfolio independent of your PM methodology or capability. Projects interact with PPM via:

      • A project charter that authorizes the use of resources and defines project benefits.
      • Status reports that feed up-to-date, trustworthy data to your project portfolio.
      • Acceptance of deliverables that enable proper project closure and benefits reporting.

      Info-Tech’s PPM strategy is applicable whether you use Agile, waterfall, or anything in between for PM.

      The process model from the previous page but with project management processes overlaid. The 'Intake' phase is covered by 'Project Charter'. The 'Execution' phase, or 'Project Management' is covered by 'Status report'. The 'Closure' phase is covered by 'Deliverable Acceptance'.

      Learn about project management approach for small projects in Info-Tech’s Tailor PM Processes to Fit Your Projects blueprint.

      Sample of the Info-Tech blueprint 'Tailor PM Processes to Fit Your Projects'.

      Info-Tech’s approach to PPM is informed by industry best practices and rooted in practical insider research

      Info-Tech uses PMI and ISACA frameworks for areas of this research.

      Logo for 'Project Management Institute (PMI)'.' Logo for 'COBIT 5 an ISACA Framework'.
      PMI’s Standard for Portfolio Management, 3rd ed. is the leading industry framework, proving project portfolio management best practices and process guidelines. COBIT 5 is the leading framework for the governance and management of enterprise IT.

      In addition to industry-leading frameworks, our best-practice approach is enhanced by the insights and guidance from our analysts, industry experts, and our clients.

      Logo for 'Info-Tech Research Group'.

      33,000+ Our peer network of over 33,000 happy clients proves the effectiveness of our research.

      1000+ Our team conducts 1,000+ hours of primary and secondary research to ensure that our approach is enhanced by best practices.

      Re-position IT as the “facilitator of business projects” for PPM success

      CASE STUDY

      Industry: Construction
      Source: Info-Tech Client

      Chaos in the project portfolio

      At first, there were no less than 14 teams of developers, each with their own methodologies and processes. Changes to projects were not managed. Only 35% of the projects were completed on time.

      Business drives, IT facilitates

      Anyone had the right to ask for something; however, converting ideas to a formal project demand required senior leadership within a business division getting on board with the idea.

      The CIO and senior leadership decided that projects, previously assigned to IT, were to be owned and driven by the business, as the projects are undertaken to serve its needs and rarely IT’s own. The rest of the organization understood that the business, not IT, was accountable for prioritizing project work: IT was re-positioned as a facilitator of business projects. While it was a long process, the result speaks for itself: 75% of projects were now being completed on time.

      Balancing the target mix of the project portfolio

      What about maintaining and feeding the IT infrastructure? The CIO reserved 40% of IT project capacity for “keeping the lights on,” and 20% for reactive, unplanned activities, with an aim to lower this percentage. With the rest of the time, IT facilitated business projects

      Three key drivers of project priority

      1. Does the project meet the overall company goals and objectives?
        “If they don't, we must ask why we are bothering with it.”
      2. Does the project address a regulatory or compliance need?
        “Half of our business is heavily regulated. We must focus on it.”
      3. Are there significant savings to be had?
        “Not soft; hard savings. Can we demonstrate that, after implementing this, can we see good hard results? And, can we measure it?”

      "Projects are dumped on IT, and the business abdicates responsibility. Flip that over, and say ‘that's your project’ and ‘how can we help you?’"

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Develop a PPM strategy – project overview

      1. Get executive buy-in for your PPM strategy

      2. Align PPM processes to your strategic goals

      3. Complete your PPM strategic plan

      Supporting Tool icon

      Best-Practice Toolkit

      1.1 Choose the right PPM strategy for your organization

      1.2 Translate PPM strategy expectations to specific process goals

      2.1 Develop and refine project intake, prioritization, and resource management processes

      2.2 Develop and refine portfolio reporting, project closure, and benefits realization processes

      3.1 Select a right-sized PPM solution for supporting your new processes

      3.2 Finalize customizing your PPM Strategic Plan Template

      Guided Implementations

      • Scoping call: discuss current state of PPM and review strategy options.
      • How to wireframe realistic process goals, rooted in your PPM strategic expectations, that will be sustained by the organization.
      • Examine your current-state PPM process and create a high-level description of the target-state process for each of the five PPM processes (1-2 calls per each process).
      • Assess your PPM tool requirements to help support your processes.
      • Determine the costs and potential benefits of your PPM practice.
      Associated Activity icon

      Onsite Workshop

      Module 1:
      Set strategic expectations and realistic goals for the PPM strategy
      Module 2:
      Develop and refine strategy-aligned PPM processes
      Module 3:
      Compose your PPM strategic plan
      Phase 1 Outcome:
      • Analysis of the current state of PPM
      • Strategy-aligned goals and metrics for PPM processes
      Phase 2 Outcome:
      • PPM capability levels
      • High-level descriptions of near- and long-term target state
      Phase 3 Outcome:
      • PPM tool recommendations
      • Cost-benefit analysis
      • Customized PPM strategic plan

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1

      Workshop Day 2

      Workshop Day 3

      Workshop Day 4

      Workshop Day 5

      Get leadership buy-in for PPM strategy Set PPM process goals and metrics with strategic expectations Develop and Refine PPM processes Develop and Refine PPM processes Complete the PPM strategic plan

      Activities

      • 1.1 Assess leadership mandate.
      • 1.2 Determine potential resource capacity.
      • 1.3 Create a project inventory.
      • 1.4 Communicate your PPM strategy to key stakeholders.
      • 2.1 Translate each strategic goal into process goals.
      • 2.2 Set metrics and preliminary targets for PPM process goals.
      • 3.1 Develop and refine the project intake, prioritization, and approval process.
      • 3.2 Develop and refine the resource management process.
      • 4.1 Develop and refine the portfolio reporting process.
      • 4.2 Develop and refine the project closure process.
      • 4.3 Develop and refine the benefits realization process.
      • 5.1 Right-size the PPM tools for your processes.
      • 5.2 Conduct a cost-benefit analysis of implementing the new PPM strategy.
      • 5.3 Define roles and responsibilities for the new processes.

      Deliverables

      1. Choice of PPM strategy and the leadership mandate
      2. Analysis of current project capacity
      3. Analysis of current project demand
      4. PPM Strategic Plan – Executive Brief
      1. PPM strategy-aligned process goals
      2. Metrics and long-term targets for PPM process goals
        For each of the five PPM processes:
      1. Process capability level
      2. Current-state PPM process description
      3. Retrospective examination of the current-state PPM process
      4. Action items to achieve the target states
      5. Time cost of the process at current and target states
      1. Recommendation for a PPM tool
      2. Cost-benefit analysis
      3. Roles and responsibilities matrix for each PPM process

      Develop a Project Portfolio Management Strategy

      PHASE 1

      Get Executive Buy-In for Your PPM Strategy

      Phase 1 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Get executive buy-in for your PPM strategy

      Proposed Time to Completion: 2 weeks
      Step 1.1: Choose the right PPM strategy Step 1.2: Translate strategic expectations to process goals
      Start with an analyst kick-off call:
      • Scoping call to discuss the current state of PPM and review strategy options.
      Work with an analyst to:
      • Discuss how to wireframe realistic process goals, rooted in your PPM strategic expectations, that will be sustained by the organization.
      Then complete these activities…
      • Execute a leadership mandate survey.
      • Perform a high-level supply/demand analysis.
      • Prepare an executive presentation to get strategy buy-in.
      Then complete these activities…
      • Develop realistic process goals based in your PPM strategic expectations.
      • Set metrics and preliminary targets for your high-priority PPM process goals.
      With these tools & templates:
      • PPM High-Level Supply/Demand Calculator
      • PPM Strategic Plan Template
      With these tools & templates:
      • PPM Strategy-Process Translation Matrix

      Phase 1 Results & Insights

      • Executive layer buy-in is a critical prerequisite for the success of a top-down PPM strategy. Ensure your executives are onboard before proceeding to implement your PPM strategy.

      Prepare to get to value early with step 1.1 of this blueprint

      The first step of this blueprint will help you define your PPM strategy and get executive buy-in for it using section one of Info-Tech’s PPM Strategic Plan Template.

      Where traditional models of consulting can take considerable amounts of time before delivering value to clients, Info-Tech’s methodology for developing a PPM strategy gets you to value fast.

      In the first step of this blueprint, you will define your PPM strategy and prepare an executive presentation to get buy-in for the strategy. The presentation can be prepared in just a few hours.

      • The activities in step 1.1 of this blueprint will help you customize the slides in section 1 of Info-Tech’s PPM Strategic Plan Template.
      • Section one of the Template will then serve as your presentation document.

      Once you have received buy-in for your PPM strategy, the remainder of this blueprint will help you customize section 2 of the Template.

      • Section 2 of the Template will communicate:
        • Your processes and process goals.
        • Your near-term and long-term action items for implementing the strategy.
        • Your PPM tool requirements.
        • The costs and benefits of your PPM strategy.

      Download Info-Tech’s PPM Strategic Plan Template.

      Sample of Info-Tech's 'PPM Strategic Plan Template.'

      Step 1.1: Choose the right PPM strategy for your organization

      PHASE 1

      PHASE 2

      PHASE 3

      1.1 1.2 2.1 2.2 3.1 3.2
      Choose the right PPM strategy Translate strategy into process goals Define intake & resource mgmt. processes Define reporting, closure, & benefits mgmt. processes Select a right-sized PPM solution Finalize your PPM strategic plan

      This step will walk you through the following activities:

      • Perform a leadership mandate survey.
      • Choose your PPM strategy.
      • Calculate your resource capacity for projects.
      • Determine overall organizational demand for projects.
      • Prepare an executive presentation of the PPM strategy.

      This step involves the following participants:

      • CIO
      • PMO Director/Portfolio Manager
      • Project Managers
      • IT Managers

      Outcomes of this step

      • A PPM strategy
      • A resource supply/project demand analysis
      • An executive brief presentation
      • Executive buy-in for the PPM strategy

      “Too many projects, not enough resources” is the reality of most IT environments

      In today’s organizations, the desires of business units for new products and enhancements, and the appetites of senior leadership to approve more and more projects for those products and services, far outstrips IT’s ability to realistically deliver on everything.

      The vast majority of IT departments lack the resourcing to meet project demand – especially given the fact that day-to-day operational demands frequently trump project work.

      As a result, project throughput suffers – and with it, IT's reputation within the organization.

      A visualization of 'Project Demand' versus 'Resource supply' utilizing courtroom scales with numerous project titles weighing down the 'Project Demand' side and silhouettes of three little people raised aloft on the 'Resource supply' side.

      In these environments, a PPM strategy is required.

      A PPM strategy should enable executive decision makers to make sense of the excess of demand and give IT the ability to prioritize those projects that are of the most strategic value to the business.

      With the right PPM strategy, IT can improve project outcomes across its portfolio and drive business value – all while improving the workloads of IT project staff.

      Info-Tech has two PPM strategy options that you can start to deploy today

      This step will help you choose the most suitable option, depending on your project pain points and current level of executive engagement in actively steering the portfolio.

      Option A:
      Top-Down, Executive Driven Strategy

      Option B:
      Bottom-Up, Project Manager Driven Strategy

      Goals of this approach:
      • This approach is intended to assist decision makers in their job: choosing the right projects, committing to timelines for those projects, and monitoring/directing their progress.
      Goals of this approach:
      • This approach is primarily intended to ensure that projects are well managed in a standardized manner in order to provide project managers with clear direction.
      Who this approach is for:
      • IT departments looking to improve alignment of project demand and resource capacity.
      • IT departments wanting to prioritize strategically valuable work.
      • IT departments with sufficient executive backing and engagement with the portfolio.
      Who this approach is for:
      • IT departments that would not the get support for a top-down approach due to a disengaged executive layer.
      • IT departments that already have a top-down PPM strategy and feel they are sufficiently resourced to confront project demand.

      Each of these strategy options is driven by a set of specific strategic expectations to help communicate your PPM goals. See the following slides for an articulation of each strategy option.

      A top-down, executive driven strategy is the optimal route, putting leadership in a position to best conduct the portfolio

      Option A: Top-Down, Executive Driven Strategy

      Strategic Expectations:

      • Project Throughput: Maximize throughput of the best projects.
      • Portfolio Visibility: Ensure visibility of current and pending projects.
      • Portfolio Responsiveness: Make the portfolio responsive to executive steering when new projects and changing priorities need rapid action.
      • Resource Utilization: Minimize resource waste and optimize the alignment of skills to assignments.
      • Benefits Realization: Clarify accountability for post-project benefits attainment for each project, and facilitate the process of tracking/reporting those benefits.

      Info-Tech Insight

      Serve the executive with insight before you impede the projects with governance. This strategy option is where Info-Tech sees the most PPM success. A strategy focused at improving decision making at the executive layer will both improve project outcomes and help alleviate project workloads.

      A bottom-up strategy can help project managers and teams succeed where insight into the big picture is lacking

      Option B: Bottom-Up, Project Manager Driven Strategy

      Strategic Expectations:

      • Project Management Governance: All projects consuming IT resources will be continually validated in terms of best-practice process compliance.
      • Project Risk Management: Identify risks and related mitigation approaches for all high-risk areas.
      • Stakeholder Management: Ensure that project stakeholders are identified and involved.
      • Project Manager Resourcing: Provide project managers as needed.
      • Project-Level Visibility: Provide access to the details of project management processes (planning and progress) as needed.

      Info-Tech Insight

      Right-size governance to maximize success. Project management and governance success don’t necessarily equal project success. Project management processes should be a means to an end (i.e. successful project outcomes), and not an end in themselves. Ensure the ends justify the means.

      Most recurring project challenges require a top-down portfolio management approach

      While project management is a key ingredient to project success, tying to solve endemic project problems with project management alone won’t improve results over the long term.

      Why Top-Down is a better starting point than Bottom-Up.

      The most common IT project problems – schedule and budget overruns, scope creep, and poor quality – can ultimately, in the vast majority of cases, be traced back to bad decisions made at the portfolio level:

      • The wrong projects get greenlighted.
      • Shifting leadership priorities and operational demands make project plans and estimated delivery dates obsolete from the start.
      • Too many projects get approved when there are not enough resources to effectively work on them all.

      No amount of project management rigor can help alleviate these common root causes of project failure.

      With a top-down PPM strategy, however, you can make sure that leadership is informed and engaged in making the right project decisions and that project managers and teams are situated for success.

      "There is nothing so useless as doing efficiently that which should not be done at all." (Peter Drucker (quoted in Lessing))

      Info-Tech Insight

      Get Strategic About Project Success.

      The difference between project management and project portfolio management comes down to doing things right vs. doing the right things. Both are important, no doubt; but doing the wrong things well doesn’t provide much value to the business in the long run.

      Get insight into the big picture with a top-down strategy before imposing more administrative overhead on project managers and leads.

      Perform a leadership mandate assessment to gauge executive needs and expectations

      Associated Activity icon 1.1.1 – 15 to 30 minutes (prep time) 10 to 20 minutes (execution time)

      INPUT: Leadership expectations for portfolio and project management.

      OUTPUT: Leadership mandate bar chart

      Materials: Tab 6 of Info-Tech’s PPM High-Level Supply-Demand Calculator

      Participants: Portfolio manager (or equivalent), PPM strategy sponsor(s), CIO and other members of senior management

      Before choosing your strategy option, survey the organization’s leadership to assess what they’re expecting from the PPM strategy.

      Use the “Leadership Mandate Survey” (located on tab 6 of Info-Tech’s PPM High-Level Supply-Demand Calculator) to assess the degree to which your leadership expects the PPM strategy to provide outcomes across the following capabilities: portfolio reporting, project governance, and project management.

      • Deploy the 12-question survey via individual one-on-one meetings or group working sessions with your boss (the PPM strategy sponsor) as well as with the CIO and other senior managers from within IT and the business.
        • If you cannot connect with the executive layer for this survey, do your best to estimate their responses to complete the survey.
      • The survey should help distinguish if executives are looking for portfolio management or project management. It should be one input that informs your choice of strategy option A or B.
        • If leadership is looking primarily for project management, you should proceed to Info-Tech’s Tailor Project Management Processes that Fit Your Projects blueprint.

      Refer to the next slide for assistance analyzing the outputs in tab 6 and using them to inform your choice of strategy.

      How to make use of the results of the leadership survey

      Two possible result scenarios of the leadership survey. There are two bar graphs titled 'Leadership Mandate', each with an explanation of the scenario they belong to. In Scenario 1, the 'Leadership Mandate' graph has a descending trend with 'Portfolio Reporting' at the highest level, 'Project Governance' in the middle, and 'Project Management' at the lowest level. 'A result like this, with a higher portfolio reporting score, shows a higher need for a top-down approach and demonstrates well-balanced expectations for a PPM strategy from the leadership. There is greater emphasis put on the portfolio than there is project governance or project management.' In Scenario 2, the 'Leadership Mandate' graph has an ascending trend with 'Portfolio Reporting' at the lowest level, 'Project Governance' in the middle, and 'Project Management' at the highest level. 'If your graph looks like this, your executive leadership has placed greater importance on project governance and management. Completing a top-down PPM strategy may not meet their expectations at this time. In this situation, a bottom-up approach may be more applicable.'

      Customize Info-Tech’s PPM Strategic Plan Template. Insert screenshots of the survey and the bar graph from tab 6 of the PPM High-Level Supply-Demand Calculator onto slides 7 and 8, “PPM Strategy Leadership Mandate,” of the PPM Strategic Plan Template.

      Proceed with the right PPM strategy for your organization

      Based upon the results of the “Leadership Mandate Survey,” and your assessment of each strategy option as described in the previous slides, choose the strategy option that is right for your IT department/PMO at this time.

      "Without a strategic methodology, project portfolio planning is frustrating and has little chance of achieving exceptional business success." (G Wahl (quoted in Merkhofer))

      Option A:

      Those proceeding with Option A should continue with remainder of this blueprint. Update your strategy statement on slide 3 of your PPM Strategic Plan Template to reflect your choice

      Option B:

      Those proceeding with Option B should exit this blueprint and refer to Info-Tech’s Tailor Project Management Processes to Fit Your Projects blueprint to help define a project management standard operating procedure.

      Customize Info-Tech’s PPM Strategic Plan Template. If you’re proceeding with Option A, update slide 4, “Project Portfolio Management Strategy,” of your PPM Strategic Plan Template to reflect your choice of PPM strategy. If you’re proceeding with Option B, you may want to include your strategy statement in your Project Management SOP Template.

      The success of your top-down strategy will hinge on the quality of your capacity awareness and resource utilization

      A PPM strategy should facilitate alignment between project demand with resource supply. Use Info-Tech’s PPM High-Level Supply/Demand Calculator as a step towards this alignment.

      Info-Tech’s research shows that the ability to provide a centralized view of IT’s capacity for projects is one of the top PPM capabilities that contributes to overall project success.

      Accurate and reliable forecasts into IT’s capacity, coupled with an engaged executive layer making project approval and prioritization decisions based upon that capacity data, is the hallmark of an effective top-down PPM strategy.

      • Use Info-Tech’s PPM High-Level Supply/Demand Calculator to help improve visibility (and with it, organizational understanding) into project demand and IT resource supply.
      • The Calculator will help you determine IT’s actual capacity for projects and analyze organizational demand by taking an inventory of active and backlog projects.

      Download Info-Tech’s PPM High-Level Supply/Demand Calculator.

      Sample of Into-Tech's PPM High-Level Supply/Demand Calculator.

      Info-Tech Insight

      Where does the time go? The portfolio manager (or equivalent) should function as the accounting department for time, showing what’s available in IT’s human resources budget for projects and providing ongoing visibility into how that budget of time is being spent.

      Establish the total resource capacity of your portfolio

      Associated Activity icon 1.1.2 – 30 to 60 minutes

      INPUT: Staff resource types, Average work week, Estimated allocations

      OUTPUT: Breakdown of annual portfolio HR spend, Capacity pie chart

      Materials: PPM High-Level Supply/Demand Calculator, tab 3

      Participants: Portfolio manager (or equivalent), Resource and/or project managers

      Use tab 3 of the calculator to determine your actual HR portfolio budget for projects, relative to the organization’s non-project demands.

      • Tab 3 analyzes your resource supply asks you to consider how your staff spend their time weekly across four categories: out of office time, administrative time (e.g. meetings, training, checking email), keep-the-lights-on time (i.e. support and maintenance), and project time.
      • The screenshot below walks you through columns B to E of tab 3, which help calculate your potential capacity. This activity will continue on the next slide, where we will determine your realized capacity for project work from this potential capacity.
      Screenshot of tab 3 in the PPM High-Level Supply/Demand Calculator. It has 4 columns, 'Resource Type', '# People', 'Hours / Week', and 'Hours / Year', which are referred to in notes as columns B through E respectively. The note on 'Resource Type' reads '1. Compile a list of each of the roles within your department in column B'. The note on '# People' reads '2. In column C, provide the number of staff currently performing each role'. The note on 'Hours / Week' reads '3. In column D, provide a baseline for the number of hours in a typical work week for each role'. The note on 'Hours / Year' reads '4. Column E will auto-populate based on E and D. The total at the bottom of column E (row 26) constitutes your department’s total capacity'.

      Determine the project/non-project ratio for each role

      Associated Activity icon 1.1.2 (continued)

      The previous slide walked you through columns B to E of tab 3. This slide walks you through columns F to J, which ask you to consider how your potential capacity is spent.

      Screenshot of tab 3 in the PPM High-Level Supply/Demand Calculator. It has 6 columns, 'Hours / Year', 'Absence', 'Working Time / Year', 'Admin', 'KTLO', and 'Project Work', which, starting at 'Absence', are referred to in notes as columns F through J respectively. The note on 'Absence' reads '5. Enter the percentage of your total time across each role that is unavailable due to foreseeable out-of-office time (vacation, sick time, etc.) in column F. Industry standard runs anywhere from 12% to 16%, depending on your industry and geographical region'. The note on 'Working Time / Year' reads '6. Column G will auto-calculate to show your overall net capacity after out-of-office percentages have been taken off the top. These totals constitute your working time for the year'. The note on 'Admin' and 'KTLO' reads '6. Column G will auto-calculate to show your overall net capacity after out-of-office percentages have been taken off the top. These totals constitute your working time for the year'. The note on 'Project Work' reads '8. The project percentage in column J will auto-calculate based upon what’s leftover after your non-project working time allocations in columns H and I have been subtracted'.

      Review your annual portfolio capacity for projects

      Associated Activity icon 1.1.2 (continued)

      The previous slides walked you through the inputs for tab “3. Project Capacity.” This slide walks you through the outputs of the tab.

      Based upon the inputs from columns B to J, the rest of tab 3 analyzes how IT available time is spent across the time categories, highlighting how much of IT’s capacity is actually available for projects after admin work, support and maintenance work, and absences have been taken into account.

      A table and pie chart of output data from Tab 3 of the PPM High-Level Supply/Demand Calculator. Pie segments are labelled 'Admin', 'Absence', 'Project Capacity', and 'Keep The Lights On'.

      Customize Info-Tech’s PPM Strategic Plan Template. Update slide 10, “Current Project Capacity,” of your PPM Strategic Plan Template to include the outputs from tab 3 of the Calculator.

      Create an inventory of active and backlog projects to help gauge overall project demand

      Associated Activity icon 1.1.3 – 15 to 30 minutes

      INPUT: Number of active and backlog projects across different sizes

      OUTPUT: Total project demand in estimated hours of work effort

      Materials: PPM High-Level Supply/Demand Calculator, tab 4

      Participants: Portfolio manager (or equivalent), Project managers

      Where tab 3 of the Calculator gave you visibility into your overall resource supply for projects, tab 4 will help you establish insight into the demand side.

      • Before starting on tab 4, be sure to enter the required project size data on the set-up tab.
      • Using a list of current active projects, categorize the items on the list by size: small, medium, large, and extra large. Enter the number of projects in each category of project in column C of tab 4.
      • Using a list of on-hold projects, or projects that have been approved but not started, categorize the list by size and enter the number of projects in each category in column D.
      • In column E, estimate the number of new requests and projects across each size that you anticipate being added to the portfolio/backlog in the next 12 months. Use historical data from the past 12 to 24 months to inform your estimates.
      • In column F, estimate the number of projects that you anticipate being completed in each size category in the next 12 months. Take the current state of active projects into account as you make your estimates, as well as throughput data from the previous 12 to 24 months.
      Screenshot of tab 4 in the PPM High-Level Supply/Demand Calculator. It has 5 columns labelled 'Project Types' with values Small to Extra-Large, 'Number of active projects currently in the portfolio', 'Number of projects currently in the portfolio backlog', 'Number of new requests anticipated to be added to the portfolio/backlog in the next 12 months', and 'Number of projects expected to be delivered within the next 12 months'.

      Make supply and demand part of the conversation as you get buy-in for your top-down strategy

      Tab 5 of the Calculator is an output tab, visualizing the alignment (or lack thereof) of project demand and resource supply.

      Once tabs 3 and 4 are complete, use tab 5 to analyze the supply/demand data to help build your case for a top-down PPM strategy and get buy-in for it.

      Screenshots of Tab 5 in the PPM High-Level Supply/Demand Calculator. A bar chart obscures a table with the note 'The bar chart shows your estimated total project demand in person hours (in black) relative to your estimated total resource capacity for projects (in green)'. Notes on the table are 'The table below the bar chart shows your estimated annual project throughput rate (based upon the number of projects you estimated you would complete this year) as well as the rate at which portfolio demand will grow (based upon the number of new requests and projects you estimated for the next 12 months)' and 'If the “Total Estimated Project Demand (in hours) in 12 Months Time” number is more than your current demand levels, then you have a supply-demand problem that your PPM strategy will need to address'.

      Customize Info-Tech’s PPM Strategic Plan Template. Update slides 11 and 12, “Current Project Demand,” of your PPM Strategic Plan Template to include the outputs from tabs 4 and 5 of the Calculator.

      Recommended: Complete Info-Tech’s PPM Current State Scorecard to measure your resource utilization

      Associated Activity icon Contact your rep or call 1-888-670-8889

      This step is highly recommended but not required. Call 1-888-670-8889 to inquire about or request the PPM Diagnostics.

      Info-Tech’s PPM Current State Scorecard diagnostic provides a comprehensive view of your portfolio management strengths and weaknesses, including project portfolio management, project management, customer management, and resource utilization.

      Screenshots of Info-Tech's PPM Current State Scorecard diagnostic with a pie chart obscuring a table/key. The attached note reads 'In particular, the analysis of resource utilization in the PPM Current State Scorecard report, will help to complement the supply/demand analysis in the previous slides. The diagnostic will help you to analyze how, within that percentage of your overall capacity that is available for project work, your staff productively utilizes this time to successfully complete project tasks and how much of this time is lost within Info-Tech’s categories of resource waste.'

      Customize Info-Tech’s PPM Strategic Plan Template. Update slides 14 and 15, “Current State Resource Utilization” of your PPM Strategic Plan Template to include the resource utilization outputs from your PPM Current State Scorecard.

      Finalize section one of the PPM Strategic Plan Template and prepare to communicate your strategy

      Associated Activity icon 1.1.4 – 10 to 30 minutes

      INPUT: The previous activities from this step

      OUTPUT: An presentation communication your PPM strategy

      Materials: PPM Strategic Plan Template, section 1

      Participants: Portfolio manager (or equivalent)

      By now, you should be ready to complete section one of the PPM Strategic Plan Template.

      The purpose of this section of the Template is to capture the outputs of this step and use them to communicate the value of a top-down PPM strategy and to get buy-in for this strategy from senior management before you move forward to develop your PPM processes in the subsequent phases of this blueprint.

      • Within section one, update any of the text that is (in grey) to reflect the specifics of your organization – i.e. the name of your organization and department – and the specific outcomes of step 1.2 activities. In addition, replace the placeholders for a company logo with the logo of your company.
      • Replace the tool screenshots with the outputs from your version of the PPM High-Level Supply/Demand Calculator.
      • Proofread all of the text to ensure the content accurately reflects your outcomes. Edit the content as needed to more accurately reflect your outcomes.
      • Determine the audience for the presentation of your PPM strategy and make a logistical arrangement. Include PPM strategy sponsors, senior management from within IT and the business, and other important stakeholders.

      Get executive buy-in for your top-down PPM strategy

      Executive layer buy-in is a critical prerequisite for the success of a top-down PPM strategy. Ensure your executives are on board before preceding.

      You’re now ready to communicate your PPM strategy to your leadership team and other stakeholders.

      It is essential that you get preliminary buy-in for this strategy from the executive layer before you move forward to develop your PPM processes in the subsequent phases of this blueprint. Lack of executive engagement is one of the top barriers to PPM strategy success.

      • If you have gone through the preceding activities in this step, section one of your PPM Strategic Plan Template should now be ready to present.
      • As explained in 1.1.4, you should present this section to an audience of PPM strategy sponsors, C-suite executives, and other members of the senior management team.
      • Allow at least 60 minutes for the presentation – around 20 minutes to deliver the slide presentation and 40 minutes for discussion.
      • If you get sufficient buy-in by the end of the presentation, proceed to the next step of this blueprint. If buy-in is lacking, now might not be the right time for a top-down PPM strategy. Think about adopting a bottom-up approach until leadership is more engaged in the portfolio.

      "Gaining executive sponsorship early is key…It is important for the executives in your organization to understand that the PPM initiatives and the PMO organization are there to support (but never hinder) executive decision making." (KeyedIn Projects)

      Info-Tech Best Practice

      Engage(d) sponsorship. According to Prosci, the top factor in contributing to the success of a change initiative is active and visible executive sponsorship. Use this meeting to communicate to your sponsor(s) the importance of their involvement in championing the PPM strategy.

      A PPM strategic plan elevates PMO’s status to a business strategic partner

      CASE STUDY

      Industry: Public Administration
      Source: IAG / Info-Tech Interview

      Challenge

      The PMO operated in a way that is, in their self-assessment, reactive; project requests and capacity were not effectively managed. Perhaps due to this, the leadership team was not always visible, or regularly available, to PM leaders. This, in turn, complicated efforts to effectively manage their projects.

      Solution

      Establishing a simple prioritization methodology enabled the senior leadership to engage and effectively steer the project portfolio by strategic importance. The criteria and tool also gave the business units a clear understanding to promote the strategic value of each of their project requests.

      Results

      PM leaders now have the support and confidence of the senior leadership team to both proactively manage and deliver on strategic projects. This new prioritization model brought the PM Leader and senior leadership team in direct access with each other.

      "By implementing this new project intake and prioritization framework, we drastically improved our ability to predict, meet, and manage project requests and unit workload. We adopted a client-focused and client-centric approach that enabled all project participants to see their role and value in successful project delivery. We created methodologies that were easy to follow from the client participation perspective, but also as PM leaders, provided us with the metrics, planning, and proactive tools to meet and anticipate client project demand. The response from our clients was extremely positive, encouraging, and appreciative."

      Step 1.2: Translate PPM strategic expectations to process goals

      PHASE 1

      PHASE 2

      PHASE 3

      1.11.22.12.23.13.2
      Choose the right PPM strategyTranslate strategy into process goalsDefine intake & resource mgmt. processesDefine reporting, closure, & benefits mgmt. processesSelect a right-sized PPM solutionFinalize your PPM strategic plan

      This step will walk you through the following activities:

      • Determine process goals based upon your PPM strategy.
      • Set metrics and preliminary targets for your PPM processes.

      This step involves the following participants:

      • CIO
      • Steering Committee
      • Business Unit Leaders
      • PMO Director/Portfolio Manager

      Outcomes of this step

      • Stakeholder-prioritized PPM process goals
      • Metrics and targets for high-priority process goals

      Use the PPM strategy to set the direction for PPM processes that make up the infrastructure around projects

      PPM strategy enables you to answer any and all of these questions in a way that is consistent, cohesive, and aligned with one another.

      Info-Tech's PPM Process Model from earlier with notes overlaid asking a series of questions. The questions for '1. Intake, Approval, and Prioritization' are 'Who can request a project? How do you request a project? Who decides what to fund? What is the target investment mix? How will they decide?' The questions for '2. Resource Management' are 'Who assigns the resources? Who feeds the data on resources? How do we make sure it’s valid? How do we handle contingencies when projects are late, or if availability changes?' The questions for '3. Status and Progress Reporting' are 'What project information that should be reported? Who reports on project status? When? How?' The questions between 'Project Management' and '4. Project Closure' are 'Who declares that a project is done? Who validates it? Who is this reported to? Who terminates low-value projects? How will they decide?' The questions for '5. Benefits Tracking' are 'How do we validate the project benefits from the original business case? How do we track the benefits? Who reports it? When?'

      Set process goals to address PPM strategic expectations and steer the PPM strategic plan

      Associated Activity icon 1.2.1 – 2 hours

      INPUT: PPM strategy & expectations, Organizational strategy and culture

      OUTPUT: Prioritized list of strategy-aligned PPM process goals

      Materials: PPM Strategy-Process Translation Matrix

      Participants: CIO, Steering Committee, Business Unit Leaders, PMO Director/ Portfolio Manager

      This activity is designed for key departmental stakeholders to articulate how PPM processes should be developed or refined to meet the PPM strategic expectations.

      Participation of the key departmental stakeholders in this exercise is critical, e.g. CIO, Steering Committee, business unit leaders.

      Strategic Expectations x Processes = Process goals aligned to strategy
      Throughput Project Intake, Approval, & Prioritization
      Visibility Resource Management
      Responsiveness Status & Progress Reporting
      Resource Utilization Project Closure
      Benefits Benefits Realization

      Download Info-Tech’s PPM Strategy-Process Goals Translation Matrix Template.

      Use Info-Tech’s Translation Matrix to systematically articulate strategy-aligned PPM process goals

      Supporting Tool icon 1.2.1 – PPM Strategy-Process Translation Matrix, tab 2

      Formula: To answer “[question]” in a way that we can [strategic expectation], it will be important to [process goal].

      Example 1:
      To answer the question “who can request a project, and how?” in a way that we can maximize the throughput of the best projects, it will be important to standardize the project request process.

      Example 2:
      To answer the question “how will they decide what to fund?” in a way that we can maximize the throughput of the best projects, it will be important to reach a consensus on project prioritization criteria.

      Example 3:
      To answer the question “how will we track the projected benefits?” in a way that we can maximize the throughput of the best projects, it will be important to double-check the validity of benefits before projects are approved.

      Screenshot of Tab 2 in Info-Tech's PPM Strategy-Process Translation Matrix tool. There is a table with notes overlaid 'Enter the process goals in the appropriate question–strategic expectation slot' and 'Assign a priority, from the most important (1) to the least important (5)'.

      Set metrics and preliminary targets for your high-priority PPM process goals

      Associated Activity icon 1.2.2 – 1-2 hours

      INPUT: Prioritized list of strategy-aligned PPM process goals, Organizational strategy and culture

      OUTPUT: Metrics and targets for high-priority PPM process goals

      Materials: PPM Strategy-Process Translation Matrix

      Participants: CIO, Steering Committee, Business Unit Leaders, PMO Director/ Portfolio Manager

      Your highest-priority process goals and their corresponding strategy expectations are displayed in tab 3 of the PPM Strategy-Process Translation Matrix template (example below).

      Through a group discussion, document what will be measured to decide the achievement of each process goal, as well as your current estimate and the long-term target. If necessary, adjust the approximate target duration.

      Screenshot of Tab 3 in Info-Tech's PPM Strategy-Process Translation Matrix tool. There is a table with 6 columns 'PPM Process', 'High-priority Process Goals', 'Strategy Expectation', 'How will you measure success?', 'Current Estimate', and 'Long-Term Target'; they are referred to in notes as columns B through G respectively. Overlaid notes are 'Columns C and D will auto-populate based upon your inputs from tab 2. The five PPM process areas are arranged vertically in column B and your top-five process goals from each area appear in column C.' 'Use column E to brainstorm how you might measure the success of each process goal at your organization. These can be tentative for now and refined over time.' 'Determine current metrics for each process goals and long-term target metrics in columns F and G.'

      Project-client-centered approach to PPM process design improves client satisfaction and team confidence

      CASE STUDY

      Industry: Public Administration
      Source: IAG / Info-Tech Interview

      Challenge

      Reactive instead of proactive

      "We had no effective means of tracking project intake requests vs. capacity. We struggled using ad hoc processes and methods which worked to meet immediate needs, but we quickly realized that they were ineffective in tracking critical project metrics, key performance indicators (KPIs), or performance measures...In short, we were being reactive, instead of proactive."

      The result was a disorganized portfolio that led to low client satisfaction and team morale.

      Solution

      Examine processes “through the eyes of the client”

      With the guiding principle of “through the eyes of the client,” PPM processes and tools were developed to formalize project intake, prioritization, and capacity planning. All touchpoints between client and PPM processes were identified, and practices for managing client expectations were put in place. A client satisfaction survey was formulated as part of the post-project assessment and review.

      Results

      Client-centered processes improved client satisfaction and team confidence

      People, processes, and tools are now aligned to support client demand, manage client expectations, measure project KPIs, and perform post-project analysis. A standard for client satisfaction metrics was put in place. The overwhelmingly positive feedback has increased team confidence in their ability to deliver quality efforts.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of Barry Cousins.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Sample of activity 1.1.2 'Determine your actual resource capacity for projects'. Determine your actual resource capacity for projects

      Work with Info-Tech analysts to define your project vs. non-project ratio to help define how much of your overall resource capacity is actual available for projects.

      Sample of activity 1.2.1 'Set realistic PPM process goals'. Set realistic PPM process goals

      Leverage Info-Tech facilitators to help walk you through our PPM framework and define achievable process goals that are rooted in your current PPM maturity levels and organizational culture.

      Develop a Project Portfolio Management Strategy

      PHASE 2

      Align PPM Processes to Your Strategic Goals

      Phase 2 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Align PPM processes to your strategic goals

      Proposed Time to Completion: 2-4 weeks
      Step 2.1: Develop intake & resource mgmt. processes Step 2.2: Define reporting, closure, & benefits processes
      Work with an analyst to:
      • Assess your current intake, prioritization, and resource management processes and wireframe a sustainable target state for each capability.
      Work with an analyst to:
      • Analyze your current portfolio reporting, project closure, and benefits realization processes and wireframe a sustainable target state for each capability.
      Then complete these activities…
      • Set near-term and long-term goals.
      • Draft high-level steps within your target-state processes.
      • Document your process steps and roles and responsibilities.
      Then complete these activities…
      • Set near-term and long-term goals.
      • Draft high-level steps within your target-state processes.
      • Document your process steps and roles and responsibilities.
      With these tools & templates:
      • PPM Strategy Development Tool
      • PPM Strategic Plan Template
      With these tools & templates:
      • PPM Strategy Development Tool
      • PPM Strategic Plan Template

      Phase 2 Results & Insights

      • The means of project and portfolio management (i.e. processes) shouldn’t eclipse the ends – strategic goals. Root your process in your PPM strategic goals to realize PPM benefits (e.g. optimized portfolio value, improved project throughput, increased stakeholder satisfaction).

      Read first: Overview of the methodology for articulating new strategy-aligned PPM processes

      In the previous step of the blueprint, key department stakeholders established the PPM process goals, metrics, and targets in a way that aligns with the overall PPM strategy. In this phase, we draft a high-level description of the five PPM processes that reflect those goals using the following methodology:

      Methodology at a glance

      1. Articulate the current state of the process.
      2. Examine the process against the strategy-aligned goals.
      3. Create short- and long-term action items to refine the current process and meet the strategy-aligned targets.
      4. Develop a high-level target-state description of the PPM process.
      5. Estimate costs-in-use of the target-state process.

      Out-of-scope topics

      • Draft a detailed target-state description of the PPM process. Avoid falling into the “analysis paralysis” trap and keep the discussion focused on the overall PPM strategy.
      • PPM tools to support the process. This discussion will take place in the next phase of the blueprint.

      INPUT

      –›

      PROCESS

      –›

      OUTPUT

      • Strategy-aligned process goals, metrics, and targets (Activity 1.2.1)
      • Knowledge of current process
      • Knowledge of organizational culture and structure
      • Capability level assessment
      • Table-top design planning activity
      • Start-stop-continue retrospective
      • High-level description of the target state
      • PPM Strategy Development Tool
      • High-level descriptions of current and target states
      • Short- and long-term action items for improving the process
      • Cost-in-use of the current- and target-state processes

      Download Info-Tech’s PPM Strategy Development Tool

      Build a sound business case for implementing the new PPM strategy with realistic costs and benefits of managing your project portfolio.

      Time spent on managing the project portfolio is an investment. Like any other business endeavors, the benefits must outweigh the costs to be worth doing.

      As you draft a high-level description of the PPM processes in this phase of the blueprint, use Info-Tech’s PPM Strategy Development Tool to track the estimate the cost-in-use of the process. In the next phase, this information will be inform a cost-benefit analysis, which will be used to support your plan to implement the PPM strategy.

      Download Info-Tech’s PPM Strategy Development Tool.

      Screenshots of Info-Tech's PPM Strategy Development Tool including a Cost-Benefit Analysis with tables and graphs.

      Step 2.1: Develop and refine project intake, prioritization, and resource management processes

      PHASE 1

      PHASE 2

      PHASE 3

      1.11.22.12.23.13.2
      Choose the right PPM strategyTranslate strategy into process goalsDefine intake & resource mgmt. processesDefine reporting, closure, & benefits mgmt. processesSelect a right-sized PPM solutionFinalize your PPM strategic plan

      This step will walk you through the following activities:

      • Determine your process maturity.
      • Benchmark current processes against strategy-aligned goals.
      • Set near- and long-term action items.
      • Draft a high-level description of your target state.
      • Document your new processes.

      This step involves the following participants:

      • PMO Director/Portfolio Manager
      • Project Managers
      • Resource Managers
      • Business Analysts

      Outcomes of this step

      • A definition of current and target state maturity levels for intake, prioritization, and resource management
      • Near-term and long-term process goals for intake, prioritization, and resource management
      • A high-level wireframe for your intake, prioritization, and resource management process steps

      Project intake, prioritization, and approval: Get projects with the highest value done first

      Give your organization the voice to say “no” (or “not yet”) to new projects.

      Questions

      • Who can request a project?
      • How do you request a project?
      • Who decides what to fund?
      • What is the target investment mix?
      • How will they decide?

      Benefits

      • Maximize value of time spent on project work by aligning projects with priorities and stakeholder needs.
      • Finish the projects you start by improving alignment of intake and prioritization with resource capacity.
      • Improve stakeholder satisfaction by managing expectations with consistent, streamlined processes.

      Challenges

      • Stakeholders who benefit from political or ad hoc prioritization processes will resist or circumvent formal intake processes.
      • Many organizations lack sufficient awareness of resource capacity necessary to align intake with availability.

      A graph highlighting the sweet spot of project intake decision making. The vertical axis is 'Rigor and Effort' increasing upward, and the horizontal axis is 'Quality and Effectiveness of Decisions' increasing to the right. The trend line starts at 'Gut Feel' with low 'Rigor and Effort', and gradually curves upward to 'Analysis Paralysis' at the top. A note with an arrow pointing to a midway point in the line reads 'The sweet spot changes between situations and types of decisions'.

      Info-Tech Insight

      This process aims to control the project demand. A balance between rigor and flexibility is critical in order to avoid the “analysis paralysis” as much as the “gut feel” approach.

      Funnel project requests into a triage system for project intake

      Info-Tech recommends following a four-step process for managing project intake.

      1. Requestor fills out form and submits the request into the funnel.
      2. Requests are triaged into the proper queue.
        1. Divert non-project request.
        2. Quickly assess value and urgency.
        3. Assign specialist to follow up on request.
        4. Inform the requestor.
      3. Business analyst starts to gather preliminary requirements.
        1. Follow up with sponsors to validate and define scope.
        2. Estimate size and determine project management rigor required.
        3. Start to develop an initial business case.
      4. Requestor is given realistic expectations for approval process.

      Info-Tech Best Practice

      An excess number of intake channels is the tell-tale sign of a project portfolio in distress. The PMO needs to exercise and enforce discipline on stakeholders. PMO should demand proper documentation and diligence from stakeholders before proceeding with requests.

      Maintain reliable resourcing data with a recurrent project intake, prioritization, and approval practice

      Info-Tech recommends following a five-step process for managing project intake, prioritization, and approval.

      A diagram of Info-Tech's five-step process for managing project intake. There are four groups that may be involved in any one step, they are laid out on the side as row headers that each step's columns may fall into, 'Resources', 'Business Analysts', 'PMO', and 'Governance Layer'. The first step is 'Collect project requests' which involves 'Resources'. Step 2 is 'Screen project requests' which involves 'Business Analysts' and 'PMO'. A part of the step that may be applicable to some organizations is 'Concept approval' involving 'Governance Layer'. Step 3 is 'Develop business case' which involves 'Business Analysts' and 'PMO'. A part of the step that may be applicable to some organizations is 'Get a project sponsor' involving 'Governance Layer'. Step 4 is 'Prioritize project' which involves 'Business Analysts' and 'PMO'. Step 5 is 'Approve (greenlight) project' which involves 'Business Analysts', 'PMO', and 'Governance Layer', with an attached note that reads 'Ensure that up-to-date project portfolio information is available (project status, resource forecast, etc.)'. All of these steps lead to 'Initiate project, commit resources, etc.'

      Info-Tech Insight

      “Approval” can be a dangerous word in project and portfolio management. Use it carefully. Clarify precisely what is being “approved” at each step in the process, what is required to pass each gate, and how long the process will take.

      Determine your project intake, prioritization, and approval process maturity

      Associated Activity icon 2.1.1a – 10 minutes

      INPUT: Organizational strategy and culture

      OUTPUT: Project intake, prioritization, and approval capability level

      Materials: PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      Kick-off the discussion about the project intake, prioritization, and approval process by reading the capability level descriptions below and discussing which level currently applies to you the most.

      Capability Level Descriptions

      Capability Level 5: Optimized We have effective intake processes with right-sized administrative overhead. Work is continuously prioritized to keep up with emerging challenges and opportunities.
      Capability Level 4: Aligned We have very strong intake processes. Project approvals are based on business cases and aligned with future resource capacity.
      Capability Level 3: Engaged Processes are in place to track project requests and follow up on them. Priorities are periodically re-evaluated, based largely on the best judgment of one or several executives.
      Capability Level 2: Defined Some processes are in place, but there is no capacity to say no to new projects. There is a backlog, but little or no method for grooming it.
      Capability Level 1: Unmanaged Our organization has no formal intake processes in place. Most work is done reactively, with little ability to prioritize project work proactively.

      Benchmark the current project intake, prioritization, and approval process against strategy-aligned goals

      Associated Activity icon 2.1.1b – 1-2 hours

      INPUT: Documentation describing the current process (e.g. standard operating procedures), Process goals from activity 1.2.1

      OUTPUT: Retrospective review of current process

      Materials: 4x6” recipe cards, Whiteboard

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      Conduct a table-top planning exercise to map out the process currently in place.

      1. Use white 4”x6” recipe cards to write unique steps of a process. Use the intake, prioritization, and approval process from the previous slides as a guide.
      2. Use green cards to write artifacts or deliverables that result from a step.
      3. Use pink cards to write issues, problems, or risks.
      4. Discuss how the process could better achieve the strategy-aligned goals from activity 1.2.1. Keep a list of possible changes in the form of a start-stop-continue retrospective (example below) on a whiteboard.
      Start Stop Continue
      • Simplify business cases
      • Send emails to requestor to manage expectations
      • Accept verbal project requests
      • Approve “pet projects”
      • Monthly prioritization meetings
      • Evaluate prioritization criteria

      Set near- and long-term action items for the project intake, prioritization, and approval process

      Associated Activity icon 2.1.1c – 30 minutes - 1 hour

      INPUT: Outcome of the retrospective review, Process goals and metrics from activity 1.2.1

      OUTPUT: Action items for evolving the process to a target state

      Materials: Whiteboard

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      Analyze each item in the start-stop-continue retrospective to compile a set of near-term and long-term action items.

      The near-term plan should include steps that are within the authority of the PMO and do not require approval or investment outside of that authority. The long-term plan should include steps that may require a longer approval process, buy-in of external stakeholders, and the investment of time and money.
      Near-Term Action Items Long-Term Action Items
      For example:
      • Limit the number of channels available to request new projects.
      • Revise the intake form.
      • Establish a regular triage process.
      For example:
      • Establish a comprehensive scorecard and business case scoring process at the steering committee level.
      • Limit the rate of approval to be aligned with resource capacity.

      Review and customize slide 23, “Project intake, prioritization, and approval: action items,” in Info-Tech’s PPM Strategic Plan Template.

      Draft a high-level description of the intake, prioritization, and approval process at a target state

      Associated Activity icon 2.1.1d – 1-2 hours

      INPUT: Action items for evolving the process to a target state

      OUTPUT: High-level description of the process at the target state

      Materials: Whiteboard, PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      1. Break down the process into several tasks at a high level. Avoid getting into too much detail by limiting the number of steps.
      2. An example of high-level breakdown: project intake, prioritization, and approval
        Collect project requests –› Screen requests –› Develop business case –› Prioritize project –› Approve project

      3. Describe each task by answering the following questions. Document your response in the PPM Strategic Plan Template.
      4. Question

        Description

        Input What information do you need to perform the work?
        Output What artifacts/deliverables are produced as a result?
        Frequency/Timing How often, and when, will the work be performed?
        Responsibility Who will perform the work?
        Accountability Who will approve the work and assume the ownership of any decisions?

      5. Record the time cost of each process using the PPM Strategy Development Tool; see next slide for instructions.

      Use the PPM Strategy Development Tool to track the time cost of the process

      Supporting Tool icon 2.1.1 – PPM Strategy Development Tool, Tab 3: Costing Assumptions

      Record the time cost of each high-level process task from Activity 2.1.1d.

      Screenshot of tab 3 from Info-Tech's PPM Strategy Development Tool with notes overlaid. Columns are 'ID', 'Task Description', 'Who does the task?', a super-column titled 'Current State' which includes 'How many times per year?', 'How many people?', and 'For how long?', a super-column titled 'Near-Term Target State' with the same three sub columns, and a super-column titled 'Long-Term Target State' with the same three sub columns. Notes for 'Who does the task?' read 'Choose executive, management or resource' and 'If task is done by more than one party, duplicate the task'. Notes for the 3 recurring sub columns are 'Estimate how many times in a year the task is performed (e.g. 120 project requests per year)', 'Indicate the number of people needed to perform the task each time', 'Estimate the average work-hours for the task… either in minutes or in hours', 'If a task is not applicable to a state (e.g. currently PMO does not screen project requests), leave the row blank', and 'For meetings, remember to indicate the number of people'.

      Document the high-level description for the new intake, prioritization, and approval process

      Associated Activity icon 2.1.1e – 30 minutes - 1 hour

      INPUT: High-level description of the process at the target state

      OUTPUT: Updated PPM strategic plan

      Materials: Whiteboard, PPM Strategic Plan Template

      Participants: PMO Director/ Portfolio Manager

      Update your PPM strategic plan with the new high-level description for the new project intake, prioritization, and approval process. Depending on your current process capability level, you may wish to include additional information on your strategic document, for example:

      • Updated prioritization scorecard.
      • Roles and responsibility matrix, identifying consulted and informed parties.

      Info-Tech has a dedicated blueprint to help you develop the high-level process description into a fully operationalized process. Upon completion of this PPM strategy blueprint, speak to an Info-Tech account manager or analyst to get started.

      Read Info-Tech’s Optimize Project Intake, Prioritization, and Approval blueprint.

      Review and customize slide 24, “Project intake, prioritization, and approval: target state,” in Info-Tech’s PPM Strategic Plan Template.

      Clarity in project prioritization process leads to enterprise-wide buy-in

      CASE STUDY

      Industry: Public Administration
      Source: IAG / Info-Tech Interview

      Challenge

      "Our challenge from the start was to better understand the strategic perspective and priorities of our client departments.

      In addition, much of the work requested was not aligned to corporate goals and efforts, and seemed to be contradictory, redundant, and lacking strategic focus."

      Complicating this challenge was the fact that work requests were being received via all means of communication, which made the monitoring and controlling of requests more difficult.

      Solution

      Client departments were consulted to improve the understanding of their strategic goals and priorities. Based on the consultation:

      • A new, enterprise-wide project prioritization criteria was developed.
      • Priority of project requests from all business areas are evaluated on a quarterly basis.
      • A prioritized list of projects are made available to the senior leadership team.

      Results

      "By creating and implementing a tool for departments to prioritize strategic efforts, we helped them consider the important overall project criteria and measure them uniformly, across all anticipated projects. This set a standard of assessment, prioritization, and ranking, which helped departments clearly see which efforts were supportive and matched their strategic goals."

      Resource management process ensures that projects get the resources they need

      Reclaim project capacity: properly allocate project work and establish more stable project timelines.

      Questions

      • Who assigns the resources?
      • Who feeds the data on resources?
      • How do we make sure it’s valid?
      • How do we handle contingencies when projects are late, or if availability changes?

      Benefits

      • Ensure that approved projects can be completed by aligning intake with real project capacity.
      • Reduce over-allocation of resources by allocating based on their proportion of project vs. non-project work.
      • Forecast future resource requirements by maintaining accurate resource capacity data.

      Challenges

      • Time tracking can be difficult when project workers balance project work with “keep the lights on” activities and other administrative work.
      • Continuous partial attention, interruptions, and distractions are a part of today’s reality that makes it very difficult to maximize productivity.
      A see-saw balancing 'Resource availability' on one side and 'Ongoing projects, Operational work, Administrative work, and Resource absence' on the other side.

      Maintain reliable resourcing data with a recurrent resource management practice

      Info-Tech recommends following a five-step process for resource management.

      A diagram of Info-Tech's five-step process for resource management. There are five groups that may be involved in any one step, they are laid out on the side as row headers that each step's columns may fall into, 'Resources', 'Resource Managers', 'Project Managers', 'PMO', and 'Governance Layer'. The first step is 'Collect resource availability' which involves 'Resources' and 'Resource Managers'. Step 2 is 'Collect resource demand' which involves 'Resource Managers', 'Project Managers' and 'PMO'. Step 3 is 'Identify need for reconciliation' which involves 'PMO'. Step 4 is 'Resolve conflicts and smoothen resource allocations' which involves 'Resource Managers', 'Project Managers' and 'PMO'. Step 5 is 'Report resource allocations and forecast' which involves all groups, with an attached note that reads 'Ensure that up-to-date information is available for project approval, portfolio reporting, closure, etc.'

      Info-Tech Insight

      This process aims to control the resource supply to meet the demand – project and non-project alike. Coordinate this process with the intake, approval, and prioritization process.

      Determine your resource management process capability level

      Associated Activity icon 2.1.2a – 10 minutes

      INPUT: Organizational strategy and culture

      OUTPUT: Resource management capability level

      Materials: PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      Kick-off the discussion about the resource management process by reading the capability level descriptions below and discussing which level currently applies to you the most.

      Capability Level Descriptions

      Capability Level 5: OptimizedOur organization has an accurate picture of project versus non-project work loads and allocates resources accordingly. We periodically reclaim lost capacity through organizational and behavioral change.
      Capability Level 4: AlignedWe have an accurate picture of how much time is spent on project versus non-project work. We allocate resources to these projects accordingly. We are checking in on project progress bi-weekly.
      Capability Level 3: PixelatedWe are allocating resources to projects and tracking progress monthly. We have a rough estimate of how much time is spent on project versus non-project work.
      Capability Level 2: OpaqueWe match resources teams to projects and check in annually, but we do not forecast future resource needs or track project versus non-project work.
      Capability Level 1: UnmanagedOur organization expects projects to be finished, but there is no process in place for allocating resources or tracking project progress.

      Benchmark the current resource management process against strategy-aligned goals

      Associated Activity icon 2.1.2b – 1-2 hours

      INPUT: Documentation describing the current process (e.g. standard operating procedures), Process goals from activity 1.2.1

      OUTPUT: Retrospective review of current process

      Materials: 4x6” recipe cards, Whiteboard

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      Conduct a table-top planning exercise to map out the process currently in place.

      1. Use white 4”x6” recipe cards to write unique steps of a process. Use the resource management process from the previous slides as a guide.
      2. Use green cards to write artifacts or deliverables that result from a step.
      3. Use pink cards to write issues, problems, or risks.
      4. Discuss how the process could better achieve the strategy-aligned goals from activity 1.2.1. Keep a list of possible changes in the form of a start-stop-continue retrospective (example below) on a whiteboard.
      Start Stop Continue
      • Collect project actuals
      • Make enhancements to the PPM tool in use
      • Over allocating resources
      • “Around the room” reporting at monthly meeting
      • Send project updates before resource management meetings

      Set near- and long-term action items for the resource management process

      Associated Activity icon 2.1.2c – 30 minutes - 1 hour

      INPUT: Outcome of the retrospective review, Process goals and metrics from activity 1.2.1

      OUTPUT: Action items for evolving the process to a target state

      Materials: Whiteboard

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      Analyze each item in the start-stop-continue retrospective to compile a set of near-term and long-term action items.

      The near-term plan should include steps that are within the authority of the PMO and do not require approval or investment outside of that authority. The long-term plan should include steps that may require a longer approval process, buy-in of external stakeholders, and the investment of time and money.
      Near-Term Action Items Long-Term Action Items
      For example:
      • Determine the percentage of project vs. non-project work through implementation of a weekly survey.
      For example:
      • Reduce resource waste to 6%.
      • Forecast resource requirements monthly.
      • Implement a mid-market PPM tool.

      Review and customize slide 26, “Resource management: action items,” in Info-Tech’s PPM Strategic Plan Template.

      Draft a high-level description of the resource management process at a target state

      Associated Activity icon 2.1.2d – 1-2 hours

      INPUT: Action items for evolving the process to a target state

      OUTPUT: High-level description of the process at the target state

      Materials: Whiteboard, PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      1. Break down the process into several tasks at a high level. Avoid getting into too much detail by limiting the number of steps.
      2. An example of high-level breakdown: resource management
        Collect resource availability –› Collect resource demand –› Identify need for reconciliation –› Resolve conflicts and over-allocation –› Update resource forecast


      3. Describe each task by answering the following questions. Document your response in the PPM Strategic Plan Template.
      4. Question

        Description

        Input What information do you need to perform the work?
        Output What artifacts/deliverables are produced as a result?
        Frequency/Timing How often, and when, will the work be performed?
        Responsibility Who will perform the work?
        Accountability Who will approve the work and assume the ownership of any decisions?


      5. Record the time cost of each process using the PPM Strategy Development Tool.

      Document the high-level description for the new resource management process

      Associated Activity icon 2.1.2e – 30 minutes - 1 hour

      INPUT: High-level description of the process at the target state

      OUTPUT: Updated PPM strategic plan

      Materials: PPM Strategic Plan Template

      Participants: PMO Director/ Portfolio Manager

      Update your PPM strategic plan with the new high-level description for the new resource management process. Depending on your current process capability level, you may wish to include additional information on your strategic plan, for example:

      • Resource management meeting agenda template
      • Roles and responsibility matrix, identifying consulted and informed parties

      Info-Tech has a dedicated blueprint to help you develop the high-level process description into a fully operationalized process. Upon completion of this PPM strategy blueprint, speak to an Info-Tech account manager or analyst to get started.

      Read Info-Tech’s Develop a Resource Management for the New Reality blueprint.

      Review and customize slide 27, “Resource management: target state,” in Info-Tech’s PPM Strategic Plan Template.

      Step 2.2: Develop and refine portfolio reporting, project closure, and benefits realization processes

      PHASE 1

      PHASE 2

      PHASE 3

      1.11.22.12.23.13.2
      Choose the right PPM strategyTranslate strategy into process goalsDefine intake & resource mgmt. processesDefine reporting, closure, & benefits mgmt. processesSelect a right-sized PPM solutionFinalize your PPM strategic plan

      This step will walk you through the following activities:

      • Determine your process maturity.
      • Benchmark current processes against strategy-aligned goals.
      • Set near- and long-term action items.
      • Draft a high-level description of your target state.
      • Document your new processes.

      This step involves the following participants:

      • PMO Director/Portfolio Manager
      • Project Managers
      • Business Analysts

      Outcomes of this step

      • A definition of current and target state maturity levels for portfolio reporting, project closure, and benefits realization
      • Near-term and long-term process goals for portfolio reporting, project closure, and benefits realization
      • A high-level wireframe for your portfolio reporting, project closure, and benefits realization process steps

      Portfolio reporting process makes trustworthy data accessible for informing decisions

      Giving stakeholders the ability to make informed decisions is the most important function of managing the project portfolio.

      Questions

      • What project information should be reported?
      • Who reports on project status?
      • When and how do we report on the status of the project portfolio?

      Benefits

      • Reporting is the linchpin of any successful PPM strategy.
      • Timely and accurate status reports enable decision makers to address issues risks and issues before they create bigger problems.
      • Executive visibility can be achieved with or without a commercial tool using spreadsheets, a content management system such as SharePoint, or a combination of tools you already have.

      Challenges

      • Trying to increase detailed visibility too fast leads to difficulty gathering and maintaining data. As a result, reporting is rarely accurate and people quickly lose trust in the portfolio.
      • If you are planning to adopt a commercial tool, Info-Tech strongly recommends validating your organization’s ability to maintain a consistent reporting process using simple tools before investing in a more sophisticated system.

      Info-Tech Insight

      If you can only do one thing, establish frequently current reporting on project status. Reporting doesn’t have to be detailed or precise, as long as it’s accurate.

      Maintain reliable portfolio status data with a recurrent status and progress reporting practice

      Info-Tech recommends following a four-step process for portfolio status and progress reporting.

      A diagram of Info-Tech's four-step process for portfolio status and progress reporting. There are four groups that may be involved in any one step, they are laid out on the side as row headers that each step's columns may fall into, 'Resources', 'Project Managers', 'PMO', and 'Governance Layer'. The first step is 'Create project status reports' which involves 'Resources' and 'Project Managers'. Step 2 is 'Create a project portfolio status report' which involves 'Project Managers' and 'PMO', with a note that reads 'Ensure that up-to-date information is available for project approval, resource management, closure, etc.' Step 3 is 'Report on project portfolio status' which involves 'PMO' and 'Governance layer'. Step 4 is 'Act on portfolio steering decisions' which involves 'Resources', 'Project Managers' and 'PMO'.

      Start by establishing a regular reporting cadence with lightweight project status KPIs:

      Red Issue or risk that requires intervention For projects that are red or yellow, high-level status reports should be elaborated on with additional comments on budget, estimated hours/days until completion, etc.
      Yellow Issue or risk that stakeholders should be aware of
      Green No significant risks or issues

      Determine your resource management process capability level

      Associated Activity icon 2.2.1a – 10 minutes

      INPUT: Organizational strategy and culture

      OUTPUT: Portfolio reporting capability level

      Materials: PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers

      Kick-off the discussion about the portfolio reporting process by reading the capability level descriptions below and discussing which level currently applies to you the most.

      Capability Level Descriptions

      Capability Level 5: OptimizedWith the right tools, we can ensure that all projects are planned and maintained at a detailed task level with high-quality estimates, and that actual task progress is updated at least weekly.
      Capability Level 4: AlignedWe have the skills, knowledge, and resources needed to prepare a detailed cost-benefit analysis for all proposed projects. We track the progress throughout project execution.
      Capability Level 3: InterventionWith the right tools, we can ensure that project issues and risks are identified and addressed on a regular basis (e.g. at least monthly) for all projects.
      Capability Level 2: OversightWith the right tools, we can ensure that project status updates are revised on a regular basis (e.g. at least monthly) for all ongoing projects.
      Capability Level 1: ReactiveProject managers escalate issues directly with their direct supervisor or project sponsor because there is no formal PPM practice.

      Benchmark the current portfolio reporting process against strategy-aligned goals

      Associated Activity icon 2.2.1b – 1-2 hours

      INPUT: Documentation describing the current process (e.g. standard operating procedures), Process goals from activity 1.2.1

      OUTPUT: Retrospective review of current process

      Materials: 4x6” recipe cards, Whiteboard

      Participants: PMO Director/ Portfolio Manager, Project Managers

      Conduct a table-top planning exercise to map out the process currently in place.

      1. Use white 4”x6” recipe cards to write unique steps of a process. Use the portfolio reporting process from the previous slides as a guide.
      2. Use green cards to write artifacts or deliverables that result from a step.
      3. Use pink cards to write issues, problems, or risks.
      4. Discuss how the process could better achieve the strategy-aligned goals from activity 1.2.1. Keep a list of possible changes in the form of a start-stop-continue retrospective (example below) on a whiteboard.
      Start Stop Continue
      • Report on lightweight KPIs
      • Standardize the status reports
      • Project managers waiting too long before declaring a red status
      • Produce weekly project portfolio-wide report for senior leadership

      Set near- and long-term action items for the portfolio reporting process

      Associated Activity icon 2.2.1c – 30 minutes - 1 hour

      INPUT: Outcome of the retrospective review, Process goals and metrics from activity 1.2.1

      OUTPUT: Action items for evolving the process to a target state

      Materials: Whiteboard

      Participants: PMO Director/ Portfolio Manager, Project Managers

      Analyze each item in the start-stop-continue retrospective to compile a set of near-term and long-term action items.

      The near-term plan should include steps that are within the authority of the PMO and do not require approval or investment outside of that authority. The long-term plan should include steps that may require a longer approval process, buy-in of external stakeholders, and the investment of time and money.
      Near-Term Action Items Long-Term Action Items
      For example:
      • Establish a reporting process that can be consistently maintained using lightweight KPIs.
      • Provide a simple dashboard that stakeholders can use to see their project status reports at a high level.
      For example:
      • Adopt a commercial tool for maintaining consistent status reports.
      • Support the tool with training and a mandate of adoption among all users.

      Review and customize slide 29, “Portfolio reporting: action items,” in Info-Tech’s PPM Strategic Plan Template.

      Draft a high-level description of the portfolio reporting process at a target state

      Associated Activity icon 2.2.1d – 1-2 hours

      INPUT: Action items for evolving the process to a target state

      OUTPUT: High-level description of the process at the target state

      Materials: Whiteboard, PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers

      1. Break down the process into several tasks at a high level. Avoid getting into too much detail by limiting the number of steps.
      2. An example of high-level breakdown: portfolio reporting
        Create project status reports –› Create a project portfolio status report –› Report on project portfolio status –› Act on portfolio steering decisions


      3. Describe each task by answering the following questions. Document your response in the PPM Strategic Plan Template.
      4. Question

        Description

        InputWhat information do you need to perform the work?
        OutputWhat artifacts/deliverables are produced as a result?
        Frequency/TimingHow often, and when, will the work be performed?
        ResponsibilityWho will perform the work?
        AccountabilityWho will approve the work and assume the ownership of any decisions?

      5. Record the time cost of each process using the PPM Strategy Development Tool.

      Document the high-level description for the new portfolio reporting process

      Associated Activity icon 2.2.1e – 30 minutes - 1 hour

      INPUT: High-level description of the process at the target state

      OUTPUT: Updated PPM strategic plan

      Materials: PPM Strategic Plan Template

      Participants: PMO Director/ Portfolio Manager

      Update your PPM strategic plan with the new high-level description for the new portfolio reporting process. Depending on your current process capability level, you may wish to include additional information on your strategic plan, for example:

      • Updated project status report template with new KPIs.
      • Documentation of requirements for improved PPM dashboards and reports.

      Info-Tech has a dedicated blueprint to help you develop the high-level process description into a fully operationalized process. Upon completion of this PPM strategy blueprint, speak to an Info-Tech account manager or analyst to get started.

      Read Info-Tech’s Enhance PPM Dashboards and Reports blueprint.

      Review and customize slide 30, “Portfolio reporting: target state,” in Info-Tech’s PPM Strategic Plan Template.

      Streamlined status reporting improves portfolio visibility for executives, enabling data-driven steering of the portfolio

      CASE STUDY

      Industry: Public Administration
      Source: IAG / Info-Tech Interview

      Challenge

      The client had no effective real-time reporting in place to summarize their work efforts. In addition, the client struggled with managing existing resources against the ability to deliver on the requested project workload.

      Existing project reporting processes were manually intensive and lacked mature reporting capabilities.

      Solution

      Through a short and effective engagement, IAG conducted surveys and facilitated interviews to identify the information needed by each stakeholder. From this analysis and industry best practices, IAG developed scorecards, dashboards, and project summary reports tailored to the needs of each stakeholder group. This integrated reporting tool was then made available on a central portal for PPM stakeholders.

      Results

      Stakeholders can access project scorecard and dashboard reports that are available at any given time.

      Resource reporting enabled the PMO to better balance client demand with available project capacity and forecast any upcoming deficiencies in resourcing that affect project delivery.

      Project closure at the portfolio level controls throughput and responsiveness of the portfolio

      Take control over projects that linger on, projects that don’t provide value, and projects that do not align with changing organizational priority.

      Questions

      • Who declares that a project is done?
      • Who validates it?
      • Who is this reported to?
      • Who terminates low-value projects?
      • How will they decide that a project is too low value to continue?

      Benefits

      • Minimize post-implementation problems by ensuring clean handoffs, with clear responsibilities for ongoing support and maintenance.
      • Drive continuous improvement by capturing and applying lessons learned.
      • Increase the project portfolio’s responsiveness to change by responding to emerging opportunities and challenges.

      Challenges

      • Completion criteria and “definition of done” need to be well defined and done so at project initiation.
      • Scope changes need to be managed and documented throughout the project.
      • Portfolio responsiveness requires deep cultural changes that will be met with confusion and resistance from some stakeholders.

      Info-Tech Insight

      Although “change in organizational priority” is the most frequently cited cause of project failure (PMI Pulse of Profession, 2017), closing projects that don’t align with organizational priority ought to be a key PPM goal. Therefore, don’t think of it as project failure; instead, think of it as PPM success.

      Maintain the health of the project portfolio with a repeatable project closure process

      Info-Tech recommends following a four-step process for project closure.

      A diagram of Info-Tech's four-step process for project closure. There are five groups that may be involved in any one step, they are laid out on the side as row headers that each step's columns may fall into, 'Resources', 'Resource Managers', 'Project Managers', 'PMO', and 'Governance Layer'. The first steps are 'Complete project' which involves 'Project Managers', and 'Terminate low value projects' which involves 'PMO' and 'Governance layer'. Step 2 is 'Validate project closure' which involves 'Project Managers' and 'PMO', with a note that reads 'This includes facilitating the project sponsor sign-off, accepting and archiving lessons learned documents, etc.' The third steps are 'Conduct post-project work' which involves 'Project Managers' and 'PMO', and 'Update resource availability' which includes 'Resource Managers'. Step 4 is 'Conduct post-implementation review' which involves all groups.

      Info-Tech Best Practice

      Post-implementation review checks which benefits (including those set out in the business case) have been achieved and identifies opportunities for further improvement. Without it, it can be difficult to demonstrate that investment in a project was worthwhile.

      Determine your project closure process capability level

      Associated Activity icon 2.2.2a – 10 minutes

      INPUT: Organizational strategy and culture

      OUTPUT: Project closure capability level

      Materials: PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers, Business Analysts

      Kick-off the discussion about the project closure process by reading the capability level descriptions below and discussing which level currently applies to you the most.

      Capability Level Descriptions

      Capability Level 5: OptimizedProject closure is centrally managed and supports post-project benefits tracking.
      Capability Level 4: AlignedProject closure is centrally managed at the portfolio level to ensure completion/acceptance criteria are satisfied.
      Capability Level 3: EngagedProject closure is confirmed at the portfolio level, but with minimal enforcement of satisfaction of completion/acceptance criteria.
      Capability Level 2: EncouragedProject managers often follow handoff and closure procedures, but project closure is not confirmed or governed at the portfolio level.
      Capability Level 1: UnmanagedProject closure is not governed at either the project or portfolio level.

      Benchmark the current project closure process against strategy-aligned goals

      Associated Activity icon 2.2.2b – 1-2 hours

      INPUT: Documentation describing the current process (e.g. standard operating procedures), Process goals from activity 1.2.1

      OUTPUT: Retrospective review of current process

      Materials: 4x6” recipe cards, Whiteboard

      Participants: PMO Director/ Portfolio Manager, Project Managers, Business Analysts

      Conduct a table-top planning exercise to map out the process currently in place.

      1. Use white 4”x6” recipe cards to write unique steps of a process. Use the project closure process from the previous slides as a guide.
      2. Use green cards to write artifacts or deliverables that result from a step.
      3. Use pink cards to write issues, problems, or risks.
      4. Discuss how the process could better achieve the strategy-aligned goals from activity 1.2.1. Keep a list of possible changes in the form of a start-stop-continue retrospective (example below) on a whiteboard.
      Start Stop Continue
      • Conduct reprioritization of projects at a regular cadence
      • Prune projects every year
      • Waive post-implementation review for time-constrained projects
      • Collect project post-mortem reports and curate in PMO SharePoint

      Set near- and long-term action items for the project closure process

      Associated Activity icon 2.2.2c – 30 minutes - 1 hour

      INPUT: Outcome of the retrospective review, Process goals and metrics from activity 1.2.1

      OUTPUT: Action items for evolving the process to a target state

      Materials: Whiteboard

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      Analyze each item in the start-stop-continue retrospective to compile a set of near-term and long-term action items.

      The near-term plan should include steps that are within the authority of the PMO and do not require approval or investment outside of that authority. The long-term plan should include steps that may require a longer approval process, buy-in of external stakeholders, and the investment of time and money.
      Near-Term Action Items Long-Term Action Items
      For example:
      • Begin establishing project closure criteria in the project initiation process.
      • Manage and document scope changes throughout the project.
      For example:
      • Institute a formal process to ensure that all projects are closed at the portfolio level and properly handed off to support and maintenance teams.

      Review and customize slide 32, “Project closure: action items,” in Info-Tech’s PPM Strategic Plan Template.

      Draft a high-level description of the project closure process at a target state

      Associated Activity icon 2.2.2d – 1-2 hours

      INPUT: Action items for evolving the process to a target state

      OUTPUT: High-level description of the process at the target state

      Materials: Whiteboard, PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      1. Break down the process into several tasks at a high level. Avoid getting into too much detail by limiting the number of steps.
      2. An example of high-level breakdown: project closure
        Complete or terminate projects –› Validate project closure –› Conduct post-project work –› Conduct post-implementation review


      3. Describe each task by answering the following questions. Document your response in the PPM Strategic Plan Template.
      4. Question

        Description

        Input What information do you need to perform the work?
        Output What artifacts/deliverables are produced as a result?
        Frequency/Timing How often, and when, will the work be performed?
        Responsibility Who will perform the work?
        Accountability Who will approve the work and assume the ownership of any decisions?


      5. Record the time cost of each process using the PPM Strategy Development Tool.

      Document the high-level description for the new project closure process

      Associated Activity icon 2.2.2e – 30 minutes - 1 hour

      INPUT: High-level description of the process at the target state

      OUTPUT: Updated PPM strategic plan

      Materials: PPM Strategic Plan Template

      Participants: PMO Director/ Portfolio Manager

      Update your PPM strategic plan with the new high-level description for the new project closure process. Depending on your current process capability level, you may wish to include additional information on your strategic plan, for example:

      • Updated project closure checklist.
      • Project value review meeting process document.
      • Post-implementation review process document.

      Info-Tech has several research notes that elaborate on aspects of project closure. Upon completion of this PPM strategy blueprint, speak to an Info-Tech account manager or analyst to get started.

      Read Info-Tech’s research notes on project closure:

      • The Importance of Conducting a Post Implementation Review
      • Five Key Steps to Mastering Project Closure
      • ‘Governance’ Will Kill Your Projects

      Review and customize slide 33, “Project closure: target state,” in Info-Tech’s PPM Strategic Plan Template.

      Validate the time and effort spent on projects with a benefits realization process

      Maximizing benefits from projects is the primary goal of PPM. Tracking and reporting on benefits post-project closes the loop on benefits.

      Questions

      • How do validate the project benefits from the original business case?
      • How do we track the benefits?
      • Who reports it? When?

      Benefits

      • Maximize benefits realization by identifying and addressing unforeseen issues or limitations to success.
      • Improve project approval and prioritization by improving validity of the business case definition process.

      Challenges

      • Project sponsors need to be willing to invest time – months and years post-project completion – to validate benefits realization.
      • Portfolio management needs to proactively work with sponsors to facilitate benefits tracking.
      • Business cases need to be well developed and documented to reflect real anticipated benefits.

      Too many projects fail to achieve the originally proposed benefits, and too few organizations are able to identify and address the root causes of those shortfalls.

      Info-Tech Insight

      In reality, benefits realization process extends across the entire project life cycle: during intake, during the execution of the project, and after project completion. Be mindful of this extended scope when you discuss benefits realization in the following activity.

      Keep project benefits front and center with a repeatable benefits realization process

      Info-Tech recommends following a four-step process for benefits realization.

      A diagram of Info-Tech's four-step process for benefits realization. There are four groups that may be involved in any one step, they are laid out on the side as row headers that each step's columns may fall into, 'Business Analysts', 'Project Managers', 'PMO', and 'Governance Layer'. The first step is 'Quantify and validate benefits in business case' which happens 'Before Project' and involves 'Business Analysts' and 'Project Managers'. Step 2 is 'Update projected project benefits' which happens 'During Project' and involves 'Project Managers' and 'PMO'. Step 3 is 'Hand-off benefits realization ownership' which happens at the end of project and involves 'Project Managers', 'PMO' and 'Governance layer'. Step 4 is 'Monitor and report on benefits' which happens 'After Project' and involves 'PMO' and 'Governance layer'.

      Info-Tech Insight

      At the heart of benefits realization is accountability: who is held accountable for projects that don’t realize the benefits and how? Without the buy-in from the entire executive layer team, addressing this issue is very difficult.

      Determine your benefits realization process capability level

      Associated Activity icon 2.2.3a – 10 minutes

      INPUT: Organizational strategy and culture

      OUTPUT: benefits realization capability level

      Materials: PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      Kick-off the discussion about the benefits realization process by reading the capability level descriptions below and discussing which level currently applies to you the most.

      Capability Level Descriptions

      Capability Level 5: OptimizedProject sponsors and key stakeholders are accountable for stated project benefits before, during and after the project. There is a process to maximize the realization of project benefits.
      Capability Level 4: AlignedProject benefits are forecasted and taken into account for approval, updated when changes are made to the project, and monitored/reported after projects are completed.
      Capability Level 3: EngagedProject benefits are forecasted and taken into account for approval, and there is a loosely defined process to report on benefits realization.
      Capability Level 2: DefinedProject benefits are forecasted and taken into account for approval, but there is no process to monitor whether the said benefits are realized.
      Capability Level 1: UnmanagedProjects are approved and initiated without discussing benefits.

      Benchmark the current benefits realization process against strategy-aligned goals

      Associated Activity icon 2.2.3b – 1-2 hours

      INPUT: Documentation describing the current process (e.g. standard operating procedures), Process goals from activity 1.2.1

      OUTPUT: Retrospective review of current process

      Materials: 4x6” recipe cards, Whiteboard

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      Conduct a table-top planning exercise to map out the process currently in place.

      1. Use white 4”x6” recipe cards to write unique steps of a process. Use the benefits realization process from the previous slides as a guide.
      2. Use green cards to write artifacts or deliverables that result from a step.
      3. Use pink cards to write issues, problems, or risks.
      4. Discuss how the process could better achieve the strategy-aligned goals from activity 1.2.1. Keep a list of possible changes in the form of a start-stop-continue retrospective (example below) on a whiteboard.
      StartStopContinue
      • Require “hard monetary value” in business benefits
      • Send project updates before resource management meetings

      Set near- and long-term action items for the benefits realization process

      Associated Activity icon 2.2.3c – 30 minutes - 1 hour

      INPUT: Outcome of the retrospective review, Process goals and metrics from activity 1.2.1

      OUTPUT: Action items for evolving the process to a target state

      Materials: Whiteboard

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      Analyze each item in the start-stop-continue retrospective to compile a set of near-term and long-term action items.

      The near-term plan should include steps that are within the authority of the PMO and do not require approval or investment outside of that authority. The long-term plan should include steps that may require a longer approval process, buy-in of external stakeholders, and the investment of time and money.
      Near-Term Action Items Long-Term Action Items
      For example:
      • Create an “orientation for project sponsors” document.
      • Encourage project managers to re-validate project benefits on an ongoing basis and report any deviation.
      For example:
      • Recruit the finance department’s help in benefits tracking.
      • Require Finance’s sign-off on project benefits in business cases during intake.

      Review and customize slide 35, “Benefits realization: action items,” in Info-Tech’s PPM Strategic Plan Template.

      Draft a high-level description of the benefits realization process at a target state

      Associated Activity icon 2.2.3d – 1-2 hours

      INPUT: Action items for evolving the process to a target state

      OUTPUT: High-level description of the process at the target state

      Materials: Whiteboard, PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      1. Break down the process into several tasks at a high level. Avoid getting into too much detail by limiting the number of steps.
      2. An example of high-level breakdown: benefits realization
        Validate benefits in business case –› Update project benefits during execution –› Hand-off benefits ownership –› Monitor and report on benefits


      3. Describe each task by answering the following questions. Document your response in the PPM Strategic Plan Template.
      4. Question

        Description

        InputWhat information do you need to perform the work?
        OutputWhat artifacts/deliverables are produced as a result?
        Frequency/TimingHow often, and when, will the work be performed?
        ResponsibilityWho will perform the work?
        AccountabilityWho will approve the work and assume the ownership of any decisions?

      5. Record the time cost of each process using the PPM Strategy Development Tool.

      Document the high-level description for the new benefits realization process

      Associated Activity icon 2.2.3e – 30 minutes - 1 hour

      INPUT: High-level description of the process at the target state

      OUTPUT: Updated PPM strategic plan

      Materials: PPM Strategic Plan Template

      Participants: PMO Director/ Portfolio Manager

      Update your PPM strategic plan with the new high-level description for the new benefits realization process. Depending on your current process capability level, you may wish to include additional information on your strategic plan, for example:

      • Updated business plan templates.
      • Communication plan for project sponsors.

      Info-Tech has a dedicated blueprint to help you develop the high-level process description into a fully operationalized process. Upon completion of this PPM strategy blueprint, speak to an Info-Tech account manager or analyst to get started.

      Read Info-Tech’s Establish the Benefits Realization Process blueprint.

      Review and customize slide 36, “Benefits realization: target state,” in Info-Tech’s PPM Strategic Plan Template.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of Barry Cousins.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Sample of activity 2.1.1 'Align your project intake, prioritization, and approval process to the PPM strategy'. Align your project intake, prioritization, and approval process to the PPM strategy

      Examine the process at the current state and develop an action plan to improve it, with a high-level description of the process at a target state and its overhead costs. The outcome of this activity feeds into the overall PPM strategic plan.

      Sample of activity 2.1.2 'Align your resource management process to the PPM strategy'. Align your resource management process to the PPM strategy

      Examine the process at the current state and develop an action plan to improve it, with a high-level description of the process at a target state and its overhead costs. The outcome of this activity feeds into the overall PPM strategic plan.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Sample of activity 2.2.1 'Align your portfolio reporting process to the PPM strategy'.Align your portfolio reporting process to the PPM strategy

      Examine the process at the current state and develop an action plan to improve it, with a high-level description of the process at a target state and its overhead costs. The outcome of this activity feeds into the overall PPM strategic plan.

      Sample of activity 2.2.2 'Align your project closure process to the PPM strategy'.Align your project closure process to the PPM strategy

      Examine the process at the current state and develop an action plan to improve it, with a high-level description of the process at a target state and its overhead costs. The outcome of this activity feeds into the overall PPM strategic plan.

      Sample of activity 2.2.3 'Align your benefits realization process to the PPM strategy'.Align your benefits realization process to the PPM strategy

      Examine the process at the current state and develop an action plan to improve it, with a high-level description of the process at a target state and its overhead costs. The outcome of this activity feeds into the overall PPM strategic plan.

      Develop a Project Portfolio Management Strategy

      PHASE 3

      Complete Your PPM Strategic Plan

      Phase 2 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Complete your PPM strategic plan

      Proposed Time to Completion: 2 weeks
      Step 3.1: Select a right-sized PPM solutionStep 3.2: Finalize your PPM Strategic Plan Template
      Work with an analyst to:
      • Assess your PPM tool requirements to help support your processes.
      Review findings with analyst:
      • Determine the costs and potential benefits of your PPM strategy.
      Then complete these activities…
      • Determine the functionality requirements of the PPM solution.
      • Estimate your PPM tool budget.
      • Review the tool assessment.
      Then complete these activities…
      • Estimate the total cost-in-use of managing the project portfolio.
      • Estimate the benefits of the PPM strategy.
      • Refine and consolidate the near-term action items into a cohesive implementation plan.
      With these tools & templates:
      • PPM Strategy Development Tool
      With these tools & templates:
      • PPM Strategy Development Tool
      • PPM Strategic Plan Template

      Phase 3 Insight:

      • Approach PPM as an evolving discipline that requires adaptability and long-term organizational change. Near-term process improvements should create stakeholder desire for better portfolio visibility and agility over the long term.

      Step 3.1: Select a right-sized PPM solution for supporting your new processes

      PHASE 1

      PHASE 2

      PHASE 3

      1.11.22.12.23.13.2
      Choose the right PPM strategyTranslate strategy into process goalsDefine intake & resource mgmt. processesDefine reporting, closure, & benefits mgmt. processesSelect a right-sized PPM solutionFinalize your PPM strategic plan

      This step will walk you through the following activities:

      • Determine the functionality requirements of a PPM solution in the near and long terms.
      • Estimate your PPM tool budget.
      • Review tool assessment.

      This step involves the following participants:

      • CIO
      • PMO Director/ Portfolio Manager
      • Project Managers
      • IT Managers

      Outcomes of this step

      • List of functional requirements for a PPM solution
      • An estimate budget and cost for supporting a PPM tool in the near and long terms
      • PPM tool requirements for the near and long terms

      Right-size your PPM solution/tool to fit your PPM processes

      Avoid a common pitfall: the disconnect between PPM processes and PPM tools.

      PPM tools act as both a receptacle for portfolio data generated by your processes and a source of portfolio data to drive your processes forward. Therefore, choosing a suitable PPM tool is critical to the success of your PPM strategy:

      • PPM tool inputs must match the type, level of detail, and amount of portfolio data generated by your PPM processes.
      • PPM tool outputs must be useful, insightful, easy to access, and easy to understand for people who engage in your PPM processes.

      User adoption is an often cited cause of failed PPM tool implementation:

      "The biggest problem is getting the team to work with the tool. We need to make sure that we’re not wasting time delving too far down into the tool, yet putting enough information to get useful information back." (IT Director, Financial Services)

      This final step of the blueprint will discuss the choice of PPM tools to ensure the success of PPM strategy by avoiding the process-tool disconnect.

      Common pitfalls for PPM tools

      • Purchasing and implementing a PPM tool before the process is defined and accepted.
      • Poor expectation setting: inability of tools to perform the necessary analysis.
      • Underleveraged: low user/process adoption.
      • Poor integration with the corporate finance function.
      • (WGroup, 2017)

      Leverage PPM tools to get the information you need

      An optimized PPM solution is the vehicle that provides decision makers with four key pieces of information they require when making decisions for your project portfolio:

      • Historical Insight – inform decision makers about how much time and resources have been spent to date, and benchmark the accuracy of prior project estimates and resource allocations.
      • Forecasting – provide a trustworthy estimate of demand on resources and current projects.
      • Portfolio Analytics – analyze portfolio data and generate easy-to-consume reports that provide answers to questions such as:
        • How big is our overall portfolio?
        • How much money/resource time is available?
        • How efficiently are we using our resources?
      • Project Visibility – provide a trustworthy report on the status of current projects and the resources working on them.

      Info-Tech Insight

      Without the proper information, decision makers are driving blind and are forced to make gut feel decisions as opposed to data-informed decisions. Implement a PPM solution to allocate projects properly and ensure time and money don’t vanish without being accounted for.

      Commercial PPM tools have more functionality but are more costly, complex, and difficult to adopt

      • Granular timesheet management
      • Workflow and team collaboration
      • Robust data and application integration
      • Advanced what-if planning
      • Mobile usability
      A map comparing commercial PPM tools by 'Functionality', 'Cost', and 'Difficulty to implement/adopt'. 'Functionality' and 'Difficulty to implement/adopt' share an axis and can be assumed to have a linear relationship. 'Spreadsheets' are low functionality and low cost. 'Google Sites' are low to middling functionality and low cost. 'SharePoint' is middling functionality with a slightly higher cost. The next three start at middling cost and above-average functionality and trend higher in both categories: 'Commercial Entry-Level PPM', 'Commercial Mid-Market PPM', and 'Commercial Enterprise PPM'.
      • Business case scoring and prioritization
      • Multi-user reporting and request portal
      • High-level resource management
      • Project status, cost, and risk tracking

      "Price tags [for PPM tools] vary considerably. Expensive products don't always provide more capability. Inexpensive products are generally low cost for good reason." (Merkhofer)

      Your PPM tool options are not limited to commercial offerings

      Despite the rapid growth in the commercial PPM tool market today, homegrown approaches like spreadsheets and intranet sites continue to be used as PPM tools.

      Kinds of PPM solutions used by Info-Tech clients

      A pie chart visualizing the kinds of PPM solutions that are used by Info-Tech clients. There are three sections, the largest of which is 'Spreadsheet-based, 46%', then 'Commercial, 33%', then 'No solution, 21%'. (Source: Info-Tech Research Group (2016), N=433)

      Category

      Characteristics

      PPM maturity

      Enterprise tool
      • Higher professional services requirements for enterprise deployment
      • Larger reference customers
      High
      Mid-market tool
      • Lower expectation of professional services engaged in initial deployment contract
      • Fewer globally recognizable reference clients
      • Faster deployments
      High
      Entry-level tool
      • Lower cost than mid-market & enterprise PPM tools
      • Limited configurability, reporting, and resource management functionalities
      • Compelling solutions to the organizations that wants to get a fast start to a trial deployment
      Intermediate
      Spreadsheet based
      • Little/no up-front cost, highly customizable to suit your organization’s needs
      • Varying degrees of sophistication
      • Few people in the organization may understand the logic behind the tool; knowledge may not be easily transferrable
      Intermediate Low

      Determine the functional requirements of the PPM solution

      Associated Activity icon 3.1.1 – 20 minutes

      INPUT: PPM strategic plan

      OUTPUT: Modified PPM strategic plan with a proposed choice of PPM tool

      Materials: PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers, IT Managers

      Use the Tool Assessment tab (tab 4) of Info-Tech’s PPM Strategy Development Tool to rate and analyze functional requirements of your PPM solution.

      • Review the list of PPM features provided on column B of tab 4. You can add any desired features not listed.
      • Rate your near-term and long-term feature requirements using the drop-down menus in columns C and D. Your selections here will inform the tool selection bubble chart to the right of the features list.

      Screenshot showing the features list on tab 4 of the PPM Strategy Development Tool.

      Estimate your PPM tool budget

      Associated Activity icon 3.1.2 – 20 minutes

      INPUT: PPM strategic plan

      OUTPUT: Modified PPM strategic plan with a proposed choice of PPM tool

      Materials: PPM Strategy Development Tool

      Participants: CIO, PMO Director/ Portfolio Manager, Project Managers, IT Managers

      Enter the PPM tool budget information on the Tool Assessment tab of Info-Tech’s PPM Strategy Development Tool.

      • As a starting point, it can help to know that low-priced PPM tools cost around $1,000 per user per year. High-priced PPM tools cost around $3,000 per user per year.
      • Software-as-a-Service (SaaS)-based pricing for PPM solutions is increasingly popular. If you plan to purchase perpetual licensing, divide the total implementation and licensing cost by three years to be comparable with a three-year SaaS total cost of ownership analysis.

      Screenshot showing the tool assessment from the PPM Strategy Development Tool with 'Near-Term' and 'Long-Term' budget columns. Notes include 'Enter the number of fully licensed PPM users you expect to provision for and your estimated annual budget for a PPM tool', 'The tool assessment automatically calculates your annual budget per user, which is reflected in the bubble chart analysis (see next slide)'.

      Review the tool assessment graphic

      Associated Activity icon 3.1.3 – 20 minutes

      The map comparing commercial PPM tools from before, this time overlaid with 'Near-Term' and 'Long-Term' budgets as coloured circles. The vertical axis is 'Functionality Rating' and the horizontal axis is now 'Annual Cost/Budget per User'. 'Spreadsheets' are low functionality and low cost. 'Google Sites' are low to middling functionality and low cost. 'SharePoint' is middling functionality with a slightly higher cost. The 'Near-Term' budget circle covers those three tools. The next three start at middling cost and above-average functionality and trend higher in both categories: 'Commercial Entry-Level PPM', 'Commercial Mid-Market PPM', and 'Commercial Enterprise PPM'. The 'Long-Term' budget circle covers 'Commercial Mid-Market PPM'.

      If you are in one of the non-covered areas, consider revisiting your functional requirements and PPM strategy. You may need to lessen your expectations to be able to stay within your budget, or find a way to get more money.

      Keep in mind that the long-term goal can be to work towards a commercial tool, while the short-term goal would be to be able to maintain your portfolio in a simple spreadsheet first.

      Info-Tech Insight

      If you choose a commercial solution, you will need to gain executive buy-in in order to implement the tool; proceed to near-term and long-term plans to get the ball rolling on this decision.

      Review and customize slide 37, “Tools for PPM: proposed near- and long-term solutions,” in Info-Tech’s PPM Strategic Plan Template.

      Grow your own, or select and implement, a PPM solution with Info-Tech

      Whether you choose spreadsheet-based or commercially available PPM solutions, use Info-Tech’s research for scoping, designing, and implementing them.

      Info-Tech’s Grow Your Own PPM Solution blueprint will help you implement a highly evolved spreadsheet-based PPM solution. It features the Portfolio Manager 2017, a Microsoft Excel-based workbook that leverages its business intelligence features to provide a basis for implementing a scalable, highly customizable PPM tool with useful and easy-to-manipulate analytics.

      Read Info-Tech’s Grow Your Own PPM Solution blueprint.

      Info-Tech’s Select and Implement a PPM Solution blueprint is part of our Vendor Landscape research. Make sense of the diversity of PPM solutions available in today’s market, and choose the most appropriate solutions for your organization’s size and level of PPM maturity.

      Read Info-Tech’s Select and Implement a PPM Solution blueprint.

      A right-sized PPM strategy leads to a right-sized portfolio management tool based on Info-Tech’s template

      CASE STUDY

      Industry: Energy
      Source: Info-Tech Client

      “The approach makes it easy to run the portfolio without taking time away from the project themselves.” (IT Manager, Energy Resources Firm)

      Situation

      • A small IT department struggled with balancing project work with ongoing operational management and support work.
      • The department includes experienced and successful project managers and a mature, skilled team.
      • However, the nature of the department’s role has evolved to the point where the project and operational work demands have exceeded the available time.
      • Prioritization needed to become more centralized and formalized while management control of the work assignments became increasingly decentralized.

      Complication

      • Agile projects offer clear advantages by lightening the requirement for proactive planning. However, getting the staff to adapt would be challenging because of the overall workload and competing priorities.
      • Some of the team’s time needed to be carefully tracked and reported for time & materials-based billing, but the time sheet system was unsuited to their portfolio management needs.
      • Commercial PPM systems were ruled out because strict task management seemed unlikely to gain adoption.

      Resolution

      • The team deployed Info-Tech’s Project Portfolio Workbook, based on a Microsoft Excel template, and the Grow Your Own PPM Solution blueprint.
      • For the first time, executive leadership was given a 12-month forecast of resource capacity based on existing and pending project commitments. The data behind the capacity forecast was based on allocating people to projects with a percentage of their time for each calendar month.
      • The data behind the forecast is high level but easily maintainable.

      Step 3.2: Finalize customizing your PPM Strategic Plan Template

      PHASE 1

      PHASE 2

      PHASE 3

      1.11.22.12.23.13.2
      Choose the right PPM strategyTranslate strategy into process goalsDefine intake & resource mgmt. processesDefine reporting, closure, & benefits mgmt. processesSelect a right-sized PPM solutionFinalize your PPM strategic plan

      This step will walk you through the following activities:

      • Determine the costs of support your PPM strategic plan.
      • Estimate some of the benefits of your PPM strategic plan.
      • Perform a cost-benefit analysis.
      • Refine and consolidate the near-term action items into a cohesive plan.

      This step involves the following participants:

      • CIO
      • PMO Director/ Portfolio Manager
      • Project Managers
      • IT Managers

      Outcomes of this step

      • A cost/benefit analyst
      • An implementation action plan
      • A finalized PPM Strategic Plan Template

      Estimate the total cost-in-use of managing the project portfolio

      Supporting Tool icon 3.2.1 – PPM Strategy Development Tool, Tab 5: Costing Summary

      The time cost of PPM processes (tab 3) and PPM tool costs (tab 4) are summarized in this tab. Enter additional data to estimate the total PPM cost-in-use: the setup information and the current cost of PPM software tools.

      Screenshot of the PPM Strategy Development Tool, Tab 5: Costing Summary. Notes include 'If unknown, the overall HR budget of your project portfolio can be estimated as: (# FTEs) * (fully-loaded FTE cost per hour) * 1800', 'This is your total PPM cost-in-use'.

      Estimate the benefits of managing the project portfolio

      Supporting Tool icon 3.2.2 – PPM Strategy Development Tool, Tab 6: Benefits Assumptions

      The benefits of PPM processes are estimated by projecting the sources of waste on your resource capacity.

      1. Estimate the current extent of waste on your resource capacity. If you have completed Info-Tech’s PPM Current Score Scorecard, enter the data from the report.
      2. Screenshot of a Waste Assessment pie chart from the PPM Strategy Development Tool, Tab 6: Benefits Assumptions.
      3. Given your near- and long-term action items for improving PPM processes, estimate how each source of waste on your resource capacity will change.
      4. Screenshot of a Waste Assessment table titled 'These inputs represent the percentage of your overall portfolio budget that is wasted in each scenario' from the PPM Strategy Development Tool, Tab 6: Benefits Assumptions.

      Review the cost-benefit analysis results and update the PPM Strategic Plan Template

      Supporting Tool icon 3.2.3 – PPM Strategy Development Tool, Tab 7: Conclusion Screenshot of a 'PPM Strategy Cost-Benefit Analysis' from the PPM Strategy Development Tool, Tab 7: Conclusion. It has tables on top and bar charts underneath.

      This tab summarizes the costs and benefits of your PPM strategic plan.

      • Costs are estimated from wasted project capacity and time spent on PPM process work.
      • Benefits are estimated from the project capacity to be reclaimed as a result of improvements in PPM.
      • Return on investment is calculated by dividing the value of project capacity to be reclaimed by investment in PPM in addition to the current-state cost.

      Capture this summary in your PPM strategic plan.

      Customize slides 40 and 41, “Return on PPM investment,” in Info-Tech’s PPM Strategic Plan Template.

      Determine who will be responsible for coordinating the flow, collection, and reporting of portfolio data

      Supporting Tool icon 3.2.3 – Project Portfolio/PMO Analyst Job Description

      You will need to determine responsibilities and accountabilities for portfolio management functions within your team.

      If you do not have a clearly identifiable portfolio manager at this time, you will need to clarify who will wear which hats in terms of facilitating intake and prioritization, high-level capacity awareness, and portfolio reporting.

      • Use Info-Tech’s Project Portfolio Analyst Job Description Template to help clarify some of the required responsibilities to support your PPM strategy.
        • If you need to bring in an additional staff member to help support the strategy, you can customize the job description template to help advertise the position. Simply edit the text in grey within the template.
      • If you have other PPM tasks that you need to define responsibilities for, you can use the RASCI chart on the final tab of the PPM Strategy Develop Tool.

      Download Info-Tech’s Project Portfolio Analyst Job Description Template.

      Sample of Info-Tech's Project Portfolio Analyst Job Description Template.

      Refine and consolidate the near-term action items into a cohesive plan

      Associated Activity icon 3.2.4 – 30 minutes

      INPUT: Near-term action items

      OUTPUT: Near-term action plan

      Materials: PPM Strategy Development Tool

      Participants: PMO Director/ Portfolio Manager, Project Managers, Resource Managers, Business Analysts

      Collect the near-term action items for each of the five PPM processes and arrange them into a table that outlines the near-term action plan. Once it is compiled, adjust the timeline and responsibility so that the plan is coherent and realistic as a whole.

      Example:

      Outcome

      Action required

      Timeline

      Responsibility

      Determine the percentage distribution of project vs. non-project work Run a time audit survey with all project resources 2 weeks Resource managers
      Test a simple dashboard for project status Pilot Info-Tech’s Portfolio Manager 2017 workbook 2 weeks PMO Director

      "There is a huge risk of taking on too much too soon, especially with the introduction of specific tools and tool sets. There is also an element of risk involved that can lead to failure and disappointment with PPM if these tools are not properly introduced and supported." (Jim Carse, Director of the Portfolio Office, Queen’s University)

      Review and customize slide 43, “Summary of near-term action plan,” in Info-Tech’s PPM Strategic Plan Template.

      Finalize and publish your PPM strategic plan

      Table of Contents

      Read over the document to ensure its completeness and consistency.

      At this point, you have a PPM strategic plan that is actionable and realistic, which addresses the goals set by the senior leadership.

      The executive brief establishes the need for PPM strategy, the goals and metrics are set by members of the senior leadership that gave the initial buy-in, and the target states of PPM processes that meet those goals are described. Finally, the costs and benefits of the improved PPM practice are laid out in a way that can be validated.

      The next step for your PPM strategy is to use this document as a foundation for implementing and operationalizing the target-state PPM processes.

      Review and publish the document for your executive layer and key project stakeholders. Solicit their feedback.

      Info-Tech has a library of blueprints that will guide you through each of the five processes. Contact your Info-Tech account manager or Info-Tech analyst to get started.

      • Project Portfolio Management Strategy
        • Strategic Expectations
        • Overview
      • Leadership Mandate
      • Project Demand and Resource Supply
      • The Current State of Resource Utilization
      • PPM Processes
        • Project intake, prioritization, and approval
        • Resource management
        • Portfolio reporting
        • Project closure
        • Benefits realization
        • Tools for PPM
      • The Economic Impact of PPM
      • PPM Strategy Next Steps

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of Barry Cousins.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Sample of activity 3.1 'Scope the right-sized PPM solution for your PPM strategy'. Scope the right-sized PPM solution for your PPM strategy

      Use the PPM Strategy Development Tool to quickly determine our near- and long-term recommendation for your PPM solution.

      Sample of activity 3.2 'Conduct a cost-benefit analysis of your PPM strategic plan'. Conduct a cost-benefit analysis of your PPM strategic plan

      Using the time cost estimates of each process and the requirement for a PPM tool, Info-Tech helps you quantify the overhead costs of PPM and estimate the monetary benefits of reclaimed project capacity for your project portfolio.

      Insight breakdown

      Insight 1

      • Executive layer buy-in is a critical prerequisite for the success of a top-down PPM strategy. Ensure your executives are on board before preceding to implement your PPM strategy.

      Insight 2

      • The means of project and portfolio management (i.e. processes) shouldn’t eclipse the ends – strategic goals. Root your process in your PPM strategic goals to realize PPM benefits (e.g. optimized portfolio value, improved project throughput, increased stakeholder satisfaction).

      Insight 3

      • Without the proper information, decision makers are driving blind and are forced to make gut-feel decisions as opposed to data-informed decisions. Implement a PPM solution to allocate projects properly and ensure time and money don’t vanish without being accounted for.

      Summary of accomplishment

      Knowledge Gained

      • Info-Tech’s thought model on PPM processes that create an infrastructure around projects
      • Your current state of project portfolio: project capacity vs. project demand
      • Importance of gaining executive buy-in for installing the PPM practice

      Processes Optimized

      • Project intake, prioritization, and approval process
      • Resource management process
      • Portfolio reporting process
      • Project closure process
      • Benefits realization process

      Deliverables Completed

      • Choice of PPM strategy and the leadership mandate
      • Analysis of current project capacity and demand
      • PPM process goals and metrics, aligned to meet PPM strategic expectations
      • PPM process capability levels
      • Retrospective examination of current state, near/long-term action items for improvement, and high-level descriptions of the five PPM processes
      • Recommendation of PPM tools to support the processes
      • Estimate of PPM overhead costs
      • Cost-benefit analysis of PPM practice
      • PPM strategic plan

      Related Info-Tech Research

      • Develop a Project Portfolio Management Strategy
      • Grow Your Own PPM Solution
      • Optimize Project Intake, Approval, and Prioritization
      • Develop a Resource Management Strategy for the New Reality
      • Manage a Minimum-Viable PMO
      • Establish the Benefits Realization Process
      • Manage an Agile Portfolio
      • Establish the Benefits Realization Process
      • Project Portfolio Management Diagnostic Program
        The Project Portfolio Management Diagnostic Program is a low-effort, high-impact program designed to help project owners assess and improve their PPM practices. Gather and report on all aspects of your PPM environment in order to understand where you stand and how you can improve.

      Research contributors and experts

      Photo of Kiron D. Bondale PMP, PMI-RMP, CDAP, CDAI, Senior Project Portfolio Management Professional Kiron D. Bondale PMP, PMI-RMP, CDAP, CDAI
      Senior Project Portfolio Management Professional

      Kiron has worked in the project management domain for more than fifteen years managing multiple projects, leading Project Management Offices (PMO) and providing project portfolio management consulting services to over a hundred clients across multiple industries. He has been an active member of the Project Management Institute (PMI) since 1999 and served as a volunteer director on the Board of the PMI Lakeshore Chapter for six years. Kiron has published articles on project and project portfolio management in multiple journals and has delivered over a hundred webinar presentations on a variety of PPM and PM topics and has presented at multiple industry conferences. Since 2009, Kiron has been blogging on a weekly basis on project management topics and responds to questions daily in the LinkedIn PMI Project, Program and Portfolio Management discussion group.

      Photo of Shaun Cahill, Project Manager, Queen’s University Shaun Cahill, Project Manager &
      Jim Carse, Director of the Project Portfolio Office
      Queen’s University

      Research contributors and experts

      Photo of Amy Fowler Stadler, Managing Partner, Lewis Fowler Amy Fowler Stadler, Managing Partner
      Lewis Fowler

      Amy has more than 20 years of experience in business and technology, most recently owning her own management consulting firm since 2002, focused on business transformation, technology enablement, and operational improvement. Prior to that, she was at CenturyLink (formerly Qwest) as an IT Director, Perot Systems in various roles, and Information Handling Services, Inc. as a Software Development Product Manager.

      Amy holds a bachelor’s degree in Computer Science with a minor in Business Communications and is also a 2015 Hall of Fame inductee to Illinois State University College of Applied Science and Technology.

      Photo of Rick Morris, President, R2 Consulting LLC Rick Morris, President
      R2 Consulting LLC

      Rick A. Morris, PMP, is a certified Scrum Agile Master, Human Behavior Consultant, best-selling author, mentor, and evangelist for project management. Rick is an accomplished project manager and public speaker. His appetite for knowledge and passion for the profession makes him an internationally sought after speaker delivering keynote presentations for large conferences and PMI events around the world. He holds the PMP (Project Management Professional), MPM (Masters of Project Management), Scrum Agile Master, OPM3, Six Sigma Green Belt, MCITP, MCTS, MCSE, TQM, ATM-S, ITIL, and ISO certifications, and is a John Maxwell Certified Speaker, Mentor, and Coach. Rick is the Owner of R2 Consulting, LLC and has worked for organizations such as GE, Xerox, and CA, and has consulted with numerous clients in a wide variety of industries including financial services, entertainment, construction, non-profit, hospitality, pharmaceutical, retail, and manufacturing.

      Research contributors and experts

      Photo of Terry Lee Ricci PgMP, PfMP, PMP, PPM Practice Lead, IAG Consulting Terry Lee Ricci PgMP, PfMP, PMP, PPM Practice Lead
      IAG Consulting

      Terry is passionate and highly skilled at PMO transformation, developing high-performing teams that sustain long-term business results. Terry has a reputation built upon integrity, resourcefulness, and respect. She has the vision to implement long and short-term strategies, meeting both current and evolving business needs.

      Change Management/Business transformation: Terry has extensive background in PMO strategy development aligned to corporate goals. Many years in the PMO organization integration/transformation building or overhauling programs and processes.

      Governance: Terry loves to monitor and measure performance and outcomes and uses her collaborative style to successfully bring simplicity to complexity (technology – people – process). Performance optimization results are easy to use and clearly define who is doing what across functions. End results consistently align to business strategy while mitigating risks effectively.

      Comprehensive: A “through the ranks” executive with a comprehensive understanding of PMO operations, high-performance teams, and the respective business units they support.

      Photo of Alana Ruckstuhl MSc, IT Project Officer, Federal Economic Development Agency for Southern Ontario Alana Ruckstuhl MSc, IT Project Officer
      Federal Economic Development Agency for Southern Ontario

      Research contributors and experts

      Photo of Jay Wardle, Director of the PMO, Red Wing Shoes Co. Jay Wardle, Director of the PMO
      Red Wing Shoes Co.
      Photo of Bob White, Vice President/Chief Information Officer, ALM Holding Company Bob White, Vice President/Chief Information Officer
      ALM Holding Company

      As vice president and chief information officer for ALM Holding Company, Bob White directs all technology activity and support for three main verticals: road construction, energy management, and delivery and transportation. He has been with ALM Holding Company for one and a half years, focusing on PPM process improvement, cybersecurity initiatives, and IT service management.

      Prior to joining ALM, Bob was executive vice president/chief information officer at Ashley Furniture Industries, Inc. where he led the strategic direction, implementation, and management of information technology throughout the company’s global operations. Bob has also held VP/CIO positions at the Stride Rite Corporation and Timex Corporation.

      Bob holds a Master’s degree in Operations Management from the University of Arkansas and a Bachelor of Science degree in Industrial Engineering from Southern Illinois University.

      Bibliography

      Bersin, Josh. “Time to Scrap Performance Appraisals?” Forbes Magazine, 5 June 2013. Web. 30 Oct 2013.

      Cheese, Peter et al. “Creating an Agile Organization.” Accenture, Oct. 2009. Web. Nov. 2013.

      Croxon, Bruce et al. “Dinner Series: Performance Management with Bruce Croxon from CBC's 'Dragon's Den'” HRPA Toronto Chapter. Sheraton Hotel, Toronto, ON. 12 Nov. 2013. Panel discussion.

      Culbert, Samuel. “10 Reasons to Get Rid of Performance Reviews.” Huffington Post Business, 18 Dec. 2012. Web. 28 Oct. 2013.

      Denning, Steve. “The Case Against Agile: Ten Perennial Management Objections.” Forbes Magazine, 17 Apr. 2012. Web. Nov. 2013.

      Estis, Ryan. “Blowing up the Performance Review: Interview with Adobe’s Donna Morris.” Ryan Estis & Associates, 17 June 2013. Web. Oct. 2013.

      Gallup, Inc. “Gallup Study: Engaged Employees Inspire Company Innovation.” Gallup Management Journal, 12 Oct. 2006. Web. 12 Jan 2012.

      Gartside, David et al. “Trends Reshaping the Future of HR.” Accenture, 2013. Web. 5 Nov. 2013.

      KeyedIn Solutions. “Why PPM and PMOs Fail.” KeyedIn Projects, 2013. Ebook.

      Lessing, Lawrence. Free Culture. Lulu Press Inc.: 30 July 2016.

      Merkhofer, Lee. “Keys to Implementing Project Portfolio Management.” Lee Merkhofer Consulting, 2017.

      Perry, Mark Price. Business Driven Project Portfolio Management. J Ross Pub: 17 May 2011.

      Project Management Institute. “Pulse of the Profession 2015: Capturing the Value of Project Management.” PMI, Feb. 2015. Web.

      Project Management Institute. “Pulse of the Profession 2016: The High Cost of Low Performance.” PMI, 2016. Web.

      Project Management Institute. “Pulse of the Profession 2017: Success Rates Rise.” PMI, 2017. Web.

      Project Management Institute. The Standard for Portfolio Management – Third Edition. PMI: 1 Dec. 2012.

      WGroup. “Common Pitfalls in Project Portfolio Management – Part 2.” WGroup, 24 Jan. 2017. Web.

      Automate Work Faster and More Easily With Robotic Process Automation

      • Buy Link or Shortcode: {j2store}237|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization
      • Your organization has many business processes that rely on repetitive, routine manual data collection and processing work, and there is high stakeholder interest in automating them.
      • You’re investigating whether robotic process automation (RPA) is a suitable technological enabler for automating such processes.
      • Being a trending technology, especially with its association with artificial intelligence (AI), there is much marketing fluff, hype, and misunderstanding about RPA.
      • Estimating the potential impact of RPA on business is difficult, as the relevant industry statistics often conflict each other and you aren’t sure how applicable it is to your business.

      Our Advice

      Critical Insight

      • There are no physical robots in RPA. RPA is about software “bots” that interact with applications as if they were human users to perform routine, repetitive work in your place. It’s for any business in any industry, not just for manufacturing.
      • RPA is lightweight IT; it reduces the cost of entry, maintenance, and teardown of automation as well as the technological requirement of resources that maintain it, as it complements existing automation solutions in your toolkit.
      • RPA is rules-based. While AI promises to relax the rigidity of rules, it adds business risks that are poorly understood by both businesses and subject-matter experts. Rules-based “RPA 1.0” is mature and may pose a stronger business case than AI-enabled RPA.
      • RPA’s sweet spot is “swivel chair automation”: processes that require human workers to act as a conduit between several systems, moving between applications, manually keying, re-keying, copying, and pasting information. A bot can take their place.

      Impact and Result

      • Discover RPA and how it differentiates from other automation solutions.
      • Understand the benefits and risks of complementing RPA with AI.
      • Identify existing business processes best suited for automation with RPA.
      • Communicate RPA’s potential business benefits to stakeholders.

      Automate Work Faster and More Easily With Robotic Process Automation Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should use RPA to automate routine, repetitive data collection and processing work, review Info-Tech’s methodology, and understand the ways we can support you.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Discover robotic process automation

      Learn about RPA, including how it compares to IT-led automation rooted in business process management practices and the role of AI.

      • Automate Work Faster and More Easily With Robotic Process Automation – Phase 1: Discover Robotic Process Automation
      • Robotic Process Automation Communication Template

      2. Identify processes best suited for robotic process automation

      Identify and prioritize candidate processes for RPA.

      • Automate Work Faster and More Easily With Robotic Process Automation – Phase 2: Identify Processes Best Suited for Robotic Process Automation
      • Process Evaluation Tool for Robotic Process Automation
      • Minimum Viable Business Case Document
      [infographic]

      Achieve Digital Resilience by Managing Digital Risk

      • Buy Link or Shortcode: {j2store}375|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $123,999 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance

      Businesses are expected to balance achieving innovation through initiatives that transform the organization with effective risk management. While this is nothing new, added challenges arise due to:

      • An increasingly large vendor ecosystem within which to manage risk.
      • A fragmented approach to risk management that separates cyber and IT risk from enterprise risk.
      • A rapidly growing number of threat actors and a larger attack surface.

      Our Advice

      Critical Insight

      • All risks are digital risks.
      • Manage digital risk with a collaborative approach that supports digital transformation, ensures digital resilience, and distributes responsibility for digital risk management across the organization.

      Impact and Result

      Address digital risk to build digital resilience. In the process, you will drive transformation and maintain digital trust among your employees, end users, and consumers by:

      • Defining digital risk, including primary risk categories and prevalent risk factors.
      • Leveraging industry examples to help identify external risk considerations.
      • Building a digital risk profile, addressing core risk categories, and creating a correlating plan for digital risk management.

      Achieve Digital Resilience by Managing Digital Risk Research & Tools

      Start here – read the Executive Brief

      Risk does not exist in isolation and must extend beyond your cyber and IT teams. Read our concise Executive Brief to find out how to manage digital risk to help drive digital transformation and build your organization's digital resilience.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Redefine digital risk and resilience

      Discover an overview of what digital risk is, learn how to assess risk factors for the five primary categories of digital risk, see several industry-specific scenarios, and explore how to plan for and mitigate identified risks.

      • Achieve Digital Resilience by Managing Digital Risk – Phases 1-2
      • Digital Risk Management Charter

      2. Build your digital risk profile

      Begin building the digital risk profile for your organization, identify where your key areas of risk exposure exist, and assign ownership and accountability among the organization’s business units.

      • Digital Risk Profile Tool
      • Digital Risk Management Executive Report
      [infographic]

      Workshop: Achieve Digital Resilience by Managing Digital Risk

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Scope and Define Digital Risk

      The Purpose

      Develop an understanding and standard definition of what digital risk is, who it impacts, and its relevance to the organization.

      Key Benefits Achieved

      Understand what digital risk means and how it differs from traditional enterprise or cybersecurity risk.

      Develop a definition of digital risk that recognizes the unique external and internal considerations of your organization.

      Activities

      1.1 Review the business context

      1.2 Review the current roles of enterprise, IT, and cyber risk management within the organization

      1.3 Define digital transformation and list transformation initiatives

      1.4 Define digital risk in the context of the organization

      1.5 Define digital resilience in the context of the organization

      Outputs

      Digital risk drivers

      Applicable definition of digital risk

      Applicable definition of digital resilience

      2 Make the Case for Digital Risk Management

      The Purpose

      Understand the roles digital risk management and your digital risk profile have in helping your organization achieve safe, transformative growth.

      Key Benefits Achieved

      An overview and understanding of digital risk categories and subsequent individual digital risk factors for the organization

      Industry considerations that highlight the importance of managing digital risk

      A structured approach to managing the categories of digital risk

      Activities

      2.1 Review and discuss industry case studies and industry examples of digital transformation and digital risk

      2.2 Revise the organization's list of digital transformation initiatives (past, current, and future)

      2.3 Begin to build your organization's Digital Risk Management Charter (with inputs from Module 1)

      2.4 Revise, customize, and complete a Digital Risk Management Charter for the organization

      Outputs

      Digital Risk Management Charter

      Industry-specific digital risks, factors, considerations, and scenarios

      The organization's digital risks mapped to its digital transformation initiatives

      3 Build Your Digital Risk Profile

      The Purpose

      Develop an initial digital risk profile that identifies the organization’s core areas of focus in managing digital risk.

      Key Benefits Achieved

      A unique digital risk profile for the organization

      Digital risk management initiatives that are mapped against the organization's current strategic initiatives and aligned to meet your digital resilience objectives and benchmarks

      Activities

      3.1 Review category control questions within the Digital Risk Profile Tool

      3.2 Complete all sections (tabs) within the Digital Risk Profile Tool

      3.3 Assess the results of your Digital Risk Profile Tool

      3.4 Discuss and assign initial weightings for ownership of digital risk among the organization's stakeholders

      Outputs

      Completion of all category tabs within the Digital Risk Profile Tool

      Initial stakeholder ownership assignments of digital risk categories

      4 Manage Your Digital Risk

      The Purpose

      Refine the digital risk management plan for the organization.

      Key Benefits Achieved

      A targeted, organization-specific approach to managing digital risk as a part of the organization's projects and initiatives on an ongoing basis

      An executive presentation that outlines digital risk management for your senior leadership team

      Activities

      4.1 Conduct brief information sessions with the relevant digital risk stakeholders identified in Module 3.

      4.2 Review and revise the organization's Digital Risk Profile as necessary, including adjusting weightings for the digital risk categories

      4.3 Begin to build an actionable digital risk management plan

      4.4 Present your findings to the organization's relevant risk leaders and executive team

      Outputs

      A finalized and assessed Digital Risk Profile Tool

      Stakeholder ownership for digital risk management

      A draft Digital Risk Management plan and Digital Risk Management Executive Report

      Create a Transparent and Defensible IT Budget

      • Buy Link or Shortcode: {j2store}291|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $29,682 Average $ Saved
      • member rating average days saved: 12 Average Days Saved
      • Parent Category Name: Cost & Budget Management
      • Parent Category Link: /cost-and-budget-management
      • IT struggles to gain budget approval year after year, largely driven by a few key factors:
        • For a long time, IT has been viewed as a cost center whose efficiency needs to be increasingly optimized over time. IT’s relationship to strategy is not yet understood or established in many organizations.
        • IT is one of the biggest areas of cost for many organizations. Often, executives don’t understand or even believe that all that IT spending is necessary to advance the organization’s objectives, let alone keep it up and running.

      Our Advice

      Critical Insight

      Internal and external obstacles beyond IT’s control make these challenges with gaining IT budget approval even harder to overcome:

      • Economic pressures can quickly drive IT’s budgetary focus from strategic back to tactical.
      • Corporate-driven categorizations of expenditure, plus disconnected approval mechanisms for capital vs. operational spend, hide key interdependencies and other aspects of IT’s financial reality.
      • Connecting the dots between IT activities and business benefits rarely forms a straight line.

      Impact and Result

      • CIOs need a straightforward way to create and present an approval-ready budget.
        • Info-Tech recognizes that connecting the dots to demonstrate value is key to budgetary approval.
        • Info-Tech also recognizes that key stakeholders require different perspectives on the IT budget.
        • This blueprint provides a framework, method, and templated exemplars for creating and presenting an IT budget to stakeholders that will speed up the approval process and ensure more of it is approved.

      Create a Transparent and Defensible IT Budget Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create a Transparent and Defensible IT Budget Storyboard – A step-by-step guide to developing a proposed IT budget that’s sensitive to stakeholder perspectives and ready to approve.

      This deck applies Info-Tech’s proven ITFM Cost Model to the IT budgeting process and offers five phases that cover the purpose of your IT budget and what it means to your stakeholders, key budgeting resources, forecasting, selecting and fine-tuning your budget message, and delivering your IT budget executive presentation for approval.

      • Create a Transparent and Defensible IT Budget Storyboard

      2. IT Cost Forecasting and Budgeting Workbook – A structured Excel tool that allows you to forecast your IT budget for next fiscal year across four key stakeholder views, analyze it in the context of past expenditure, and generate high-impact visualizations.

      This Excel workbook offers a step-by-step approach for mapping your historical and forecasted IT expenditure and creating visualizations you can use to populate your IT budget executive presentation.

      • IT Cost Forecasting and Budgeting Workbook

      3. Sample: IT Cost Forecasting and Budgeting Workbook – A completed IT Cost Forecasting & Budgeting Workbook to review and use as an example.

      This sample workbook offers a completed example of the “IT Cost Forecasting and Budgeting Workbook” that accompanies the Create a Transparent & Defensible IT Budget blueprint.

      • Sample: IT Cost Forecasting and Budgeting Workbook

      4. IT Budget Executive Presentation – A PowerPoint template and full example for pulling together your proposed IT budget presentation.

      This presentation template offers a recommended structure for presenting your proposed IT budget for next fiscal year to your executive stakeholders for approval. 

      [infographic]

      Workshop: Create a Transparent and Defensible IT Budget

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Get into budget-starting position

      The Purpose

      Understand your IT budget in the context of your organization and key stakeholders, as well as gather your budgeting data and review previous years’ financial performance.

      Key Benefits Achieved

      Understand your organization’s budget process and culture.

      Understand your stakeholders’ priorities and perspectives regarding your IT budget.

      Gain insight into your historical IT expenditure.

      Set next fiscal year’s IT budget targets.

      Activities

      1.1 Review budget purpose. 

      1.2 Understand stakeholders and approvers.

      1.3 Gather your data.

      1.4 Map and review historical financial performance.

      1.5 Rationalize last year’s variances and set next year's budget targets.

      Outputs

      Budget process and culture assessment.

      Stakeholder alignment assessment and pre-selling strategy.

      Data prepared for next steps.

      Mapped historical expenditure.

      Next fiscal year’s budget targets.

      2 Forecast project CapEx

      The Purpose

      Develop a forecast of next fiscal year’s proposed capital IT expenditure driven by your organization’s strategic projects.

      Key Benefits Achieved

      Develop project CapEx forecast according to the four different stakeholder views of Info-Tech’s ITFM Cost Model.

      Ensure that no business projects that have IT implications (and their true costs) are missed.

      Activities

      2.1 Review the ITFM cost model

      2.2 List projects.

      2.3 Review project proposals and costs.

      2.4 Map and tally total project CapEx.

      2.5 Develop and/or confirm project-business alignment, ROI, and cost-benefit statements.

      Outputs

      Confirmed ITFM cost mdel.

      A list of projects.

      Confirmed list of project proposals and costs.

      Forecasted project-based capital expenditure mapped against the four views of the ITFM Cost Model.

      Projects financials in line.

      3 Forecast non-project CapEx and OpEx

      The Purpose

      Develop a forecast of next fiscal year’s proposed “business as usual” non-project capital and operating IT expenditure.

      Key Benefits Achieved

      Develop non-project CapEx and non-project OpEx forecasts according to the four different stakeholder views of Info-Tech’s ITFM Cost Model.

      Make “business as usual” costs fully transparent and rationalized.

      Activities

      3.1 Review non-project capital and costs. 

      3.2 Review non-project operations and costs.

      3.3 Map and tally total non-project CapEx and OpEx.

      3.4 Develop and/or confirm proposed expenditure rationales.

      Outputs

      Confirmation of non-project capital and costs.

      Confirmation of non-project operations and costs.

      Forecasted non-project-based capital expenditure and operating expenditure against the four views of the ITFM Cost Model.

      Proposed expenditure rationales.

      4 Finalize budget and develop presentation

      The Purpose

      Aggregate and sanity-check your forecasts, harden your rationales, and plan/develop the content for your IT budget executive presentation.

      Key Benefits Achieved

      Create a finalized proposed IT budget for next fiscal year that offers different views on your budget for different stakeholders.

      Select content for your IT budget executive presentation that will resonate with your stakeholders and streamline approval.

      Activities

      4.1 Aggregate forecast totals and sanity check.

      4.2 Generate graphical outputs and select content to include in presentation.

      4.3 Fine-tune rationales.

      4.4 Develop presentation and write commentary.

      Outputs

      Final proposed IT budget for next fiscal year.

      Graphic outputs selected for presentation.

      Rationales for budget.

      Content for IT Budget Executive Presentation.

      5 Next steps and wrap-up (offsite)

      The Purpose

      Finalize and polish the IT budget executive presentation.

      Key Benefits Achieved

      An approval-ready presentation that showcases your business-aligned proposed IT budget backed up with rigorous rationales.

      Activities

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Outputs

      Completed IT Budget Executive Presentation.

      Review scheduled.

      Further reading

      Create a Transparent and Defensible IT Budget

      Build in approvability from the start.

      EXECUTIVE BRIEF

      Analyst Perspective

      A budget’s approvability is about transparency and rationale, not the size of the numbers.

      Jennifer Perrier.

      It’s that time of year again – budgeting. Most organizations invest a lot of time and effort in a capital project selection process, tack a few percentage points onto last year’s OpEx, do a round of trimming, and call it a day. However, if you want to improve IT financial transparency and get your business stakeholders and the CFO to see the true value of IT, you need to do more than this.

      Yourcrea IT budget is more than a once-a-year administrative exercise. It’s an opportunity to educate, create partnerships, eliminate nasty surprises, and build trust. The key to doing these things rests in offering a range of budget perspectives that engage and make sense to your stakeholders, as well as providing iron-clad rationales that tie directly to organizational objectives.

      The work of setting and managing a budget never stops – it’s a series of interactions, conversations, and decisions that happen throughout the year. If you take this approach to budgeting, you’ll greatly enhance your chances of creating and presenting a defensible annual budget that gets approved the first time around.

      Jennifer Perrier
      Principal Research Director
      IT Financial Management Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      IT struggles to gain budget approval year after year, largely driven by a few key factors:

      • For a long time, IT has been viewed as a cost center whose efficiency needs to be increasingly optimized over time. IT’s relationship to strategy is not yet understood or established in many organizations.
      • IT is one of the biggest areas of cost for many organizations. Often, executives don’t understand, or even believe, that all that IT spending is necessary to advance the organization’s objectives, let alone keep it running.

      Internal and external obstacles beyond IT’s control make these challenges even harder to overcome:

      • Economic pressures can quickly drive IT’s budgetary focus from strategic back to tactical.
      • Corporate-driven categorizations of expenditure, plus disconnected approval mechanisms for capital vs. operational spend, hide key interdependencies and other aspects of IT’s financial reality.
      • Connecting the dots between IT activities and business benefits rarely forms a straight line.

      CIOs need a straightforward way to create and present an approval-ready budget.

      • Info-Tech recognizes that connecting the dots to demonstrate value is key to budgetary approval.
      • Info-Tech also recognizes that key stakeholders require different perspectives on the IT budget.
      • This blueprint provides a framework, method, and templated exemplars for creating and presenting an IT budget to stakeholders. It will speed the approval process and ensure more of it is approved.

      Info-Tech Insight
      CIOs need a straightforward way to create and present an approval-ready IT budget that demonstrates the value IT is delivering to the business and speaks directly to different stakeholder priorities.

      IT struggles to get budgets approved due to low transparency and failure to engage

      Capability challenges

      Administrative challenges

      Operating challenges

      Visibility challenges

      Relationship challenges

      IT is seen as a cost center, not an enabler or driver of business strategy.

      IT leaders are not seen as business leaders.

      Economic pressures drive knee-jerk redirection of IT’s budgetary focus from strategic initiatives back to operational tactics.

      The vast majority of IT’s
      real-life expenditure is in the form of operating expenses i.e. keeping the lights on.

      Most business leaders don’t know how many IT resources their business units are really consuming.

      Other departments in the organization see IT as a competitor for funding, not a business partner.

      Lack of transparency

      IT and the business aren’t speaking the same language.

      IT leaders don’t have sufficient access to information about, or involvement in, business decisions and objectives.

      Outmoded finance department expenditure categorizations don’t accommodate IT’s real cost categories.

      IT absorbs unplanned spend because business leaders don’t realize or consider the impact of their decisions on IT.

      The business doesn’t understand what IT is, what it does, or what it can offer.

      IT and the business don’t have meaningful conversations about IT costs, opportunities, or investments.

      Defining and demonstrating the value of IT and its investments isn’t straightforward.

      IT leaders may not have the financial literacy or acumen needed to translate IT activities and needs into business terms.

      CapEx and OpEx approval and tracking mechanisms are handled separately when, in reality, they’re highly interdependent.

      IT activities usually have an indirect relationship with revenue, making value calculations more complicated.

      Much of IT, especially infrastructure, is invisible to the business and is only noticed if it’s not working.

      The relationship between IT spending and how it supports achievement of business objectives is not clear.

      Reflect on the numbers…

      The image contains a screenshot of five graphs. The graphs depict Cost and budget management, Cost optimization, Business value, perception of improvement, and intensity of business frustration.

      To move forward, first you need to get unstuck

      Today’s IT budgeting challenges have been growing for a long time. Overcoming these challenges means untangling yourself from the grip of the root causes.

      Principle 1:
      IT and the business are fighting diverging forces. Technology has changed monumentally, while financial management hasn’t changed much at all.

      Principle 2:
      Different stakeholders have different perspectives on your IT budget. Learn and acknowledge what’s important to them so that you can potentially deliver it.

      Principle 3:
      Connecting the dots to clearly demonstrate IT’s value to the organization is the key to budgetary approval. But those connected dots don’t always result in a straight line.

      The three principles above are all about IT’s changing relationship to the business. IT leaders need a systematic and repeatable approach to budgeting that addresses these principles by:

      • Clearly illustrating the alignment between the IT budget and business objectives.
      • Showing stakeholders the overall value that IT investment will bring them.
      • Demonstrating where IT is already realizing efficiencies and economies of scale.
      • Gaining consensus on the IT budget from all parties affected by it.

      “The culture of the organization will drive your success with IT financial management.”

      – Dave Kish, Practice Lead, IT Financial Management Practice, Info-Tech Research Group

      Info-Tech’s approach

      CIOs need a straightforward way to convince approval-granting CFOs, CEOs, boards, and committees to spend money on IT to advance the organization’s strategies.

      IT budget approval cycle

      The image contains a screenshot of the IT budget approval cycle.

      The Info-Tech difference:

      This blueprint provides a framework, method, and templated exemplars for building and presenting your IT budget to different stakeholders. These will speed the approval process and ensure that a higher percentage of your proposed spend is approved.

      Info-Tech’s methodology for how to create a transparent and defensible it budget

      1. Lay Your Foundation

      2. Get Into Budget-Starting Position

      3. Develop Your Forecasts

      4. Build Your Proposed Budget

      5. Create and Deliver Your Budget Presentation

      Phase steps

      1. Understand budget purpose
      2. Know your stakeholders
      3. Continuously pre-sell your budget
      1. Gather your data
      2. Review historical performance
      3. Set budget goals
      1. Develop alternate scenarios
      2. Develop project CapEx forecasts
      3. Develop non-project CapEx and OpEx forecasts
      1. Aggregate your forecasts
      2. Stress-test your forecasts
      3. Challenge and perfect your rationales
      1. Plan your presentation content
      2. Build your budget presentation
      3. Present, finalize, and submit your budget

      Phase outcomes

      An understanding of your stakeholders and what your IT budget means to them.

      Information and goals for planning next fiscal year’s IT budget.

      Completed forecasts for project and non-project CapEx and OpEx.

      A final IT budget for proposal including scenario-based alternatives.

      An IT budget presentation.

      Insight summary

      Overarching insight: Create a transparent and defensible IT budget

      CIOs need a straightforward way to create and present an approval-ready IT budget that demonstrates the value IT is delivering to the business and speaks directly to different stakeholder priorities.

      Phase 1 insight: Lay your foundation

      IT needs to step back and look at it’s budget-creation process by first understanding exactly what a budget is intended to do and learning what the IT budget means to IT’s various business stakeholders.

      Phase 2 Insight: Get into budget-starting position

      Presenting your proposed IT budget in the context of past IT expenditure demonstrates a pattern of spend behavior that is fundamental to next year’s expenditure rationale.

      Phase 3 insight: Develop your forecasts

      Forecasting costs according to a range of views, including CapEx vs. OpEx and project vs. non-project, and then positioning it according to different stakeholder perspectives, is key to creating a transparent budget.

      Phase 4 insight: Build your proposed budget

      Fine-tuning and hardening the rationales behind every aspect of your proposed budget is one of the most important steps for facilitating the budgetary approval process and increasing the amount of your budget that is ultimately approved.

      Phase 5 insight: Create and deliver your budget presentation

      Selecting the right content to present to your various stakeholders at the right level of granularity ensures that they see their priorities reflected in IT’s budget, driving their interest and engagement in IT financial concerns.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      IT Cost Forecasting and Budgeting Workbook

      This Excel tool allows you to capture and work through all elements of your IT forecasting from the perspective of multiple key stakeholders and generates compelling visuals to choose from to populate your final executive presentation.

      The image contains a screenshot of the IT Cost Forecasting and Budgeting Workbook.

      Also download this completed sample:

      Sample: IT Cost Forecasting and Budgeting Workbook

      Key deliverable

      IT Budget Executive Presentation Template

      Phase 5: Create a focused presentation for your proposed IT budget that will engage your audience and facilitate approval.

      The image contains a screenshot of the IT Budget Executive Presentation Template.

      Blueprint benefits

      IT benefits

      Business benefits

      • Improve IT’s overall financial management capability.
      • Streamline the administration of annual IT budget development.
      • Legitimize the true purpose and value of IT operations and associated expenditure.
      • Create visibility on the part of both IT and the business into IT’s mandate, what needs to be in place, and what it costs to fund it.
      • Foster better relationships with business stakeholders by demonstrating IT’s business and financial competency, working in partnership with business leaders on IT investment decisions, and building mutual trust.
      • Better understand the different types of expenditure occurring in IT, including project CapEx, non-project CapEx, and non-project OpEx.
      • Gain insight into the relationship between one-time CapEx on ongoing OpEx and its ramifications.
      • See business priorities and concerns clearly reflected in IT’s budget down to the business-unit level.
      • Receive thorough return on investment calculations and cost-benefit analyses for all aspects of IT expenditure.
      • Understand the direct relationship between IT expenditure and the depth, breadth, and quality of IT service delivery to the business.

      Measure the value of this blueprint

      Ease budgetary approval and improve its accuracy.

      Near-term goals

      • Percentage of budget approved: Target 95%
      • Percentage of IT-driven projects approved: Target 100%
      • Number of iterations/re-drafts required to proposed budget: One iteration

      Long-term goal

      • Variance in budget vs. actuals: Actuals less than budget and within 2%

      In Phases 1 and 2 of this blueprint, we will help you understand what your approvers are looking for and gather the right data and information.

      In Phase 3, we will help you forecast your IT costs it terms of four stakeholder views so you can craft a more meaningful IT budget narrative.

      In Phases 4 and 5, we will help you build a targeted presentation for your proposed IT budget.

      Value you will receive:

      1. Increased forecast accuracy through using a sound cost-forecasting methodology.
      2. Improved budget accuracy by applying more thorough and transparent techniques.
      3. Increased budget transparency and completeness by soliciting input earlier and validating budgeting information.
      4. Stronger alignment between IT and enterprise goals through building a better understanding of the business values and using language they understand.
      5. A more compelling budget presentation by offering targeted, engaging, and rationalized information.
      6. A faster budgeting rework process by addressing business stakeholder concerns the first time.

      An analogy…

      “A budget isn’t like a horse and cart – you can’t get in front of it or behind it like that. It’s more like a river…

      When developing an annual budget, you have a good idea of what the OpEx will be – last year’s with an annual bump. You know what that boat is like and if the river can handle it.

      But sometimes you want to float bigger boats, like capital projects. But these boats don’t start at the same place at the same time. Some are full of holes. And does your river even have the capacity to handle a boat of that size?

      Some organizations force project charters by a certain date and only these are included in the following year’s budget. The project doesn’t start until 8-12 months later and the charter goes stale. The river just can’t float all these boats! It’s a failed model. You have to have a great governance processes and clear prioritization so that you can dynamically approve and get boats on the river throughout the year.”

      – Mark Roman, Managing Partner, Executive Services,
      Info-Tech Research Group and Former Higher Education CIO

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      Phase 1: Lay Your Foundation

      Phase 2: Get Into Budget-Starting Position

      Phase 3: Develop Your Forecasts

      Phase 4: Build Your Proposed Budget

      Phase 5: Create and Deliver Your Budget Presentation

      Call #1: Discuss the IT budget, processes, and stakeholders in the context of your unique organization.

      Call #2: Review data requirements for transparent budgeting.

      Call #3: Set budget goals and process improvement metrics.

      Call #4: Review project CapEx forecasts.

      Call #5: Review non-project CapEx and OpEx forecasts.

      Call #6: Review proposed budget logic and rationales.

      Call #7: Identify presentation inclusions and exclusions.

      Call #8: Review final budget presentation.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5

      Get into budget-starting position

      Forecast project CapEx

      Forecast non-project CapEx and OpEx

      Finalize budget and develop presentation

      Next Steps and
      Wrap-Up (offsite)

      Activities

      1.1 Review budget purpose.

      1.2 Understand stakeholders and approvers.

      1.3 Gather your data.

      1.4 Map and review historical financial performance.

      1.5 Rationalize last year’s variances.

      1.5 Set next year’s budget targets.

      2.1 Review the ITFM Cost Model.

      2.2 List projects.

      2.3 Review project proposals and costs.

      2.4 Map and tally total project CapEx.

      2.5 Develop and/or confirm project-business alignment, ROI, and cost-benefit statements.

      3.1 Review non-project capital and costs.

      3.2 Review non-project operations and costs.

      3.3 Map and tally total non-project CapEx and OpEx.

      3.4 Develop and/or confirm proposed expenditure rationales.

      4.1 Aggregate forecast totals and sanity check.

      4.2 Generate graphical outputs and select content to include in presentation.

      4.3 Fine-tune rationales.

      4.4 Develop presentation and write commentary.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Budget process and culture assessment.
      2. Stakeholder alignment assessment and pre-selling strategy.
      3. Mapped historical expenditure.
      4. Next fiscal year’s budget targets.
      1. Forecasted project-based capital expenditure mapped against the four views of the ITFM Cost Model.
      1. Forecasted non-project-based capital expenditure and operating expenditure against the four views of the ITFM Cost Model.
      1. Final proposed IT budget for next fiscal year.
      2. Plan and build content for IT Budget Executive Presentation.
      1. Completed IT Budget Executive Presentation.

      Phase 1

      Lay Your Foundation

      Lay Your
      Foundation

      Get Into Budget-Starting Position

      Develop Your
      Forecasts

      Build Your
      Proposed Budget

      Create and Deliver Your Presentation

      1.1 Understand what your budget is
      and does

      1.2 Know your stakeholders

      1.3 Continuously pre-sell your budget

      2.1 Assemble your resources

      2.2 Understand the four views of the ITFM Cost Model

      2.3 Review last year’s budget vs.
      actuals and five-year historical trends

      2.4 Set your high-level goals

      3.1 Develop assumptions and
      alternative scenarios

      3.2 Forecast your project CapEx

      3.3 Forecast your non-project CapEx and OpEx

      4.1 Aggregate your numbers

      4.2 Stress test your forecasts

      4.3 Challenge and perfect your
      rationales

      5.1 Plan your content

      5.2 Build your presentation

      5.3 Present to stakeholders

      5.4 Make final adjustments and submit your IT budget

      This phase will walk you through the following activities:

      • Seeing your budget as a living governance tool
      • Understanding the point of view of different stakeholders
      • Gaining tactics for setting future IT spend expectations

      This phase involves the following participants:

      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Lay Your Foundation

      Before starting any process, you need to understand exactly why you’re doing it.

      This phase is about understanding the what, why, and who of your IT budget.

      • Understand what your budget is and does. A budget isn’t just an annual administrative event – it’s an important governance tool. Understand exactly what a budget is and your budgetary accountabilities as an IT leader.
      • Know your stakeholders. The CFO, CEO, and CXOs in your organization have their own priorities, interests, and professional mandates. Get to know what their objectives are and what IT’s budget means to them.
      • Continuously pre-sell your budget. Identifying, creating, and capitalizing on opportunities to discuss your budget well in advance of its formal presentation will get influential stakeholders and approvers on side, foster collaborations, and avoid unpleasant surprises on all fronts.

      “IT finance is more than budgeting. It’s about building trust and credibility in where we’re spending money, how we’re spending money. It’s about relationships. It’s about financial responsibility, financial accountability. I rely on my entire leadership team to all understand what their spend is. We are a steward of other people’s money.”

      – Rick Hopfer, CIO, Hawaii Medical Service Association

      What does your budget actually do?

      A budget is not just a painful administrative exercise that you go through once a year.

      Most people know what a budget is, but it’s important to understand its true purpose and how it’s used in your organization before you engage in any activity or dialogue about it.

      In strictly objective terms:

      • A budget is a calculated estimate of income vs. expenditure for a period in the future, often one year. Basically, it’s an educated guess about how much money will come into a business entity or unit and how much money will go out of it.
      • A balanced budget is where income and expenditure amounts are equal.
      • The goal in most organizations is for the income component of the budget to match or exceed the expenditure component.
        If it doesn’t, this results in a deficit that may lead to debt.

      Simply put, a budget’s fundamental purpose is to plan and communicate how an organization will avoid deficit and debt and remain financially viable while meeting its various accountabilities and responsibilities to its internal and external stakeholders.

      “CFOs are not thinking that they want to shut down IT spend. Nobody wants to do that. I always looked at things in terms of revenue streams – where the cash inflow is coming from, where it’s going to, and if I can align my cash outflows to my revenue stream. Where I always got suspicious as a CFO is if somebody can’t articulate spending in terms of a revenue stream. I think that’s how most CFOs operate.”

      – Carol Carr, Technical Counselor,
      Info-Tech Research Group and Former CFO

      Put your IT budget in context

      Your IT budget is just one of several budgets across your organization that, when combined, create an organization-wide budget. In this context, IT’s in a tough spot.

      It’s a competition: The various units in your organization are competing for the biggest piece they can get of the limited projected income pie. It’s a zero-sum game. The organization’s strategic and operational priorities will determine how this projected income is divvied up.

      Direct-to-revenue units win: Business units that directly generate revenue often get bigger relative percentages of the organizational budget since they’re integral to bringing in the projected income part of the budget that allows the expenditure across all business units to happen in the first place.

      Indirect-to-revenue units lose: Unlike sales units, for example, IT’s relationship to projected income tends to be indirect, which means that IT must connect a lot more dots to illustrate its positive impact on projected income generation.

      In financial jargon, IT really is a cost center: This indirect relationship to revenue also explains why the focus of IT budget conversations is usually on the expenditure side of the equation, meaning it doesn’t have a clear positive impact on income.

      Contextual metrics like IT spend as a percentage of revenue, IT OpEx as a percentage of organizational OpEx, and IT spend per organizational employee are important baseline metrics to track around your budget, internally benchmark over time, and share, in order to illustrate exactly where IT fits into the broader organizational picture.

      Budgeting isn’t a once-a-year thing

      Yet, many organizations treat it like a “one and done” point of annual administration. This is a mistake that misses out on the real benefits of budgeting.

      Many organizations have an annual budgeting and planning event that takes place during the back half of the fiscal year. This is where all formal documentation around planned projects and proposed spend for the upcoming year is consolidated, culminating in final presentation, adjustment, and approval. It’s basically a consolidation and ranking of organization-wide priorities at the highest level.

      If things are running well, this culmination point in the overall budget development and management process is just a formality, not the beginning, middle, and end of the real work. Ideally:

      • Budgets are actually used: The whole organization uses budgets as tools to actively manage day-to-day operations and guide decision making throughout the year in alignment with priorities as opposed to something that’s put on a shelf or becomes obsolete within a few months.
      • Interdependencies are evident: No discrete area of spend focus is an island – it’s connected directly or indirectly with other areas of spend, both within IT and across the organization. For example, one server interacts with multiple business applications, IT and business processes, multiple IT staff, and even vendors or external managed service providers. Cost-related decisions about that one server – maintain, repurpose, consolidate, replace, discard – will drive other areas of spend up or down.
      • There are no surprises: While this does happen, your budget presentation isn’t a great time to bring up a new point of significant spend for the first time. The items in next year’s proposed budget should be priorities that are already known, vetted, supported, and funded.

      "A well developed and presented budget should be the numeric manifestation of your IT strategy that’s well communicated and understood by your peers. When done right, budgets should merely affirm what’s already been understood and should get approved with minimal pushback.“

      – Patrick Gray, TechRepublic, 2020

      Understand your budgetary responsibilities as the IT leader

      It’s in your job description. For some stakeholders, it’s the most important part of it.

      While not a contract per se, your IT budget is an objective and transparent statement made in good faith that shows:

      • You know what it takes to keep the organization viable.
      • You understand the organization’s accountabilities and responsibilities as well as those of its leaders.
      • You’re willing and able to do your part to meet these accountabilities and responsibilities.
      • You know what your part of this equation is, as well as what parts should and must be played by others.

      When it comes to your budget (and all things financial), your job is to be ethical, careful, and wise:

      1. Be honest. Business ethics matter.
      2. Be as accurate as possible. Your expenditure predictions won’t be perfect, but they need to be best-effort and defensible.
      3. Respect the other players. They have their own roles, motivations, and mandates. Accept and respect these by being a supporter of their success instead of an obstacle to them achieving it.
      4. Connect the dots to income. Always keep the demonstration of business value in your sights. Often, IT can’t draw a straight line to income, but demonstrating how IT expenditure supports and benefits future, current, and past (but still relevant) business goals and strategies, which in turn affect income, is the best course.
      5. Provide alternatives. There are only so many financial levers your organization can pull. An action on one lever will have wanted and unwanted consequences on another. Aim to put financial discussions in terms of risk-focused “what if” stories and let your business partners decide if those risks are satisfactory.

      Budgeting processes tend to be similar – it’s budgeting cultures that drive differences

      The basic rules of good budgeting are the same everywhere. Bad budgeting processes, however, are usually caused by cultural factors and can be changed.

      What’s the same everywhere…

      What’s unchangeable…

      What’s changeable…

      For right or wrong, most budgeting processes follow these general steps:

      There are usually only three things about an organization’s budgeting process that are untouchable and can’t be changed:

      Budgeting processes are rarely questioned. It never occurs to most people to challenge this system, even if it doesn’t work. Who wants to challenge the CFO? No one.

      Review your organization’s budgeting culture to discover the negotiable and non-negotiable constraints. Specifically, look at these potentially-negotiable factors if they’re obstacles to IT budgeting success:

      1. Capital project vetting and selection for the next fiscal year starts three-to-six months before the end of the current fiscal year.
      2. Operational expenditure, including salaries, is looked at later with much less formality and scrutiny with an aim to cut.
      3. Each business unit does a budget presentation and makes directed amendments (usually trimming).
      4. The approved budget numbers are plugged into a standard, sub-optimal budget template provided by Finance.
      1. The legal and regulatory mandates that govern financial funding, accounting, and reporting practices. These are often specific to industries and spend types.
      2. The accounting rules your organization follows, such as GAAP, or IFRS. These too may be legally mandated for government entities and publicly-traded companies.
      3. Hard limits on the projected available income the CFO has to distribute.
      • Timeframes and deadlines
      • Order of operations
      • Areas of focus (CapEx vs. OpEx)
      • Funding sources and ownership
      • Review/approval mechanisms
      • Templates and tools

      1.1 Review your budgeting process and culture

      1 hour

      1. Review the following components of your budget process using the questions provided for each as a guideline.
        1. Legal and regulatory mandates. What are the external rules that govern how we do financial tracking and reporting? How do they manifest in our processes?
        2. Accounting rules used. What rules does our finance department use and why? Do these rules allow for more meaningful representations of IT spend? Are there policies or practices in place that don’t appear to be backed by any external standards?
        3. Timeframes and deadlines. Are we starting the budgeting process too late? Do we have enough time to do proper due diligence? Will expenditures approved now be out of date when we go to execute? Are there mechanisms to update spend plans mid-cycle?
        4. Order of operations. What areas of spend do we always look at first, such as CapEx? Are there any benefits to changing the order in which we do things, such as examining OpEx first?
        5. Areas of focus. Is CapEx taking up most of our budgeting cycle time? Are we spending enough time examining OpEx? Is IT getting enough time from the CFO compared to other units?
        6. Funding sources and ownership. Is IT footing most of the technology bills? Are business unit leaders fronting any technology business case pitches? Is IT appropriately included in business case development? Is there any benefit to implementing show-back or charge-back?
        7. Review/approval mechanisms. Are strategies and priorities used to rank proposed spend clear and well communicated? Are spend approvers objective in their decision making? Do different approvers apply the same standards and tools?
        8. Templates and tools. Are the ones provided by Finance, the PMO, and other groups sufficient to document what we need to document? Are they accessible and easy to use? Are they automated and integrated so we only have to enter data once?
      2. On the slide following these activity instructions, rate how effective each of the above is on a scale of 1-10 (where 10 is very effective) in supporting the budgeting process. Note specific areas of challenge and opportunity for change.

      1.1 Review your budgeting process and culture

      Input Output Materials Participants
      • Organizational knowledge of typical budgeting processes
      • Copies of budgeting policies, procedures, and tools
      • Rated assessment of your organization’s budget process and culture, as well as major areas of challenge and opportunity for change
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Budget process and culture assessment

      Document the outcomes of your assessment. Examples are provided below.

      Budgeting area of assessment

      Rating

      1 = very ineffective

      10 = very effective

      Challenges

      Opportunities for change

      Legal and regulatory mandates

      7

      Significant regulation but compliance steps not clear or supported within departments.

      Create, communicate, and train management on compliance procedures and align the financial management tools accordingly.

      Accounting rules

      6

      IT not very familiar with them.

      Learn more about them and their provisions to see if IT spend can be better represented.

      Timeframes and deadlines

      5

      Finalize capital project plans for next fiscal four months before end of current fiscal.

      Explore flexible funding models that allow changes to budget closer to project execution.

      Order of operations

      3

      Setting CapEx before OpEx leads to paring of necessary OpEx based on CapEx commitments.

      Establish OpEx first as a baseline and then top up to target budget with CapEx.

      Areas of focus

      6

      Lack of focus on OpEx means incremental budgeting – we don’t know what’s in there.

      Perform zero-based budgeting on OpEx every few years to re-rationalize this spend.

      Funding sources and ownership

      4

      IT absorbing unplanned mid-cycle spend due to impact of unknown business actions.

      Implement a show-back mechanism to change behavior or as precursor to limited charge-back.

      Review/approval mechanisms

      8

      CFO is fair and objective with information presented but could demand more evidence.

      Improve business sponsorship/fronting of new initiative business cases and IT partnership.

      Templates and tools

      2

      Finance budget template largely irrelevant and unreflective of IT: only two relevant categories.

      Adjust account buckets over a period of time, starting with SW/HW and cloud breakouts.

      Receptive audiences make communication a lot easier

      To successfully communicate anything, you need to be heard and understood.

      The key to being heard and understood is first to hear and understand the perspective of the people with whom you’re trying to communicate – your stakeholders. This means asking some questions:

      • What context are they operating in?
      • What are their goals and responsibilities?
      • What are their pressures and stresses?
      • How do they deal with novelty and uncertainty?
      • How do they best take in information and learn?

      The next step of this blueprint shows the perspectives of IT’s key stakeholders and how they’re best able to absorb and accept the important information contained in your IT budget. You will:

      • Learn a process for discovering these stakeholders’ IT budget information needs within the context of your organization’s industry, goals, culture, organizational structure, personalities, opportunities, and constraints.
      • Document key objectives and messages when communicating with these various key stakeholders.

      There are certain principles, mandates, and priorities that drive your stakeholders; they’ll want to see these reflected in you, your work, and your budget.

      Your IT budget means different things to different stakeholders

      Info-Tech’s ITFM Cost Model lays out what matters most from various points of view.

      The image contains a screenshot of Info-Tech's ITFM Cost Model.

      The CFO: Understand their role

      The CFO is the first person that comes to mind in dealing with budgets. They’re personally and professionally on the line if anything runs amiss with the corporate purse.

      What are the CFO’s role and responsibilities?

      • Tracking cash flow and balancing income with expenditures.
      • Ensuring fiscal reporting and legal/regulatory compliance.
      • Working with the CEO to ensure financial-strategic alignment.
      • Working with business unit heads to set aligned budgets.
      • Seeing the big picture.

      What’s important to the CFO?

      • Costs
      • Benefits
      • Value
      • Analysis
      • Compliance
      • Risk Management
      • Strategic alignment
      • Control
      • Efficiency
      • Effectiveness
      • Reason
      • Rationale
      • Clarity
      • Objectivity
      • Return on investment

      “Often, the CFO sees IT requests as overhead rather than a need. And they hate increasing overhead.”

      – Larry Clark, Executive Counselor, Info-Tech Research Group and Former CIO

      The CFO carries big responsibilities focused on mitigating organizational risks. It’s not their job to be generous or flexible when so much is at stake. While the CEO appears higher on the organizational chart than the CFO, in many ways the CFO’s accountabilities and responsibilities are on par with, and in some cases greater than, those of the CEO.

      The CFO: What they want from the IT budget

      What they need should look familiar, so do your homework and be an open book.

      Your CFO’s IT budget to-do list:

      Remember to:

      • A review of the previous year financial performance. This demonstrates to the CFO your awareness, savvy, and overall competence in the financial management realm. This is also your opportunity to start laying out the real-life context within which IT has been operating. Information to show includes:
        • Budget vs. actuals, including an overview of factors that led to major variances.
        • Percentage difference in proposed budget versus previous year’s budget, and major contributing factors to those differences (i.e. unanticipated projects, changes, or events).
      • Presentation of information according to Finance’s existing categories. This makes it as easy as possible for them to plug your numbers into their system.
      • Separate views of overall workforce vs. overall vendor spending. This is a traditional view.
      • Separate views of capital expenditure (CapEx) and operating expenditure (OpEx). This also includes information on expected lifespan of proposed new capital assets to inform depreciation/amortization decisions.
      • Explanation of anticipated sources of funding. Specifically, indicate whether the funding required is a brand-new net increase or a reallocation from the existing pool.
      • Details (upon request). Have these available for every aspect of your proposed budget.
      • Avoid being flashy. Exclude proposed expenditures with a lot of bells and whistles that don’t directly tie to concrete business objectives.
      • Be a conservationist. Show how you plan to re-use or extend assets that you already have.
      • Act like a business leader. Demonstrate your understanding of near-term (12-month) realities, priorities, and goals.
      • Think like them. Present reliable and defensible calculations of benefits versus risks as well as projected ROI for major areas of new or different spending.

      The CFO: Budget challenges and opportunities

      Budget season is a great time to start changing the conversation and building trust.

      Potential challenges

      Low trust

      Poor financial literacy and historical sloppiness among business unit leaders means that a CFO may come into budget conversations with skepticism. This can put them on the offensive and put you on the defensive. You have to prove yourself.

      Competition

      You’re not the only department the CFO is dealing with. Everyone is competing for their piece of the pie, and some business unit leaders are persistent. A good CFO will stay out of the politics and not be swayed by sweet talk, but it can be an exhausting experience for them.

      Mismatched buckets

      IT’s spend classes and categories probably won’t match what’s in Finance’s budget template or general ledger. Annual budgeting isn’t the best time to bring this up. Respect Finance’s categories, but plan to tackle permanent changes at a less busy time.

      Potential opportunities

      Build confidence

      Engaging in the budgeting process is your best chance to demonstrate your knowledge about the business and your financial acumen. The more that the CFO sees that you get it and are taking it seriously, the more confidence and trust they’ll have in you.

      Educate

      The CFO will not know as much as you about the role technology could and should play in the organization. Introduce new language around technology focused on capabilities and benefits. This will start to shift the conversation away from costs and toward value.

      Initiate alignment

      An important governance objective is to change the way IT expenditure is categorized and tracked to better reveal and understand what’s really happening. This process should be done gradually over time, but definitely communicate what you want to do and why.

      The CXO: Understand their role

      CXOs are a diverse group who lead a range of business functions including admin, operations, HR, legal, production, sales and service, and marketing, to name a few.

      What are the CXO’s role and responsibilities?

      Like you, the CXO’s job is to help the organization realize its goals and objectives. How each CXO does this is specific to the domain they lead. Variations in roles and responsibilities typically revolve around:

      • Law and regulation. Some functions have compliance as a core mandate, including legal, HR, finance, and corporate risk groups.
      • Finance and efficiency. Other functions prioritize time, money, and process such as finance, sales, customer service, marketing, production, operations, and logistics units.
      • Quality. These functions prioritize consistency, reliability, relationship, and brand such as production, customer service, and marketing.

      What’s important to the CXO?

      • Staffing
      • Skills
      • Reporting
      • Funding
      • Planning
      • Performance
      • Predictability
      • Customers
      • Visibility
      • Inclusion
      • Collaboration
      • Reliability
      • Information
      • Knowledge
      • Acknowledgement

      Disagreement is common between business-function leaders – they have different primary focus areas, and conflict and misalignment are natural by-products of that fact. It’s also hard to make someone care as much about your priorities as you do. Focus your efforts on sharing and partnering, not converting.

      The CXO: What they want from the IT budget

      Focus on their unique part of the organization and show that you see them.

      Your CXO’s IT budget to-do list:

      Remember to:

      • A review of the previous year’s IT expenditure on the business function. This includes:
        • Budget vs. actuals (if available) for the business function, and overview of any situations or factors that led to major variances.
        • Percentage difference in proposed budget for that business function vs. the previous year’s spend, and major contributing factors to those differences, i.e. unanticipated projects, changes, or events.
        • Last year’s IT expenditure per business function employee vs. proposed IT expenditure per business function employee (if available). This is a good metric to use going forward as it’s a fair comparative internal benchmark.
      • Separate views of proposed IT workforce vs. proposed IT vendor spending for the business function. Do a specific breakout of proposed expenditure for the major applications that business unit explicitly uses.
      • Separate views of proposed IT capital expenditure (CapEx) and proposed IT operating expenditure (OpEx) for the business function. Show breakdowns for each capital project,
        as well as summaries for their core applications and portion of shared IT services.
      • Celebrate any collaborative wins from last year. You want to reinforce that working together is in both of your best interests and you’d like to keep it going.
      • Get to the apps fast. Apps are visible, concrete, and relatable – this is what the CXO cares about. Core IT infrastructure, on the other hand, is technobabble about something that’s invisible, boring, and disengaging for most CXOs.
      • Focus on the business function’s actual technology needs and consumption. Show them where they stand in relation to others. This will get their attention and serve as an opportunity to provide some education.

      The CXO: Budget challenges and opportunities

      Seek out your common ground and be the solution for their real problems.

      Potential challenges

      Different priorities

      Other business unit leaders will have bigger concerns than your IT budget. They have their own budget to figure out plus other in-flight issues. The head of sales, for instance, is going to be more concerned with hitting sales goals for this fiscal year than planning for next.

      Perceived irrelevance

      Some business unit leaders may be completely unaware of how they use IT, how much they use, and how they could use it more or differently to improve their performance. They may have a learning curve to tackle before they can start to see your relationship as collaborative.

      Bad track record

      If a business unit has had friction with IT in the past or has historically been underserved, they may be hesitant to let you in, may be married to their own solutions, or perhaps do not know how to express what they need.

      Potential opportunities

      Start collaborating

      You and other business unit leaders have a lot in common. You all share the objective of helping the organization succeed. Focus in on your shared concerns and how you can make progress on them together before digging into your unique challenges.

      Practice perspective taking

      Be genuinely curious about the business unit, how it works, and how they overcome obstacles. See the organization from their point of view. For now, keep your technologies completely out of the discussion – that will come later on.

      Build relationships

      You only need to solve one problem for a business unit to change how they think of you. Just one. Find that one thing that will make a real difference – ideally small but impactful – and work it into your budget.

      The CEO: Understand their role

      A CEO sets the tone for an organization, from its overall direction and priorities to its values and culture. What’s possible and what’s not is usually determined by them.

      What are the CEO’s role and responsibilities?

      • Assemble an effective team of executives and advisors.
      • Establish, communicate, and exemplify the organizations core values.
      • Study the ecosystem within which the organization exists.
      • Identify and evaluate opportunities.
      • Set long-term directions, priorities, goals, and strategies.
      • Ensure ongoing organizational performance, profitability, and growth.
      • Connect the inside organization to the outside world.
      • Make the big decisions no one else can make.

      What’s important to the CEO?

      • Strategy
      • Leadership
      • Vision
      • Values
      • Goals
      • Priorities
      • Performance
      • Metrics
      • Accountability
      • Stakeholders
      • Results
      • Insight
      • Growth
      • Cohesion
      • Context

      Unlike the CFO and CXOs, the CEO is responsible for seeing the big picture. That means they’re operating in the realm of big problems and big ideas – they need to stay out of the weeds. IT is just one piece of that big picture, and your problems and ideas are sometimes small in comparison. Use any time you get with them wisely.

      The CEO: What they want from the IT budget

      The CEO wants what the CFO wants, but at a higher level and with longer-term vision.

      Your CEO’s IT budget to-do list:

      Remember to:

      • A review of the previous year’s financial performance. In addition to last year’s budget vs. actuals vs. proposed budget and any rationales for variances, the CEO’s interest is in seeing numbers in terms of strategic delivery. Focus on performance against last year’s goals and concrete benefits realized.
      • A review of initiatives undertaken to optimize/reduce operating costs. Note overall gains with a specific look at initiatives that had a substantial positive financial impact.
      • A specific summary of the cost landscape for new strategic or capital projects. Ideally, these projects have already been committed to at the executive level. A more fine-tuned analysis of anticipated costs and variables may be required, including high-level projects with long-term impact on operational expenditure. Categorize these expenditures as investments in innovation, growth, or keeping the lights on.
      • Details (upon request). Have these available for every aspect of your proposed budget.
      • Be brief. Hopefully, the CEO is already well versed on the strategic spend plans. Stay high-level, reserve the deep dive for your documentation, and let the CEO decide if they want to hash anything out in more detail.
      • Be strategic. If you can’t tie it to a strategic objective, don’t showcase it.
      • Use performance language. This means citing goals, metrics, and progress made against them.
      • Ensure the CFO can translate. You may not get a direct audience with the CEO – the CFO may be your proxy for that. Ensure that everything is crystal clear so that the CFO can summarize your budget on your behalf.

      The CEO: Budget challenges and opportunities

      Strategically address the big issues, but don’t count on their direct assistance.

      Potential challenges

      Lack of interest

      Your CEO may just not be enthusiastic about technology. For them, IT is strictly a cost center operating on the margins. If they don’t have a strategic vision that includes technology, IT’s budget will always be about efficiency and cost control and not investment.

      Deep hierarchy

      The executive-level CIO role isn’t yet pervasive in every industry. There may be one or more non-IT senior management layers between IT and the office of the CEO, as well as other bureaucratic hurdles, which prohibit your direct access.

      Uncertainty

      What’s happening on the outside will affect what needs to be done on the inside. The CEO has to assess and respond quickly, changing priorities and plans in an instant. An indecisive CEO that’s built an inflexible organization will make it difficult to pivot as needed.

      Potential opportunities

      Grow competency

      Sometimes, IT just needs to wait it out. The biggest shifts in technology interest often come with an outright change in the organization’s leadership. In the meantime, fine-tune your operational excellence, brush up on business skills, and draft out your best ideas on paper.

      Build partnerships

      Other business-function executives may need to be IT’s voice. Investment proposals may be more compelling coming from them anyway. Behind-the-scenes partnerships and high-profile champions are something you want regardless of your degree of CEO access.

      Bake in resilience

      Regardless of who’s at the helm, systematic investment in agile and flexible solutions that can be readily scaled, decoupled, redeployed, or decommissioned is a good strategy. Use recent crises to help make the strategic case for a more resilient posture.

      What about the CIO view on the IT budget?

      IT leaders tend to approach budgeting from an IT services perspective. After all, that’s how their departments are typically organized.

      The CFO expense view, CXO business view, and CEO innovation view represent IT’s stakeholders. The CIO service view, however, represents you, the IT budget creator. This means that the CIO service view plays a slightly different role in developing your IT budget communications.

      An IT team effort…

      A logical starting point

      A supporting view

      Most budget drafts start with internal IT management discussion. These managers are differentially responsible for apps dev and maintenance, service desk and user support, networks and data center, security, data and analytics, and so forth.

      These common organizational units and their managers tend to represent discrete IT service verticals. This means the CIO service view is a natural structural starting point for your budget-building process. Stakeholder views of your budget will be derived from this first view.

      You probably don’t want to lead your budget presentation with IT’s perspective – it won’t make sense to your stakeholders. Instead, select certain impactful pieces of your view to drop in where they provide valued information and augment the IT budget story.

      Things to bring forward…

      Things to hold back…

      • All major application costs
      • Security/compliance costs
      • Strategic project costs
      • End-user support and enablement costs
      • Data and BI initiative costs
      • Minor applications costs
      • Day-to-day network and data center costs
      • Other infrastructure costs
      • IT management and administration costs

      1.2 Assess your stakeholders

      1 hour

      1. Use the “Stakeholder alignment assessment” template slide following this one to document the outcomes of this activity.
      2. As an IT management team, identify your key budget stakeholders and specifically those in an approval position.
      3. Use the information provided in this blueprint about various stakeholder responsibilities, areas of focus, and what’s typically important to them to determine each key stakeholder’s needs regarding the information contained in your IT budget. Note their stated needs, any idiosyncrasies, and IT’s current relationship status with the stakeholder (positive, neutral, or negative).
      4. Assess previous years’ IT budgets to determine how well they targeted each different stakeholder’s needs. Note any gaps or areas for future improvement.
      5. Develop a high-level list of items or elements to stop, start, or continue during your next budgeting cycle.
      Input Output
      • Organizational awareness of key stakeholders and budget approvers
      • Previous years’ budgets
      • Assessment of key stakeholder needs and a list of potential changes or additions to the IT budget/budget process
      Materials Participants
      • Whiteboard/flip charts
      • Stakeholder alignment assessment template (following slide)
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Stakeholder alignment assessment

      Document the outcomes of your assessment below. Examples are provided below.

      Stakeholder

      Relationship status

      Understanding of needs

      Budget changes/additions

      CFO

      Positive

      Wants at least 30% of budget to be CapEx. Needs more detail concerning benefits and tracking of realization.

      Do more detailed breakouts of CapEx vs. OpEx as 30% CapEx not realistic – pre-meet. Talk to Enterprise PMO about improving project benefits statement template.

      VP of Sales

      Negative

      Only concerned with hitting sales targets. Needs to respond/act quickly based on reliable data.

      Break out sales consumption of IT resources in detail focusing on CRM and SFA tool costs. Propose business intelligence enhancement project.

      Director of Marketing

      Neutral

      Multiple manual processes – would benefit from increased automation of campaign management and social media posting.

      Break out marketing consumption of IT resources and publicly share/compare to generate awareness/support for tech investment. Work together to build ROI statements

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Positive/Neutral/Negative]

      [Insert text]

      [Insert text]

      Set your IT budget pre-selling strategy

      Pre-selling is all about ongoing communication with your stakeholders. This is the most game-changing thing you can do to advance a proposed IT budget’s success.

      When IT works well, nobody notices. When it doesn’t, the persistent criticism about IT not delivering value will pop up, translating directly into less funding. Cut this off at the pass with an ongoing communications strategy based on facts, transparency, and perspective taking.

      1. Know your channels
      2. Identify all the communication channels you can leverage including meetings, committees, reporting cycles, and bulletins. Set up new channels if they don’t exist.

      3. Identify partners
      4. Nothing’s better than having a team of supporters when pitch day comes. Quietly get them on board early and be direct about the role each of you will play.

      5. Always be prepared
      6. Have information and materials about proposed initiatives at-the-ready. You never know when you’ll get your chance. But if your facts are still fuzzy, do more homework first.

      7. Don’t be annoying
      8. Talking about IT all the time will turn people off. Plan chats that don’t mention IT at all. Ask questions about their world and really listen. Empathy’s a powerful tool.

      9. Communicate IT initiatives at launch
      10. Describe what you will be doing and how it will benefit the business in language that makes sense to the beneficiaries of the initiative.

      11. Communicate IT successes
      12. Carry the same narrative forward through to the end and tell the whole story. Include comments from stakeholders and beneficiaries about the value they’re receiving.

      Pre-selling with partners

      The thing with pre-selling to partners is not to take a selling approach. Take a collaborative approach instead.

      A partner is an influencer, advocate, or beneficiary of the expenditure or investment you’re proposing. Partners can:

      • Advise you on real business impacts.
      • Voice their support for your funding request.
      • Present the initial business case for funding approval themselves.
      • Agree to fund all or part of an initiative from their own budget.

      When partners agree to pitch or fund an initiative, IT can lose control of it. Make sure you set specific expectations about what IT will help with or do on an ongoing basis, such as:

      • Calculating the upfront and ongoing technology maintenance/support costs of the initiative.
      • Leading the technology vetting and selection process, including negotiating with vendors, setting service-level agreements, and finalizing contracts.
      • Implementing selected technologies and training users.
      • Maintaining and managing the technology, including usage metering.
      • Making sure the bills get paid.

      A collaborative approach tends to result in a higher level of commitment than a selling approach.

      Put yourself in their shoes using their language. Asking “How will this affect you?” focuses on what’s in it for them.

      Example:

      CIO: “We’re thinking of investing in technology that marketing can use to automate posting content to social media. Is that something you could use?”

      CMO: “Yes, we currently pay two employees to post on Facebook and Twitter, so if it could make that more efficient, then there would be cost savings there.”

      Pre-selling with approvers

      The key here is to avoid surprises and ensure the big questions are answered well in advance of decision day.

      An approver is the CFO, CEO, board, council, or committee that formally commits funding support to a program or initiative. Approvers can:

      • Point out factors that could derail realization of intended benefits.
      • Know that a formal request is coming and factor it into their planning.
      • Connect your idea with others to create synergies and efficiencies.
      • Become active advocates.

      When approvers cool to an idea, it’s hard to warm them up again. Gradually socializing an idea well in advance of the formal pitch gives you the chance to isolate and address those cooling factors while they’re still minor. Things you can address if you get an early start with future approvers include:

      • Identify and prepare for administrative, regulatory, or bureaucratic hurdles.
      • Incorporate approvers’ insights about organizational realities and context.
      • Further reduce the technical jargon in your language.
      • Fine tune the relevance and specificity of your business benefits statements.
      • Get a better sense of the most compelling elements to focus on.

      Blindsiding approvers with a major request at a budget presentation could trigger an emotional response, not the rational and objective one you want.

      Make approvers part of the solution by soliciting their advice and setting their expectations well in advance.

      Example:

      CIO: “The underwriting team and I think there’s a way to cut new policyholder approval turnaround from 8 to 10 days down to 3 or 4 using an online intake form. Do you see any obstacles?”

      CFO: “How do the agents feel about it? They submit to underwriting differently and might not want to change. They’d all need to agree on it. Exactly how does this impact sales?”

      1.3 Set your budget pre-selling strategy

      1 hour

      1. Use the “Stakeholder pre-selling strategy” template slide following this instruction slide to document the outcomes of this activity.
      2. Carry forward your previously-generated stakeholder alignment assessment from Step 1.2. As a management team, discuss the following for each stakeholder:
        1. Forums and methods of contact and interaction.
        2. Frequency of interaction.
        3. Content or topics typically addressed during interactions.
      3. Discuss what the outcomes of an ideal interaction would look like with each stakeholder.
      4. List opportunities to change or improve the nature of interactions and specific actions you plan to take.
      InputOutput
      • Stakeholder Alignment Assessment (in-deck template)
      • Stakeholder Pre-selling Strategy
      MaterialsParticipants
      • Stakeholder Pre-selling Strategy (in-deck template)
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Stakeholder pre-selling strategy

      Document the outcomes of your discussion. Examples are provided below.

      Stakeholder

      Current interactions

      Opportunities and actions

      Forum

      Frequency

      Content

      CFO

      One-on-one meeting

      Monthly

      IT expenditure updates and tracking toward budgeted amount.

      Increase one-on-one meeting to weekly. Alternate focus – retrospective update one week, future-looking case development the next. Invite one business unit head to future-looking sessions to discuss their IT needs.

      VP of Sales

      Executive meeting

      Quarterly

      General business update - dominates.

      Set up bi-weekly one-on-one meeting – initially focus on what sales does/needs, not tech. Later, when the relationship has stabilized, bring data that shows Sales’ consumption of IT resources.

      Director of Marketing

      Executive meeting

      Quarterly

      General business update - quiet.

      Set up monthly one-on-one meeting. Temporarily embed BA to better discover/understand staff processes and needs.

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      [Name/Title]

      [Insert text]

      [Insert text]

      [Insert text]

      [Insert text]

      Phase recap: Lay your foundation

      Build in the elements from the start that you need to facilitate budgetary approval.

      You should now have a deeper understanding of the what, why, and who of your IT budget. These elements are foundational to streamlining the budget process, getting aligned with peers and the executive, and increasing your chances of winning budgetary approval in the end.

      In this phase, you have:

      • Reviewed what your budget is and does. Your budget is an important governance and communication tool that reflects organizational priorities and objectives and IT’s understanding of them.
      • Taken a closer look at your stakeholders. The CFO, CEO, and CXOs in your organization have accountabilities of their own to meet and need IT and its budget to help them succeed.
      • Developed a strategy for continuously pre-selling your budget. Identifying opportunities and approaches for building relationships, collaborating, and talking meaningfully about IT and IT expenditure throughout the year is one of the leading things you can do to get on the same page and pave the way for budget approval.

      “Many departments have mostly labor for their costs. They’re not buying a million and a half or two million dollars’ worth of software every year or fixing things that break. They don’t share IT’s operations mindset and I think they get frustrated.”

      – Matt Johnson, IT Director Governance and Business Solutions, Milwaukee County

      Phase 2

      Get Into Budget-Starting Position

      Lay Your
      Foundation

      Get Into Budget-Starting Position

      Develop Your
      Forecasts

      Build Your
      Proposed Budget

      Create and Deliver Your Presentation

      1.1 Understand what your budget is
      and does

      1.2 Know your stakeholders

      1.3 Continuously pre-sell your budget

      2.1 Assemble your resources

      2.2 Understand the four views of the ITFM Cost Model

      2.3 Review last year’s budget vs.
      actuals and five-year historical trends

      2.4 Set your high-level goals

      3.1 Develop assumptions and
      alternative scenarios

      3.2 Forecast your project CapEx

      3.3 Forecast your non-project CapEx and OpEx

      4.1 Aggregate your numbers

      4.2 Stress test your forecasts

      4.3 Challenge and perfect your
      rationales

      5.1 Plan your content

      5.2 Build your presentation

      5.3 Present to stakeholders

      5.4 Make final adjustments and submit your IT budget

      This phase will walk you through the following activities:

      • Putting together your budget team and gather your data.
      • Selecting which views of the ITFM Cost Model you’ll use.
      • Mapping and analyzing IT’s historical expenditure.
      • Setting goals and metrics for the next budgetary cycle.

      This phase involves the following participants:

      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Get into budget-starting position

      Now’s the time to pull together your budgeting resources and decision-making reference points.

      This phase is about clarifying your context and defining your boundaries.

      • Assemble your resources. This includes the people, data, and other information you’ll need to maximize insight into future spend requirements.
      • Understand the four views of the IT Cost Model. Firm up your understanding of the CFO expense view, CIO service view, CXO business view, and CEO innovation view and decide which ones you’ll use in your analysis and forecasting.
      • Review last year’s budget versus actuals. You need last year’s context to inform next year’s numbers as well as demonstrate any cost efficiencies you successfully executed.
      • Review five-year historical trends. This long-term context gives stakeholders and approvers important information about where IT fits into the business big picture and reminds them how you got to where you are today.
      • Set your high-level goals. You need to decide if you’re increasing, decreasing, or holding steady on your budget and whether you can realistically meet any mandates you’ve been handed on this front. Set a target as a reference point to guide your decisions and flag areas where you might need to have some tough conversations.

      “A lot of the preparation is education for our IT managers so that they understand what’s in their budgets and all the moving parts. They can actually help you keep it within bounds.”

      – Trisha Goya, Director, IT Governance & Administration, Hawaii Medical Service Association

      Gather your budget-building team

      In addition to your CFO, CXOs, and CEO, there are other people who will provide important information, insight, and skill in identifying IT budget priorities and costs.

      Role

      Skill set

      Responsibilities

      IT Finance Lead

      • Financial acumen, specifically with cost forecasting and budgeting.
      • Understanding of actual IT costs and service-based costing methods.

      IT finance personnel will guide the building of cost forecasting methodologies for operating and capital costs, help manage IT cash flows, help identify cost reduction options, and work directly with the finance department to ensure they get what they need.

      IT Domain Managers

      • Knowledge of services and their outputs.
      • Understanding of cost drivers for the services they manage.

      They will be active participants in budgeting for their specific domains, act as a second set of eyes, assist with and manage their domain budgets, and engage with stakeholders.

      Project Managers

      • Knowledge of project requirements.
      • Project budgeting.
      • Understanding of project IT-specific costs.

      Project managers will assist in capital and operational forecasting and will review project budgets to ensure accuracy. They will also assist in forecasting the operational impacts of capital projects.

      As the head of IT, your role is as the budgeting team lead. You understand both the business and IT strategies, and have relationships with key business partners. Your primary responsibilities are to guide and approve all budget components and act as a liaison between finance, business units, and IT.

      Set expectations with your budgeting team

      Be clear on your goals and ensure everyone has what they need to succeed.

      Your responsibilities and accountabilities.

      • Budget team lead.
      • Strategic direction.
      • Primary liaison with business stakeholders.
      • Pre-presentation approver and final decision maker.

      Goals and requirements.

      • Idea generation for investment and cost optimization.
      • Cost prioritization and rationale.
      • Skills requirements and sourcing options.
      • Risk assessment and operational impact.
      • Data format and level of granularity.

      Budgeting fundamentals.

      • Review of key finance concepts – CapEx, OpEx, cashflow, income, depreciation, etc.
      • What a budget is, and its component parts.
      • How the budget will be used by IT and the organization.
      • How to calculate cost forecasts.

      Their responsibilities and accountabilities.

      • Data/information collection.
      • Operational knowledge of their services, projects, and staff.
      • Cost forecast development for their respective domains/projects.
      • Review and sanity checking of their peers’ cost forecasts.

      Timeframes and deadlines.

      • Budgeting stages/phases and their deliverables.
      • Internal IT deadlines.
      • External business deadlines.
      • Goals and cadence of future working sessions and meetings.

      Available resources.

      • Internal and external sources of data and information.
      • Tools and templates for tracking information and performing calculations.
      • Individuals who can provide finance concept guidance and support.
      • Repositories for in-progress and final work.

      2.1 Brief and mobilize your IT budgeting team

      2 hours

      1. Download the IT Cost Forecasting and Budgeting Workbook
      2. Organize a meeting with your IT department management team, team leaders, and project managers.
      3. Review their general financial management accountabilities and responsibilities.
      4. Discuss the purpose and context of the budgeting exercise, different budget components, and the organization’s milestones/deadlines.
      5. Identify specific tasks and activities that each member of the team must complete in support of the budgeting exercise.
      6. Set up additional checkpoints, working sessions, or meetings that will take you through to final budget submission.
      7. Document your budget team members, responsibilities, deliverables, and due dates on the “Planning Variables” tab in the IT Cost Forecasting & Budgeting Workbook.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • The organization’s budgeting process and procedures
      • Assignment of IT budgeting team responsibilities
      • A budgeting schedule
      MaterialsParticipants
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Leverage the ITFM Cost Model

      Each of the four views breaks down IT costs into a different array of categories so you and your stakeholders can see expenditure in a way that’s meaningful for them.

      You may decide not to use all four views based on your goals, audience, and available time. However, let’s start with how you can use the first two views, the CFO expense view and the CIO service view.

      The image contains a screenshot of the CFO expense view.

      The CFO expense view is fairly traditional – workforce and vendor. However, Info-Tech’s approach breaks down the vendor software and hardware buckets into on-premises and cloud. Making this distinction is increasingly critical given key differences in CapEx vs. OpEx treatment.

      Forecasting this view is mandatory

      These two views provide information that will help you optimize IT costs. They’re designed to allow the CFO and CIO to find a common language that will allow them to collaboratively make decisions about managing IT expenditure effectively.

      The image contains a screenshot of the CIO service view.

      The CIO service view is your view, i.e. it’s how IT tends to organize and manage itself and is often the logical starting point for expenditure planning and analysis. Sub-categories in this view, such as security and data & BI, can also resonate strongly with business stakeholders and their priorities.

      Forecasting this view is recommended

      Extend your dialogue to the business

      Applying the business optimization views of the ITFM Cost Model can bring a level of sophistication to your IT cost analysis and forecasting efforts.

      Some views take a bit more work to map out, but they can be powerful tools for communicating the value of IT to the business. Let’s look at the last two views, the CXO business view and the CEO innovation view.

      The CXO business view looks at IT expenditure business unit by business unit so that each can understand their true consumption of IT resources. This view relies on having a fair and reliable cost allocation formula, such as one based on relative headcount, so it runs the risk of inaccuracy.

      Forecasting this view is recommended

      The image contains a screenshot of the CXO business view.

      These two views provide information that will help you optimize IT support to the business. These views also have a collaborative goal in mind, enabling IT to talk about IT spend in terms that will promote transparency and engage business stakeholders.

      The CEO innovation view is one of the hardest to analyze and forecast since a single spend item may apply to innovation, growth, and keeping the lights on. However, if you have an audience with the CEO and they want IT to play a more strategic or innovative role, then this view is worth mapping.

      Forecasting this view is optional

      The image contains a screenshot of the CEO innovation view.

      2.2 Select the ITFM Cost Model views you plan to complete based on your goals

      30 minutes

      The IT Cost Forecasting and Budgeting Workbook contains standalone sections for each view, as well as rows for each lowest-tier sub-category in a view, so each view can be analyzed and forecasted independently.

      1. Review Info-Tech’s ITFM Cost Model and the expenditure categories and sub-categories each view contains.
      2. Revisit your stakeholder analysis for the budgeting exercise. Plan to:
        1. Complete the CFO expense view regardless.
        2. Complete the CIO service view – consider doing this one first for forecasting purposes as it may be most familiar to you and serve as an easier entry point into the forecasting process.
        3. Complete the CXO business view – consider doing this only for select business units if you have the objective of enhancing awareness of their true consumption of IT resources or if you have (or plan to have) a show-back/chargeback mechanism.
        4. Complete the CEO innovation view only if your data allows it and there’s a compelling reason to discuss the strategic or innovative role of IT in the organization.
      Input Output
      • Stakeholder analysis
      • Info-Tech’s ITFM Cost Model
      • Decision on which views in the ITFM Cost Model you’ll use for historical expenditure analysis and forecasting purposes
      Materials Participants
      • Info-Tech’s ITFM Cost Model
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Gather your budget-building data

      Your data not only forms the content of your budget but also serves as the supporting evidence for the decisions you’ve made.

      Ensure you have the following data and information available to you and your budgeting team before diving in:

      Past data

      • Last fiscal year’s budget.
      • Actuals for the past five fiscal years.
      • Pre-set capital depreciation/amortization amounts to be applied to next fiscal year’s budget.

      Current data

      • Current-year IT positions and salaries.
      • Active vendor contracts with payment schedules and amounts (including active multi-year agreements).
      • Cost projections for remainder of any projects that are committed or in-progress, including projected OpEx for ongoing maintenance and support.

      Future data

      • Estimated market value for any IT positions to be filled next year (both backfill of current vacancies and proposed net-new positions).
      • Pricing data on proposed vendor purchases or contracts.
      • Cost estimates for any capital/strategic projects that are being proposed but not yet committed, including resulting maintenance/support OpEx.
      • Any known pending credits to be received or applied in the next fiscal year.

      If you’re just getting started building a repeatable budgeting process, treat it like any other project, complete with a formal plan/ charter and a central repository for all related data, information, and in-progress and final documents.

      Once you’ve identified a repeatable approach that works for you, transition the budgeting project to a regular operational process complete with policies, procedures, and tools.

      Review last year’s budget vs. actuals

      This is the starting point for building your high-level rationale around what you’re proposing for next fiscal year.

      But first, some quick definitions:

      • Budgeted: What you planned to spend when you started the fiscal year.
      • Actual: What you ended up spending in real life by the end of the fiscal year.
      • Variance: The difference between budgeted expenditure and actual expenditure.

      For last fiscal year, pinpoint the following metrics and information:

      Budgeted and actual IT expenditure overall and by major cost category.

      Categories will include workforce (employees/contractors) and vendors (hardware, software, contracted services) at a minimum.

      Actual IT expenditure as a percentage of organizational revenue.

      This is a widely-used benchmark that your CFO will expect to see.

      The known and likely drivers behind budgeted vs. actual variances.

      Your rationales will affect your perceived credibility. Be straightforward, avoid defending or making excuses, and just show the facts.

      Ask your CFO what they consider acceptable variance thresholds for different cost categories to guide your variance analysis, such as 1% for overall IT expenditure.

      Actual IT CapEx and OpEx.

      CapEx is often more variable than OpEx over time. Separate them so you can see the real trends for each. Consider:

      • Sub-dividing CapEx by strategic projects and non-strategic “business as usual” spend (e.g. laptops, network maintenance gear).
      • Showing overall CapEx and OpEx as percentages of their organization-wide counterparts if that information is available.

      Next, review your five-year historical expenditure trends

      The longer-term pattern of IT expenditure can help you craft a narrative about the overarching story of IT.

      For the previous five fiscal years, focus on the following:

      Actual IT expenditure as a percentage of organizational revenue.

      Again, for historical years 2-5, you can break this down into granular cost categories like workforce, software, and infrastructure like you did for last fiscal year. Avoid getting bogged down and focusing on the past – you ultimately want to redirect stakeholders to the future.

      Percentage expenditure increase/decrease year to year.

      You may choose to show overall IT expenditure amounts, breakdowns by CapEx and OpEx, as well as high-level cost categories.

      As you go back in time, some data may not be available to you, may be unreliable or incomplete, or employ the same cost categories you’re using today. Use your judgement on the level of granularity you want to and can apply when going back two to five years in the past.

      So, what’s the trend? Consider these questions:

      • Is the year-over-year trend on a steady trajectory or are there notable dips and spikes?
      • Are there any one-time capital projects that significantly inflated CapEx and overall spend in a given year or that forced maintenance-and support-oriented OpEx commitments in subsequent years?
      • Does there seem to be an overall change in the CapEx-to-OpEx ratio due to factors like increased use of cloud services, outsourcing, or contract-based staff?

      Take a close look at financial data showcasing the cost-control measures you’ve taken

      Your CFO will look for evidence that you’re gaining efficiencies by controlling costs, which is often a prerequisite for them approving any new funding requests.

      Your objective here is threefold:

      1. Demonstrate IT’s track record of fiscal responsibility and responsiveness to business priorities.
      2. Acknowledge and celebrate your IT-as-cost-center efficiency gains to clear the way for more strategic discussions.
      3. Identify areas where you can potentially source and reallocate recouped funds to bolster other initiatives or business cases for net-new spend.

      This step is about establishing credibility, demonstrating IT value, building trust, and showing the CFO you’re on their team.

      Do the following:

      • List any specific cost-control initiatives and their initial objectives and targets.
      • Identify any changes made to those targets and your approaches due to changing conditions, with rationales for the decisions made. For example:
        • Mid-year, the business decided to allow approximately half the workforce to work from home on a permanent basis.
        • As a result, remote-worker demand on the service desk remained high and actually increased in some areas. You were unable to reduce service desk staff headcount as originally planned.
        • You’re now exploring ways to streamline ticket intake and assignment to increase throughput and speed resolution.
      • Report on completed cost-control initiatives first, including targets, actuals, and related impacts. Include select feedback from business stakeholders and users about the impact of your cost-control measure on them.
      • For in-progress initiatives, report progress made to-date, benefits realized to date, and plans for continuation next fiscal year.

      “Eliminate the things you don’t need. People will give you what you need when you need it if you’re being responsible with what you already have.”

      – Angela Hintz, VP of PMO & Integrated Services,
      Blue Cross and Blue Shield of Louisiana

      2.3 Review your historical IT expenditure

      8 hours

      1. Download the IT Cost Forecasting and Budgeting Workbook.
      2. On Tab 1, “Historical Events & Projects,” note the cost-driving and cost-saving events that occurred last fiscal year that drove any variance between budgeted and actual expenditure. Describe the nature of their impact and current status (ongoing, resolved – temporary impact, or resolved – permanent impact).
      3. Also on Tab 1, “Historical Events & Projects”, summarize the work done on capital or strategic projects, expenditures, and status (in progress, deferred, canceled, or complete).
      4. On Tab 2, “Historical Expenditure”:
        1. Enter the budgeted and actuals data for last fiscal year in columns D-H for the views of the ITFM Cost Model you’re opted to do, i.e. CFO expense view, CIO service view, CXO business view, and CEO innovation view.
        2. Enter a brief rationale for any notable budgeted-versus-actuals variances or other interesting items in column K.
        3. Enter actuals data for the remaining past five fiscal years in columns L-O. Year-over-year comparative metrics will be calculated for you.
        4. Enter FTEs by business function in columns R-AA, rows 34-43.
          Expenditure per FTE and year-over year comparative metrics will be
          calculated for you.
      5. Using Tabs 2, “Historical Expenditure” and 3, “Historical Analysis”, review and analyze the resulting data sets and graphs to identify overall patterns, specifically notable increases or decreases in a particular category of expenditure or where rationales are repeated across categories or views (these are significant).
      6. Finally, flag any data points that help demonstrate achievement of, or progress toward, any cost-control measures you implemented.

      2.3 Review your historical IT expenditure

      InputOutputMaterialsParticipants
      • Budgeted data for the previous fiscal year and actuals data for the previous five fiscal years
      • Mapped budgeted for last fiscal year, mapped actuals for the past five fiscal years, and variance metrics and rationales
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Pull historical trends into a present-day context when setting your high-level goals

      What’s happening to your organization and the ecosystem within which it’s operating right now? Review current business concerns, priorities, and strategies.

      Knowing what happened in the past can provide good insights and give you a chance to show stakeholders your money-management track record. However, what stakeholders really care about is “now” and “next”. For them, it’s all about current business context.

      Ask these questions about your current context to assess the relevance of your historical trend data:

      What’s the state of
      the economy and how is
      it affecting your organization?

      What are the
      organization’s stated
      strategic goals and objectives?

      What has the business
      explicitly communicated
      about finance-related targets?

      What’s the business
      executive’s attitude on
      budget increase requests?

      Some industries are very sensitive to economic cycles, causing wild budget fluctuations year to year. This uncertainty can reduce the volume of spend you automatically carry over one year to the next, making past spend patterns less relevant to your current budgeting effort.

      These can change year to year as well, and often manifest on the CapEx side in the form of strategic projects selected. Since this is so variable, using previous years’ CapEx to determine next fiscal’s CapEx isn’t always useful except in regard to multi-year, ongoing capital projects.

      Do your best to honor mandates. However, if cuts are suggested that could jeopardize core service delivery, tread cautiously, and pick your battles. You may be able to halt new capital spend to generate cuts, but these projects may get approved anyway, with IT expected to make cuts to OpEx.

      If the CFO and others rail against even the most necessary inflation-driven increases, you’ll need to take a conservative approach, focus on cost-saving initiatives, and plan to redirect last year’s expenditures instead of pursuing net-new spend.

      Set metrics and targets for some broader budget effectiveness improvement efforts

      Budget goalsetting isn’t limited to CapEx and OpEx targets. There are several effectiveness metrics to track overall improvement in your budgeting process.

      Step back and think about other budget and expenditure goals you have.
      Do you want to:

      • Better align the budget with organizational objectives?
      • Increase cost forecasting accuracy?
      • Increase budget transparency and completeness?
      • Improve the effectiveness of your budget presentation?
      • Reduce the amount of budget rework?
      • Increase the percentage of the budget that’s approved?
      • Reduce variance between what was budgeted and actuals?

      Establish appropriate metrics and targets that will allow you to define success, track progress, and communicate achievement on these higher-level goals.

      Check out some example metrics in the table below.

      Budgeting metric

      Improvement driver

      Current value

      Future target

      Percentage of spend directly tied to an organizational goal.

      Better alignment via increased communication and partnership with the business.

      72%

      90%

      Number of changes to budget prior to final acceptance.

      Better accuracy and transparency via use of zero-based budgeting and enhanced stakeholder views.

      8

      2

      Percentage variance between budgeted vs. actuals.

      Improved forecasting through better understanding of business plans and in-cycle show-back.

      +4%

      +/-2%

      Percentage of budget approved after first presentation.

      Improved business rationales and direct mapping of expenditure to org priorities.

      76%

      95%

      Percentage of IT-driven project budget approved.

      More rigor around benefits, ROI calculation, and quantifying value delivered.

      80%

      100%

      Set your high-level OpEx budget targets

      The high-level targets you set now don’t need to be perfect. Think of them as reference points or guardrails to sanity-check the cost forecasting exercise to come.

      First things first: Zero-based or incremental for OpEx?

      Set your OpEx targets

      Incremental budgeting is the addition of a few percentage onto next year’s budget, assuming the previous year’s OpEx is all re-occurring. The percentage often aligns with rates of inflation.

      • Most organizations take this approach because it’s faster and easier.
      • However, incremental budgeting is less accurate. Non-recurring items are often overlooked and get included in the forecast, resulting in budget bloat. Also, redundant or wasteful items can be entirely missed, undermining any cost optimization efforts.

      Zero-based budgeting involves rebuilding your budget from scratch, i.e. zero. It doesn’t assume that any of last year’s costs are recurring or consistent year to year.

      • This approach is harder because all relevant historical spend data needs to be collected and reviewed, which not only takes time but the data you need may be unlocatable.
      • Every item needs to be re-examined, re-justified, and tied to an asset, service, or project, which means it’s a far more comprehensive and accurate approach.

      Pick a range of percentage change based on your business context and past spend.

      • If economic prospects are negative, start with a 0-3% increase to balance inflation with potential cuts. Don’t set concrete reduction targets at this point, to avoid tunnel vision in the forecasting exercise.
      • If economic prospects are positive, target 3-5% increases for stable scenarios and 6-10% increases for growth scenarios.
      • If CapEx from previous-year projects is switching to steady-state OpEx, then account for these bumps in OpEx.
      • If the benefits from any previous-year efficiency measures will be realized next fiscal year, then account for these as OpEx reductions.

      If cost-cutting or optimization is a priority, then a zero-based approach is the right decision. If doing this every year is too onerous, plan to do it for your OpEx at least every few years to examine what’s actually in there, clean house, and re-set.

      Set your high-level CapEx budget targets

      A lot of IT CapEx is conceived in business projects, so your proposed expenditure here may not be up to you. Exercise as much influence as you can.

      First things first: Is it project CapEx, or “business as usual” CapEx?

      Project CapEx is tied to one-time strategic projects requiring investment in new assets.

      • This CapEx will probably be variable year to year, going up or down depending on the organization’s circumstances or goals.
      • This area of spend is driven largely by the business and not IT. Plan to set project CapEx targets in close partnership with the business and function as a steward of these funds instead of as an owner.

      User-driven “business as usual” CapEx manifests via changes (often increases) in organizational headcount due to growth.

      • Costs here focus on end-user hardware like desktops, laptops, and peripherals.
      • Any new capital software acquisitions you have planned will also be affected in terms of number of licenses required.
      • Get reliable estimates of department-by-department hiring plans for next fiscal year to better account for these in your budget.

      Network/data center-driven “business-as-usual” CapEx is about core infrastructure maintenance.

      • Costs here focus on the purchase of network and data center hardware and other equipment to maintain existing infrastructure services and performance.
      • Increased outsourcing often drives down this area of “business as usual” CapEx by reducing the purchase of new on-premises solutions and eliminating network and data center maintenance requirements.

      Unanticipated hiring and the need to buy end-user hardware is cited as a top cause of budget grief by IT leaders – get ahead of this. Project CapEx, however, is usually determined via business-based capital project approval mechanisms well in advance. And don’t forget to factor in pre-established capital asset depreciation amounts generated by all the above!

      2.4 Set your high-level IT budget targets and metrics

      8 hours

      1. Download the IT Cost Forecasting and Budgeting Workbook to document the outcomes of this activity.
      2. Review the context in which your organization is currently operating and expects to operate in the next fiscal year. Specifically, look at:
        1. The state of the economy.
        2. Stated goals, objectives, and targets.
        3. The executive’s point of view on budget increase requests.
        Document your factors, assessment, rationale, and considerations in the “Business Context Assessment” table on the “Planning Variables” tab in the IT Cost Forecasting and Budgeting Workbook.
      3. Based on the business context, anticipated flips of former CapEx to OpEx, and realization of previous years’ efficiency measures, set a general non-project OpEx target as a percentage increase or decrease for next fiscal year to serve as a guideline in the cost forecasting guideline. Document this in the “Budget Targets & Metrics” table on the “Planning Variables” tab in the IT Cost Forecasting and Budgeting Workbook. sed on known capital projects, changes in headcount, typical “business as usual” equipment expenditure, and pre-established capital asset depreciation amounts, set general project CapEx and non-project CapEx targets. Document these in the “Budget Targets & Metrics” table on the “Planning Variables” tab in the IT Cost Forecasting and Budgeting Workbook.
      4. Finally, set your overarching IT budget process success metrics. Also document these in the “Budget Targets & Metrics” table on the “Planning Variables” tab in the IT Cost Forecasting and Budgeting Workbook.

      Download the IT Cost Forecasting and Budgeting Workbook

      2.4 Set your high-level IT budget targets and metrics

      InputOutputMaterialsParticipants
      • Knowledge of current business context and probable context next fiscal year
      • Analysis of historical IT expenditure patterns
      • High-level project CapEx and non-project CapEx and OpEx targets for the next fiscal year
      • IT budget process success metrics
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Phase recap: Get into budget-starting position

      Now you’re ready to do the deep dive into forecasting your IT budget for next year.

      In this phase, you clarified your business context and defined your budgetary goals, including:

      • Assembling your resources. You’ve built and organized your IT budgeting team, as well as gathered the data and information you’ll need to do your historical expenditure analysis and future forecasting
      • Understanding the four views of the IT Cost Model. You’ve become familiar with the four views of the model and have selected which ones you’ll map for historical analysis and forecasting purposes.
      • Reviewing last year’s budget versus actuals and five-year historical trends. You now have the critical rationale-building context to inform next year’s numbers and demonstrate any cost efficiencies you’ve successfully executed.
      • Setting your high-level goals. You’ve established high-level targets for project and non-project CapEx and OpEx, as well as set some IT budget process improvement goals.

      “We only have one dollar but five things. Help us understand how to spend that dollar.”

      – Trisha Goya, Director, IT Governance & Administration, Hawaii Medical Service Association

      Phase 3

      Develop Your Forecasts

      Lay Your
      Foundation

      Get Into Budget-Starting Position

      Develop Your
      Forecasts

      Build Your
      Proposed Budget

      Create and Deliver Your Presentation

      1.1 Understand what your budget is
      and does

      1.2 Know your stakeholders

      1.3 Continuously pre-sell your budget

      2.1 Assemble your resources

      2.2 Understand the four views of the ITFM Cost Model

      2.3 Review last year’s budget vs.
      actuals and five-year historical trends

      2.4 Set your high-level goals

      3.1 Develop assumptions and
      alternative scenarios

      3.2 Forecast your project CapEx

      3.3 Forecast your non-project CapEx and OpEx

      4.1 Aggregate your numbers

      4.2 Stress test your forecasts

      4.3 Challenge and perfect your
      rationales

      5.1 Plan your content

      5.2 Build your presentation

      5.3 Present to stakeholders

      5.4 Make final adjustments and submit your IT budget

      This phase will walk you through the following activities:

      • Documenting the assumptions behind your proposed budget and develop alternative scenarios.
      • Forecasting your project CapEx.
      • Forecasting your non-project CapEx and OpEx.

      This phase involves the following participants:

      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Develop your forecasts

      Start making some decisions.

      This phase focuses on putting real numbers on paper based on the research and data you’ve collected. Here, you will:

      • Develop assumptions and alternative scenarios. The assumptions you make are the logical foundation for your decisions, and your primary and alternative scenarios focus your thinking and demonstrate that you’ve thoroughly examined your organization’s current and future context.
      • Forecast your project CapEx costs. These costs are comprised of all the project-related capital expenditures for strategic or capital projects, including in-house labor.
      • Forecast your non-project CapEx and OpEx costs. These costs are the ongoing “business as usual” expenditures incurred via the day-to-day operations of IT and delivery of IT services.

      “Our April forecast is what really sets the bar for what our increase is going to be next fiscal year. We realized that we couldn’t change it later, so we needed to do more upfront to get that forecast right.

      If we know that IT projects have been delayed, if we know we pulled some things forward, if we know that a project isn’t starting until next year, let’s be really clear on those things so that we’re starting from a better forecast because that’s the basis of deciding two percent, three percent, whatever it’s going to be.”

      – Kristen Thurber, IT Director, Office of the CIO, Donaldson Company

      When pinning down assumptions, start with negotiable and non-negotiable constraints

      Assumptions are things you hold to be true. They may not actually be true, but they are your logical foundation and must be shared with stakeholders so they can follow your thinking.

      Start with understanding your constraints. These are either negotiable (adjustable) or non-negotiable (non-adjustable). However, what is non-negotiable for IT may be negotiable for the organization as a whole, such as its strategic objectives. Consider each of the constraints below, determine how it relates to IT expenditure options, and decide if it’s ultimately negotiable or non-negotiable.

      Organizational

      Legal and Regulatory

      IT/Other

      Example:
      • Strategic goals and priorities
      • Financial and market performance
      • Governance style and methods
      • Organizational policies
      • Organizational culture
      • Regulatory compliance and reporting
      • Data residency and privacy laws
      • Vendor contract terms and conditions
      • Health and safety
      • Compensation and collective bargaining
      • IT funding and fund allocation flexibility
      • Staff/skills availability and capacity
      • Business continuity and IT performance requirements
      • Time and timeframes
      You’re in year one of a three-year vendor contract. All contracts are negotiable, but this one isn’t for two years. This contact should be considered a non-negotiable for current budget-planning purposes.

      Identifying your negotiable and non-negotiable constraints is about knowing what levers you can pull. Government entities have more non-negotiable constraints than private companies, which means IT and the organization as a whole have fewer budgetary levers to pull and a lot less flexibility.

      An un-pullable lever and a pullable lever (and how much you can pull it) have one important thing in common – they are all fundamental assumptions that influence your decisions.

      Brainstorm your assumptions even further

      The tricky thing about assumptions is that they’re taken for granted – you don’t always realize you’ve made them. Consider these common assumptions and test them for validity.

      My current employees will still be here 18 months from now.

      My current vendors aren’t going to discontinue the products we have.

      My organization’s executive team will be the same 18 months from now. My current key vendors will be around for years to come.

      My organization’s departments, divisions, and general structure will be the same 18 months from now.

      IT has to be an innovation leader.

      We won’t be involved in any merger/acquisition activity next fiscal year.

      IT has always played the same role here and that won’t change.

      There won’t be a major natural disaster that takes us offline for days or even weeks.

      We must move everything we can to the cloud.

      We won’t be launching any new products or services next fiscal year.

      Most of our IT expenditure has to be CapEx, as usual.

      You won’t put some of these assumptions into your final budget presentation. It’s simply worthwhile knowing what they are so you can challenge them when forecasting.

      Based on your assumptions, define the primary scenario that will frame your budget

      Your primary scenario is the one you believe is most likely to happen and upon which you’ll build your IT cost forecasts.

      Now it’s time to outline your primary scenario.

      • A scenario is created by identifying the variable factors embedded in your assumptions and manipulating them across the range of possibilities. This manipulation of variables will result in different scenarios, some more likely or feasible than others.
      • Your primary scenario is the one you believe is the most feasible and/or likely to happen (i.e. most probable). This is based on:
        • Your understanding of past events and patterns.
        • Your understanding of your organization’s current context.
        • Your understanding of IT’s current context.
        • Your understanding of the organization’s objectives.
        • Your assessment of negotiable and non-negotiable constraints and other assumptions for both IT and the organization.

      A note on probability…

      • A non-negotiable constraint doesn’t have any variables to manipulate. It’s a 100% probability that must be rigidly accommodated and protected in your scenario. An example is a long-standing industry regulation that shows no signs of being updated or altered and must be complied with in its current state.
      • A negotiable constraint has many more variables in play. Your goal is to identify the different potential values of the variables and determine the degree of probability that one value is more likely to be true or feasible than another. An example is that you’re directed to cut costs, but the amount could be as little as 3% or as much as 20%.
      • And then there are the unknowns. These are circumstances, events, or initiatives that inevitably happen, but you can’t predict when, what, or how much. This is what contingency planning and insurance are for. Examples include a natural disaster, a pandemic, a supply chain crisis, or the CEO simply changing their mind. Its safe to assume something is going to happen, so if you’re able to establish a contingency fund or mechanisms that let you respond, then do it.

      What could or will be your organization’s new current state at the end of next fiscal year?

      Next, explore alternative scenarios, even those that may seem a bit outrageous

      Offering alternatives demonstrates that you weighed all the pertinent factors and that you’ve thought broadly about the organization’s future and how best to support it.

      Primary scenario approval can be helped by putting that scenario alongside alternatives that are less attractive due to their cost, priority, or feasibility. Alternative scenarios are created by manipulating or eliminating your negotiable constraints or treating specific unknowns as knowns. Here are some common alternative scenarios.

      The high-cost scenario: Assumes very positive economic prospects. Characterized by more of everything – people and skills, new or more sophisticated technologies, projects, growth, and innovation. Remember to consider the long-term impact on OpEx that higher capital spend may bring in subsequent years.

      Target 10-20% more expenditure than your primary scenario

      The low-cost scenario: Assumes negative economic prospects or cost-control objectives. Characterized by less of everything, specifically capital project investment, other CapEx, and OpEx. Must assume that business service-level expectations will be down-graded and other sacrifices will be made.

      Target 5-15% less expenditure than your primary scenario

      The dark horse scenario: This is a more radical proposition that challenges the status quo. For example, what would the budget look like if all data specialists in the organization were centralized under IT? What if IT ran the corporate PMO? What if the entire IT function was 100% outsourced?

      No specific target

      Case Study

      INDUSTRY: Manufacturing

      SOURCE: Anonymous

      A manufacturing IT Director gets budgetary approval by showing what the business would have to sacrifice to get the cheap option.

      Challenge

      Solution

      Results

      A manufacturing business had been cutting costs endlessly across the organization, but specifically in IT.

      IT was down to the bone. The IT Director had already been doing zero-based budgeting to rationalize all expenditure, stretching asset lifecycles as long as possible, and letting maintenance work slide.

      There were no obvious options left to reduce costs based on what the business wanted to do.

      The IT Director got creative. He put together three complete budgets:

      1. The budget he wanted.
      2. A budget where everything was entirely outsourced and there would be zero in-house IT staff.
      3. A budget that was not as extreme as the second one, but still tilted toward outsourcing.

      In the budget presentation, he led with the “super cheap” budget where IT was 100% outsourced.

      He proceeded to review the things they wouldn’t have under the extreme outsourced scenario, including the losses in service levels that would be necessary to make it happen.

      The executive was shocked by what the IT Director showed them.

      The executive immediately approved the IT Director’s preferred budget. He was able to defend the best budget for the business by showing them what they stood to lose.

      3.1 Document your assumptions and alternative scenarios

      2 hours

      1. Download the IT Cost Forecasting and Budgeting Workbook and document the outcomes of this activity on Tab 9, “Alternative Scenarios.”
      2. As a management team, identify and discuss your non-negotiable and negotiable constraints. Document these in rows 4 and 5 respectively in the Workbook.
      3. Brainstorm, list, and challenge any other assumptions being made by IT or the organization’s executive in terms of what can and cannot be done.
      4. Identify the most likely or feasible scenario (primary) and associated assumptions. You will base your initial forecasting on this scenario.
      5. Identify alternative scenarios. Document each scenario’s name, description, and key assumptions, and major opportunities in columns B-D on Tab 9, “Alternative Scenarios.” You will do any calculations for these scenarios after you have completed the forecast for your primary scenario.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Knowledge of organization’s context, culture, and operations
      • A list of assumptions that will form the logical foundation of your forecasting decisions
      • Identification of the primary budget scenario and alternatives
      MaterialsParticipants
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Before diving into actual forecasting, get clear on project and non-project CapEx and OpEx

      Traditional, binary “CapEx vs. OpEx” distinctions don’t seem adequate for showing where expenditure is really going. We’ve added a new facet to help further differentiate one-time project costs from recurring “business as usual” expenses.

      Project CapEx
      Includes all workforce and vendor costs associated with planning and execution of projects largely focused on the acquisition or creation of new capital assets.

      Non-project CapEx
      Includes “business as usual” capital asset acquisition in the interest of managing, maintaining, or supporting ongoing performance of existing infrastructure or services, such as replacement network equipment, end-user hardware (e.g. laptops), or disaster recovery/business continuity redundancies. Also includes ongoing asset depreciation amounts.

      Non-project OpEx
      Includes all recurring, non-CapEx “business as usual” costs such as labor compensation and training, cloud-based software fees, outsourcing costs, managed services fees, subscriptions, and other discretionary spend.

      Depreciation is technically CapEx. However, for practical purposes, most organizations list it under OpEx, which can cause it to get lost in the noise. Here, depreciation is under non-project CapEx to keep its true CapEx nature visible and in the company of other “business as usual” capital purchases that will ultimately join the depreciation ranks.

      Forecast your project CapEx costs

      This process can be simple as far as overall budget forecasting is concerned. If it isn’t simple now, plan to make it simpler next time around.

      What to expect…

      • Ideally, the costs for all projects should have been thoroughly estimated, reviewed, and accepted by a steering committee, your CFO, or other approving entity at the start of the budgeting season, and funding already committed to. In a nutshell, forecasting your project costs should already have been done and will only require plugging in those numbers.
      • If projects have yet to be pitched and rubber stamped, know that your work is cut out for you. Doing things in a rush or without proper due diligence will result in certain costs being missed. This means that you risk going far over budget in terms of actuals next year, or having to borrow from other areas in your budget to cover unplanned or underestimated project costs.

      Key forecasting principles…

      Develop rigorous business cases
      Secure funding approval well in advance
      Tie back costs benefitting business units
      Consider the longer-term OpEx impact

      For more information about putting together sound business cases for different projects and circumstances, see the following Info-Tech blueprints:

      Build a Comprehensive Business Case

      Fund Innovation with a Minimum Viable Business Case

      Reduce Time to Consensus with an Accelerated Business Case

      Apply these project CapEx forecasting tips

      A good project CapEx forecast requires steady legwork, not last-minute fast thinking.

      Tip #1: Don’t surprise your approvers. Springing a capital project on approvers at your formal presentation isn’t a good idea and stands a good chance of rejection, so do whatever you can to lock these costs down well in advance.

      Tip #2: Project costs should be entirely comprised of CapEx if possible. Keep in mind that some of these costs will convert to depreciated non-project CapEx and non-project OpEx as they transition from project costs to ongoing “business as usual” costs, usually in the fiscal year following the year of expenditure. Creating projections for the longer-term impacts of these project CapEx costs on future types of expenditure is a good idea. Remember that a one-time project is not the same thing as a one-time cost.

      Tip #3: Capitalize any employee labor costs on capital projects. This ensures the true costs of projects are not underestimated and that operational staff aren’t being used for free at the expense of their regular duties.

      Tip #4: Capitalizing cloud costs in year one of a formal implementation project is usually acceptable. It’s possible to continue treating cloud costs as CapEx with some vendors via something called reserved instances, but organizations report that this is a lot of work to set up. In the end, most capitalized cloud will convert into non-project OpEx in years two and beyond.

      Tip #5: Build in some leeway. By the time a project is initiated, circumstances may have changed dramatically from when it was first pitched and approved, including business priorities and needs, vendor pricing, and skillset availability. Your costing may become completely out of date. It’s a good practice to work within more general cost ranges than with specific numbers, to give you the flexibility to respond and adapt during actual execution.

      3.2 Forecast your project CapEx

      Time: Depends on size of project portfolio

      1. Download the IT Cost Forecasting and Budgeting Workbook and navigate to Tab 5, “Project CapEx Forecast”. Add more columns as required. Enter the following for all projects:
        • Row 5 – Its name and/or unique identifier.
        • Row 6 – Its known or estimated project start/end dates.
        • Row 7 – Its status (in proposal, committed, or in progress).
      2. Distribute each project’s costs across the categories listed for each view you’ve selected to map. Do not include any OpEx here – it will be mapped separately under non-project OpEx.
      3. Rationalize your values. A running per-project total for each view, as well as totals for all projects combined, are in rows 16, 28, 39, and 43. Ensure these totals match or are very close across all the views you are mapping. If they don’t match, review the views that are lower-end outliers as there’s a good chance something has been overlooked.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Project proposals and plans, including cost estimations
      • A project CapEx forecast for next fiscal year
      MaterialsParticipants
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Forecast your non-project OpEx

      Most of your budget will be non-project OpEx, so plan to spend most of your forecasting effort here.

      What to expect…

      Central to the definition of OpEx is the fact that it’s ongoing. It rarely stops, and tends to steadily increase over time due to factors like inflation, rising vendor prices, growing organizational growth, increases in the salary expectations of employees, and other factors.

      The only certain ways to reduce OpEx are to convert it to capitalizable expenditure, decrease staffing costs, not pursue cloud technologies, or for the organization to simply not grow. For most organizations, none of these approaches are feasible. Smaller scale efficiencies and optimizations can keep OpEx from running amok, but they won’t change its overall upward trajectory over time. Expect it to increase.

      Key forecasting principles…

      Focus on optimization and efficiency.
      Aim for full spend transparency.
      Think about appropriate chargeback options.
      Give it the time it deserves.

      For more information about how to make the most out of your IT OpEx, see the following Info-Tech blueprints:

      Develop Your Cost Optimization Roadmap

      Achieve IT Spend & Staffing Transparency

      Discover the Hidden Costs of Outsourcing

      Apply these non-project OpEx forecasting tips

      A good forecast is in the details, so take a very close look to see what’s really there.

      Tip #1: Consider zero-based budgeting. You don’t have to do this every year, but re-rationalizing your OpEx every few years, or a just a segment of it on a rotational basis, will not only help you readily justify the expenditure but also find waste and inefficiencies you didn’t know existed.

      Tip #2: Capitalize your employee capital project work. While some organizations aren’t allowed to do this, others who can simply don’t bother. Unfortunately, this act can bloat the OpEx side of the equation substantially. Many regular employees spend a significant amount of their time working on capital projects, but this fact is invisible to the business. This is why the business keeps asking why it takes so many people to run IT.

      Tip #3: Break out your cloud vs. on-premises costs. Burying cloud apps costs in a generic software bucket works against any transparency ambitions you may have. If you have anything resembling a cloud strategy, you need to track, report, and plan for these costs separately in order to measure benefits realization. This goes for cloud infrastructure costs, too.

      Tip #4: Spend time on your CIO service view forecast. Completing this view counts as a first step toward service-based costing and is a good starting point for setting up an accurate service catalog. If looking for cost reductions, you’ll want to examine your forecasts in this view as there will likely be service-level reductions you’ll need to propose to hit your cost-cutting goals.

      Tip #5: Budget with consideration for chargeback. chargeback mechanisms for OpEx can be challenging to manage and have political repercussions, but they do shift accountability back to the business, guarantee that the IT bills get paid, and reduce IT’s OpEx burden. Selectively charging business units for applications that only they use may be a good entry point into chargeback. It may also be as far as you want to go with it. Doing the CXO business view forecast will provide insight into your opportunities here.

      Forecast your non-project CapEx

      These costs are often the smallest percentage of overall expenditure but one of the biggest sources of financial grief for IT.

      What to expect…

      • These costs can be hard to predict. Anticipating expenditure on end-user hardware such as laptops depends on knowing how many new staff will be hired by the organization next year. Predicting the need to buy networking hardware depends on knowing if, and when, a critical piece of equipment is going to spontaneously fail. You can never be completely sure.
      • IT often must reallocate funds from other areas of its budget to cover non-project CapEx costs. Unfortunately, keeping the network running and ensuring employees have access to that network is seen exclusively as an IT problem, not a business problem. Plan to change this mindset.

      Key forecasting principles…

      Discuss hiring plans with the business.
      Pay close attention to your asset lifecycles.
      Prepare to advise about depreciation schedules.
      Build in contingency for the unexpected.

      For more information about ensuring IT isn’t left in the lurch when it comes to non-project CapEx, see the following Info-Tech blueprints:

      Manage End-User Devices

      Develop an Availability and Capacity Management Plan

      Modernize the Network

      Apply these non-project CapEx forecasting tips

      A good forecast relies on your ability to accurately predict the future.

      Tip #1: Top up new hire estimations: Talk to every business unit leader about their concrete hiring plans, not their aspirations. Get a number, increase that number by 25% or 20 FTEs (whichever is less), and use this new number to calculate your end-user non-project CapEx.

      Tip #2: Make an arrangement for who’s paying for operational technology (OT) devices and equipment. OT involves specialized devices such as in-the-field sensors, scanners, meters, and other networkable equipment. Historically, operational units have handled this themselves, but this has created security problems and they still rely on IT for support. Sort the financials out now, including whose budget device and equipment purchases appear on, as well as what accommodations IT will need to make in its own budget to support them.

      Tip #3: Evaluate cloud infrastructure and managed services. These can dramatically reduce your non-project CapEx, particularly on the network and data center fronts. However, these solutions aren’t necessarily less expensive and will drive up OpEx, so tread cautiously.

      Tip #4: Definitely do an inventory. If you haven’t invested in IT asset management, put it on your project and budgetary agenda. You can’t manage what you don’t know you have, so asset discovery should be your first order of business. From there, start gathering asset lifecycle information and build in alerting to aid your spend planning.

      Tip #5: Think about retirement: What assets are nearing end of life or the end of their depreciation schedule? What impact is this having on non-project OpEx in terms of maintenance and support? Deciding to retire, replace, or extend an IT operational asset will change your non-project CapEx outlook and will affect costs in other areas.

      Tip #6: Create a contingency fund: You need one to deal with surprises and emergencies, so why wait?

      Document the organization’s projected FTEs by business function

      This data point is usually missing from IT’s budget forecasting data set. Try to get it.

      A powerful metric to share with business stakeholders is expenditure per employee or FTE. It’s powerful because:

      • It’s one of the few metrics that’s intuitively understood by most people
      • It can show changes in IT expenditure over time at both granular and general levels.

      This metric is one of the simplest to calculate. The challenge is in getting your hands on the data in the first place.

      • Most business unit leaders struggle to pin down this number in terms of actuals as they have difficulty determining what an FTE actually is. Does it include contract staff? Part-time staff? Seasonal workers? Volunteers and interns? And if the business unit has high turnover, this number can fluctuate significantly.
      • Encourage your business peers to produce a rational estimate. Unlike the headcount number you’re seeking to forecast for non-project capital expenditure for end-user hardware, this FTE number should strive to be more in the ballpark, as you’re not using it to ensure sufficient funds but comparatively track expenditure year to year.
      • Depending on your industry, employees or FTEs may not be the best measurement. Use what works best for you. Number of unique users is a common one. Other industry-specific examples include per student, per bed, per patient, per account, and per resident.

      Start to build in long-term and short-term forecasting into your budgeting process

      These are growing practices in mature IT organizations that afford significant flexibility.

      Short-term forecasting:

      Long-term forecasting:

      • At Donaldson Company, budgeting is a once-a-year event, but they’ve started formalizing a forecast review three times a year.
      • These mini-forecasts are not as full blown as the annual forecasting process. Rather, they look at specific parts of the budget and update it based on changing realities.

      “It’s a great step in the right direction. We look at
      the current, and then the future. What we’re really pushing is how to keep that outyear spend more in discussion. The biggest thing we’re trying to do when we approve projects is look at what does that approval do to outyear spend? Is it going to increase? Is it going to decrease? Will we be spending more on licensing? On people?”

      – Kristen Thurber, IT Director, Office of the CIO,
      Donaldson Company

      • In 2017, the Hawaii Medical Service Association accepted the fact that they were very challenged with legacy systems. They needed to modernize.
      • They created a multi-year strategic budget -- a five-year investment plan. This plan was a success. They were able to gain approval for a five-year horizon with variable allocations per year, as required.

      “This approach was much better. We now
      have a “guarantee” of funding for five years now – they’ve conceptually agreed. Now we don’t have
      to make that request for new money every time
      if we need more. We can vary the amount every
      year – it doesn’t have to be the same.”

      – Trisha Goya, Director, IT Governance & Administration,
      Hawaii Medical Service Association

      3.4 Forecast your non-project OpEx and CapEx

      Time: Depends on size of vendor portfolio and workforce

      1. Download the IT Cost Forecasting and Budgeting Workbook and navigate to Tab 4, “Business as Usual Forecast”. This tab assumes an incremental budgeting approach. Last year’s actuals have been carried forward for you to build upon.
      2. Enter expected percentage-based cost increases/decreases for next fiscal year for each of the following variables (columns E-I): inflation, vendor pricing, labor costs, service levels, and depreciation. Do this for all sub-categories for the ITFM cost model views you’ve opted to map. Provide rationales for your percentage values in column K.
      3. In columns M and N, enter the anticipated percentage allocation of cost to non-project CapEx versus non-project OpEx.
      4. In column O, rows 29-38, enter the projected FTEs for each business function (if available).
      5. If you choose, make longer-term, high-level forecasts for 2-3 years in the future in columns P-U. Performing longer-term forecasts for at least the CFO expense view categories is recommended.

      Download the IT Cost Forecasting and Budgeting Workbook

      Input Output
      • Last fiscal year’s actuals
      • Knowledge of likely inflation, vendor cost, and salary expectations for next fiscal year
      • Depreciation amounts
      • A non-project OpEx and CapEx forecast for next fiscal year
      Materials Participants
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Case Study

      INDUSTRY: Insurance

      SOURCE: Anonymous

      Challenge

      Solution

      Results

      In his first run at the annual budgeting process, a new CIO received delivery dates from Finance and spent the next three months building the budget for the next fiscal year.

      He discovered that the organization had been underinvesting in IT for a long time. There were platforms without support, no accounting for currency exchange rates on purchases, components that had not be upgraded in 16 years, big cybersecurity risks, and 20 critical incidences a month.

      In his budget, the CIO requested a 22-24% increase in IT expenditure to deal with the critical gaps, and provided a detailed defense of his proposal

      But the new CIO’s team and Finance were frustrated with him. He asked his IT finance leader why. She said she didn’t understand what his direction was and why the budgeting process was taking so long – his predecessor did the budget in only two days. He would add up the contracts, add 10% for inflation, and that’s it.

      Simply put, the organization hadn’t taken budgeting seriously. By doing it right, the new CIO had inadvertently challenged the status quo.

      The CIO ended up under-executing his first budget by 12% but is tracking closer to plan this year. Significantly, he’s been able cut critical incidences from 20 down to only 2-3 per month.

      Some friction persists with the CFO, who sees him as a “big spender,” but he believes that this friction has forced him to be even better.

      Phase recap: Develop your forecasts

      The hard math is done. Now it’s time to step back and craft your final proposed budget and its key messages.

      This phase focused on developing your forecasts and proposed budget for next fiscal year. It included:

      • Developing assumptions and alternative scenarios. These will showcase your understanding of business context as well as what’s most likely to happen (or should happen) next year.
      • Forecasting your project CapEx costs. If these costs weren’t laid out already in formal, approved project proposals or plans, now you know why it’s the better approach for developing a budget.
      • Forecasting your non-project CapEx and OpEx costs. Now you should have more clarity and transparency concerning where these costs are going and exactly why they need to go there.

      “Ninety percent of your projects will get started but a good 10% will never get off the ground because of capacity or the business changes their mind or other priorities are thrown in. There are always these sorts of challenges that come up.”

      – Theresa Hughes, Executive Counselor,
      Info-Tech Research Group
      and Former IT Executive

      Phase 4

      Build Your Proposed Budget

      Lay Your
      Foundation

      Get Into Budget-Starting Position

      Develop Your
      Forecasts

      Build Your
      Proposed Budget

      Create and Deliver Your Presentation

      1.1 Understand what your budget is
      and does

      1.2 Know your stakeholders

      1.3 Continuously pre-sell your budget

      2.1 Assemble your resources

      2.2 Understand the four views of the ITFM Cost Model

      2.3 Review last year’s budget vs.
      actuals and five-year historical trends

      2.4 Set your high-level goals

      3.1 Develop assumptions and
      alternative scenarios

      3.2 Forecast your project CapEx

      3.3 Forecast your non-project CapEx and OpEx

      4.1 Aggregate your numbers

      4.2 Stress test your forecasts

      4.3 Challenge and perfect your
      rationales

      5.1 Plan your content

      5.2 Build your presentation

      5.3 Present to stakeholders

      5.4 Make final adjustments and submit your IT budget

      This phase will walk you through the following activities:

      • Pulling your forecasts together into a comprehensive IT budget for next fiscal year.
      • Double checking your forecasts to ensure they’re accurate.
      • Fine tuning the rationales behind your proposals.

      This phase involves the following participants:

      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Build your proposed budget

      Triple check your numbers and put the finishing touches on your approval-winning rationales.

      This phase is where your analysis and decision making finally come together into a coherent budget proposal. Key steps include:

      • Aggregating your numbers. This step involves pulling together your project CapEx, non-project CapEx, and non-project OpEx forecasts into a comprehensive whole and sanity-checking your expenditure-type ratios.
      • Stress-testing your forecasts. Do some detailed checks to ensure everything’s accounted for and you haven’t overlooked any significant information or factors that could affect your forecasted costs.
      • Challenging and perfecting your rationales. Your ability to present hard evidence and rational explanations in support of your proposed budget is often the difference between a yes or a no. Look at your proposals from different stakeholder perspectives and ask yourself, “Would I say yes to this if I were them?”

      “We don’t buy servers and licenses because we want to. We buy them because we have to. IT doesn’t need those servers out at our data center provider, network connections, et cetera. Only a fraction of these costs are to support us in the IT department. IT doesn’t have control over these costs because we’re not the consumers.”

      – Matt Johnson, IT Director Governance and Business Solutions, Milwaukee County

      Great rationales do more than set you up for streamlined budgetary approval

      Rationales build credibility and trust in your business capabilities. They can also help stop the same conversations happening year after year.

      Any item in your proposed budget can send you down a rabbit hole if not thoroughly defensible.

      You probably won’t need to defend every item, but it’s best to be prepared to do so. Ask yourself:

      • What areas of spend does the CFO come back to year after year? Is it some aspect of OpEx, such as workforce costs or cloud software fees? Is it the relationship between proposed project spend and business benefits? Provide detailed and transparent rationales for these items to start re-directing long-term conversations to more strategic issues.
      • What areas of spend seem to be recurring points of conflict with business unit leaders? Is it surprise spend that comes from business decisions that didn’t include IT? Is it business-unit leaders railing against chargeback? Have frank, information-sharing conversations focused on business applications, service-level requirements, and true IT costs to support them.
      • What’s on the CEO’s mind? Are they focused on entering a new overseas market, which will require capital investment? Are they interested in the potential of a new technology because competitors are adopting it? It may not be the same focus as last year, so ensure you have fresh rationales that show how IT will help deliver on these business goals.

      “Budgets get out of control when one department fails to care for the implications of change within another department's budget. This wastes time, reduces accuracy and causes conflict.”

      – Tara Kinney, Atomic Revenue, LLC.

      Rationalizing costs depends on the intention of the spend

      Not all spending serves the same purpose. Some types require deeper or different justifications than others.

      For the business, there are two main purposes for spend:

      1. Spending that drives revenues or the customer experience. Think in terms of return on investment (ROI), i.e. when will the expenditure pay for itself via the revenue gains it helps create?
      2. Spending that mitigates and manages risk. Think in terms of cost-benefit, i.e. what are the costs of doing something versus doing nothing at all?
      Source: Kris Blackmon, NetSuite Brainyard.

      “Approval came down to ROI and the ability to show benefits realization for years one, two, and three through five.”

      – Duane Cooney, Executive Counselor, Info-Tech Research Group, and Former Healthcare CIO

      Regardless of its ultimate purpose, all expenditure needs statements of assumptions, obstacles, and likelihood of goals being realized behind it.

      • What are the assumptions that went into the calculation?
      • Is the spend new or a reallocation (and from where)?
      • What’s the likelihood of realizing returns or benefits?
      • What are potential obstacles to realizing returns or benefits?

      Rationales aren’t only for capital projects – they can and should be applied to all proposed OpEx and CapEx. Business project rationales tend to drive revenue and the customer experience, demanding ROI calculations. Internal IT-projects and non-project expenditure are often focused on mitigating and managing risk, requiring cost-benefit analysis.

      First, make sure your numbers add up

      There are a lot of numbers flying around during a budgeting process. Now’s the time to get out of the weeds, look at the big picture, and ensure everything lines up.

      Overall

      Non-Project OpEx

      Non-Project CapEx

      Project CapEx

      • Is your proposed budget consistent with previous IT expenditure patterns?
      • Did you account for major known anomalies or events?
      • Is your final total in line with your CFO’s communicated targets and expectations?
      • Are your alternative scenarios realistic and reflective of viable economic contexts that your organization could find itself in in the near term?
      • Are the OpEx-to-CapEx ratios sensible?
      • Does it pass your gut check?
      • Did you research and verify market rates for employees and skill sets?
      • Did you research and verify likely vendor pricing and potential increases?
      • Are cost categories with variances greater than +5% backed up by defensible IT hiring plans or documented operational growth or improvement initiatives?
      • Have you accounted for the absorption of previous capital project costs into day-to-day management, maintenance, and support operations?
      • Do you have accurate depreciation amounts and timeframes for their discontinuation?
      • Are any variances driven by confirmed business plans to increase headcount, necessitating purchase of end-user hardware and on-premises software licenses?
      • Are any variances due to net-new planned/contingency purchases or the retirement of depreciable on-premises equipment?
      • Is funding for all capital projects represented reliable, i.e. has it been approved?
      • Are all in-progress, proposed, or committed project CapEx costs backed up with reliable estimates and full project documentation?
      • Do capital project costs include the capitalizable costs of employees working on those projects, and were these amounts deducted from non-project OpEx?
      • Have you estimated the longer-term OpEx impact of your current capital projects?

      4.1 Aggregate your proposed budget numbers and stress test your forecasts

      2 hours

      1. Download the IT Cost Forecasting and Budgeting Workbook for this activity. If you have been using it thus far, the Workbook will have calculated your numbers for you across the four views of the ITFM Cost Model on Tab 7, “Proposed Budget”, including:
        1. Forecasted non-project OpEx, non-project CapEx (including depreciation values), project CapEx, and total values.
        2. Numerical and percentage variances from the previous year.
      2. Test and finalize your forecasts by applying the questions on the previous slide.
      3. Flag cost categories where large variances from the previous year or large numbers in general appear – you will need to ensure your rationales for these variances are rigorous in the next step.
      4. Make amendments if needed to Tabs 4, “Business as Usual Forecast” and 5, “Project CapEx Forecast” in the IT Cost Forecasting and Budgeting Workbook.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutputMaterialsParticipants
      • Final drafts of all IT cost forecasts
      • A final proposed IT budget
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Case Study

      INDUSTRY: Healthcare

      SOURCE: Anonymous

      Challenge

      Solution

      Results

      A senior nursing systems director needed the CIO’s help. She wanted to get a project off the ground, but it wasn’t getting priority or funding.

      Nurses were burning out. Many were staying one to two hours late per shift to catch up on patient notes. Their EHR platform had two problematic workflows, each taking up to about 15 minutes per nurse per patient to complete. These workflows were complex, of no value, and just not getting done. She needed a few million dollars to make the fix.

      The CIO worked with the director to do the math. In only a few hours, they realized that the savings from rewriting the workflows would allow them to hire over 500 full-time nurses.

      The benefits realized would not only help reduce nurse workload and generate savings, but also increase the amount of time spent with patients and number of patients seen overall. They redid the math several times to ensure they were right.

      The senior nursing systems director presented to her peers and leadership, and eventually to the Board of Directors. The Board immediately saw the benefits and promoted the project to first on the list ahead of all other projects.

      This collaborative approach to generating project benefits statements helped the CIO gain trust and pave the way for future budgets.

      The strength of your rationales will determine how readily your budget is approved

      When proposing expenditure, you need to thoroughly consider the organization’s goals, its governance culture, and the overall feasibility of what’s being asked.

      First, recall what budgets are really about.

      The completeness, accuracy, and granularity of your numbers and thorough ROI calculations for projects are essential. They will serve you well in getting the CFO’s attention. However, the numbers will only get you halfway there. Despite what some people think, the work in setting a budget is more about the what, how, and why – that is, the rationale – than about the how much.

      Next, revisit Phase 1 of this blueprint and review:

      • Your organization’s budgeting culture and processes.
      • The typical accountabilities, priorities, challenges, opportunities, and expectations associated with your CFO, CEO, and CXO IT budget stakeholders.
      • Your budgetary mandate as the head of IT.

      Then, look at each component of your proposed budget through each of these three rationale-building lenses.

      Business goals
      What are the organization’s strategic priorities?

      Governance culture
      How constrained is the decision-making process?

      Feasibility
      Can we make it happen?

      Linking proposed spend to strategic goals isn’t just for strategic project CapEx

      Tie in your “business as usual” non-project OpEx and CapEx, as well.

      Business goals

      What are the organization’s strategic priorities?

      Context

      This is all about external factors, namely the broader economic, political, and industry contexts in which the organization operates.

      Lifecycle position

      The stage the organization is at in terms of growth, stability, or decline will drive decisions, priorities, and the ability to spend or invest.

      Opportunities

      Context and lifecycle position determine opportunities, which are often defined in terms of potential cost savings
      or ROI.

      Tie every element in your proposed budget to an organizational goal.

      Non-project OpEx

      • Remember that OpEx is what comes from the realization of past strategic goals. If that past goal is still valid, then the OpEx that keeps that goal alive is, too.
      • Business viability and continuity are often unexpressed goals. OpEx directly supports these goals.
      • Periodically apply zero-based budgeting to OpEx to re-rationalize and identify waste.

      Non-project CapEx

      • Know the impact of any business growth goals on future headcount – this is essential to rationalize laptop/desktop and other end-user hardware spend.
      • Position infrastructure equipment spend in terms of having sufficient capacity to support growth goals as well as ensuring network/system reliability and continuity.
      • Leverage depreciation schedules as backup.

      Project CapEx

      • Challenge business-driven CapEx projects if they don’t directly support stated goals.
      • Ideally, the goal-supporting rationales for software, hardware, and workforce CapEx have been laid out in an already-approved project proposal. Refer to these plans.
      • If pitching a capital project at the last minute, especially an IT-driven one, expect a “no” regardless of how well it ties to goals.

      Your governance culture will determine what you need to show and when you show it

      The rigor of your rationales is entirely driven by “how things are done around here.”

      Governance Culture

      How rigorous/ constrained
      is decision-making?

      Risk tolerance

      This is the organization’s willingness to be flexible, take chances, make change, and innovate. It is often driven by legal and regulatory mandates.

      Control

      Control manifests in the number and nature of rules and how authority and accountability are centralized or distributed in the organization.

      Speed to action

      How quickly decisions are made and executed upon is determined by the amount of consultation and number of approval steps.

      Ensure all parts of your proposed budget align with what’s tolerated and allowed.

      Non-project OpEx

      • Don’t hide OpEx. If it’s a dirty word, put it front and center to start normalizing it.
      • As with business goals, position OpEx as necessary for business continuity and risk mitigation, as well as the thing that keeps long-term strategic goals alive.
      • Focus on efficiency and cost control, both in terms of past and future initiatives, regardless of the governance culture.

      Non-project CapEx

      • Treat non-project CapEx in the same way as you would non-project OpEx.
      • IT must make purchases quickly in this area of spend, but drawn-out procurement processes can make this impossible. Consider including a separate proposal to establish a policy that gives IT the control to make end-user and network/data center equipment purchases faster and easier.

      Project CapEx

      • If your organization is risk-averse, highly centralized, or slow to act, don’t expect IT to win approval for innovative capital projects. Let the business make any pitches and have IT serve in a supporting role.
      • Capital projects are often committed to 6-12 months in advance and can’t be completed within a fiscal year. Nudge the organization toward longer-term, flexible funding.

      No matter which way your goals and culture lean, ground all your rationales in reality

      Objective, unapologetic facts are your strongest rationale-building tool.

      Feasibility

      Can we do it, and what sacrifices will we have to make?

      Funding

      The ultimate determinant of feasibility is the availability, quantity, and reliability of funding next fiscal year and over the long term to support investment.

      Capabilities

      Success hinges on both the availability and accessibility of required skills and knowledge to execute on a spend plan in the required timeframe.

      Risk

      Risk is not just about obstacles to success and what could happen if you do something – it’s also about what could happen if you do nothing at all.

      Vet every part of your proposed budget to ensure what you’re asking for is both realistic and possible.

      Non-project OpEx

      • Point out your operational waste-reduction and efficiency-gaining efforts in hard, numerical terms.
      • Clearly demonstrate that OpEx cannot be reduced without sacrifices on the business side, specifically in terms of service levels.
      • Define OpEx impacts for all CapEx proposals to ensure funding commitments include long-term maintenance and support.

      Non-project CapEx

      • This is a common source of surprise budget overage, and IT often sacrifices parts of its OpEx budget to cover it. Shed light on this problem and define IT’s boundaries.
      • A core infrastructure equipment contingency fund and a policy mandating business units pay for unbudgeted end-user tech due to unplanned or uncommunicated headcount increases are worth pursuing.

      Project CapEx

      • Be sure IT is involved with every capital project proposal that has a technological implication (which is usually all of them).
      • Specifically, IT should take on responsibility for tech vendor evaluation and negotiation. Never leave this up to the business.
      • Ensure IT gains funding for supporting any technologies acquired via a capital planning process, including hiring if necessary.

      Double-check to ensure your bases are covered

      Detailed data and information checklist:

      • I have the following data and information for each item of proposed expenditure:
      • Sponsors, owners, and/or managers from IT and the business.
      • CapEx and OpEx costs broken down by workforce (employees/contract) and vendor (software, hardware, services) at a minimum for both last fiscal year (if continuing spend) and next fiscal year to demonstrate any changes.
      • Projected annual costs for the above, extending two to five years into the future, with dates when new spending will start, known depreciations will end, and CapEx will transition to OpEx.
      • Descriptions of any tradeoffs or potential obstacles.
      • Lifespan information for new, proposed assets informing depreciation scheduling.
      • Sources of funding (especially if new, transferred, or changed).
      • Copies of any research used to inform any of the above.

      High-level rationale checklist:

      • I have done the following thinking and analysis for each item of proposed expenditure:
      • Considered it in the context of my organization’s broader operating environment and the constraints and opportunities this creates.
      • Tied it – directly or indirectly – to the achievement or sustainment of current or past (but still relevant) organizational goals.
      • Understood my organization’s tolerances, how things get done, and whether I can win any battles that I need to fight given these realities.
      • Worked with business unit leaders to fully understand their plans and how IT can support them.
      • Obtained current, verifiable data and information and have a good idea if, when, and how this information may change next year.
      • Assessed benefits, risks, dependencies, and overall feasibility, as well as created ROI statements where needed.
      • Stuck to the facts and am confident they can speak for themselves.

      For more on creating detailed business cases for projects and investments, see Info-Tech’s comprehensive blueprint, Build a Comprehensive Business Case.

      4.2 Challenge and perfect your rationales

      2 hours

      1. Based on your analysis in Phase 1, review your organization’s current and near-term business goals (context, lifecycle position, opportunities), governance culture (risk tolerance, control, speed to action), and feasibility (funding, capabilities, risk) to understand what’s possible, what’s not, and your general boundaries.
      2. Review your proposed budget in its current form and flag items that may be difficult or impossible to sell, given the above.
      3. Systematically go through each item in you proposed budget and apply the detailed data and information and high-level rationale checklists on the previous slide to ensure you have considered it from every angle and have all the information you need to defend it.
      4. Track down any additional information needed to fill gaps and fine-tune your budget based on any discoveries, including eliminating or adding elements if needed.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Final drafts of all IT cost forecasts, including rationales
      • Fully rationalized proposed IT budget for next fiscal year
      MaterialsParticipants
      • IT Cost Forecasting and Budgeting Workbook
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Phase recap: Build your proposed budget

      You can officially say your proposed IT budget is done. Now for the communications part.

      This phase is where everything came together into a coherent budget proposal. You were able to:

      • Aggregate your numbers. This involved pulling for project and non-project CapEx and OpEx forecasts into a single proposed IT budget total.
      • Stress-test your forecasts. Here, you ensured that all your numbers were accurate and made sense.
      • Challenge and perfect your rationales. Finally, you made sure you have all your evidence in place and can defend every component in your proposed IT budget regardless of who’s looking at it.

      “Current OpEx is about supporting and aligning with past business strategies. That’s alignment. If the business wants to give up on those past business strategies, that’s up to them.”

      – Darin Stahl, Distinguished Analyst and Research Fellow, Info-Tech Research Group

      Phase 5

      Create and Deliver Your Presentation

      Lay Your
      Foundation

      Get Into Budget-Starting Position

      Develop Your
      Forecasts

      Build Your
      Proposed Budget

      Create and Deliver Your Presentation

      1.1 Understand what your budget is
      and does

      1.2 Know your stakeholders

      1.3 Continuously pre-sell your budget

      2.1 Assemble your resources

      2.2 Understand the four views of the ITFM Cost Model

      2.3 Review last year’s budget vs.
      actuals and five-year historical trends

      2.4 Set your high-level goals

      3.1 Develop assumptions and
      alternative scenarios

      3.2 Forecast your project CapEx

      3.3 Forecast your non-project CapEx and OpEx

      4.1 Aggregate your numbers

      4.2 Stress test your forecasts

      4.3 Challenge and perfect your
      rationales

      5.1 Plan your content

      5.2 Build your presentation

      5.3 Present to stakeholders

      5.4 Make final adjustments and submit your IT budget

      This phase will walk you through the following activities:

      • Planning the content you’ll include in your budget presentation.
      • Pulling together your formal presentation.
      • Presenting, finalizing, and submitting your budget.

      This phase involves the following participants:

      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Create and deliver your presentation

      Pull it all together into something you can show your approvers and stakeholders and win IT budgetary approval.

      This phase focuses on developing your final proposed budget presentation for delivery to your various stakeholders. Here you will:

      • Plan your final content. Decide the narrative you want to tell and select the visualizations and words you want to include in your presentation (or presentations) depending on the makeup of your target audience.
      • Build your presentation. Pull together all the key elements in a PowerPoint template in a way that best tells the IT budget story.
      • Present to stakeholders. Deliver your IT budgetary message.
      • Make final adjustments and submit your budget. Address any questions, make final changes, and deconstruct your budget into the account categories mandated by your Finance Department to plug into the budget template they’ve provided.

      “I could have put the numbers together in a week. The process of talking through what the divisions need and spending time with them is more time consuming than the budget itself.”

      – Jay Gnuse, IT Director, Chief Industries

      The content you select to present depends on your objectives and constraints

      Info-Tech classifies potential content according to three basic types: mandatory, recommended, and optional. What’s the difference?

      Mandatory: Just about every CFO or approving body will expect to see this information. Often high level in nature, it includes:

      • A review of last year’s performance.
      • A comparison of proposed budget totals to last year’s actuals.
      • A breakdown of CapEx vs. OpEx.
      • A breakdown of proposed expenditure according to traditional workforce and vendor costs.

      Recommended: This information builds on the mandatory elements, providing more depth and detail. Inclusion of recommended content depends on:

      • Availability of the information.
      • Relevance to a current strategic focus or overarching initiative in the organization.
      • Known business interest in the topic, or the topic’s ability to generate interest in IT budgetary concerns in general.

      Optional: This is very detailed information that provides alternative views and serves as reinforcement of your key messages. Consider including it if:

      • You need to bring fuller transparency to a murky IT spending situation.
      • Your audience is open to it, i.e. it wouldn’t be seen as irrelevant, wasting their time, or a cause of discord.
      • You have ample time during your presentation to dive into it.

      Deciding what to include or exclude depends 100% on your target audience. What will fulfill their basic information needs as well as increase their engagement in IT financial issues?

      Revisit your assumptions and alternative scenarios first

      These represent the contextual framework for your proposal and explain why you made the decisions you did.

      Stating your assumptions and presenting at least two alternative scenarios helps in the following ways:

      1. Identifies the factors you considered when setting budget targets and proposing specific expenditures, and shows that you know what the important factors are.
      2. Lays the logical foundation for all the rationales you will be presenting.
      3. Demonstrates that you’ve thought broadly about the future of the organization and how IT is best able to support that future organization regardless of its state and circumstances.

      Your assumptions and alternative scenarios may not appear back-to-back in your presentation, yet they’re intimately connected in that every unique scenario is based on adjustments to your core assumptions. These tweaks – and the resulting scenarios – reflect the different degrees of probability that a variable is likely to land on a certain value (i.e. an alternative assumption).

      Your primary scenario is the one you believe is most likely to happen and is represented by the complete budget you’re recommending and presenting.

      Target timeframe for presentation: 2 minutes

      Key objectives: Setting context, demonstrating breadth of thought.

      Potential content for section:

      • List of assumptions for the budget being presented (primary target scenario).
      • Two or more alternative scenarios.

      “Things get cut when the business
      doesn’t know what something is,
      doesn’t recognize it, doesn’t understand it. There needs to be an education.”

      – Angie Reynolds, Principal Research Director, ITFM Practice,
      Info-Tech Research Group,

      Select your assumptions and scenarios

      See Tabs “Planning Variables” and 9, “Alternative Scenarios” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Core assumptions

      Primary target scenario

      Alternative scenarios

      Full alternative scenario budgets

      List

      Slide

      Slide

      Budget

      Mandatory: This is a listing of both internal and external factors that are most likely to affect the challenges and opportunities your organization will have and how it can and will operate. This includes negotiable and non-negotiable internal and external constraints, stated priorities, and the expression of known risk factors.

      Mandatory: Emanating from your core assumptions, this scenario is a high-level statement of goals, initial budget targets, and proposed budget based on your core assumptions.

      Recommended: Two alternatives are typical, with one higher spend and one lower spend than your target. The state of the economy and funding availability are the assumptions usually tweaked. More radical scenarios, like the cost and implications of completely outsourcing IT, can also be explored.

      Optional: This is a lot of work, but some IT leaders do it if an alternative scenario is a strong contender or is necessary to show that a proposed direction from the business is costly or not feasible.

      The image contains screenshots of tab Planning Variables and Alternative Scenarios.

      The first major section of your presentation will be a retrospective

      Plan to kick things off with a review of last year’s results, factors that affected what transpired, and longer-term historical IT expenditure trends.

      This retrospective on IT expenditure is important for three reasons:

      1. Clarifying definitions and the different categories of IT expenditure.
      2. Showing your stakeholders how, and how well you aligned IT expenditure with business objectives.
      3. Setting stakeholder expectations about what next year’s budget will look like based on past patterns.

      You probably won’t have a lot of time for this section, so everything you select to share should pack a punch and perform double duty by introducing concepts you’ll need your stakeholders to have internalized when you present next year’s budget details.

      Target timeframe for presentation: 7 minutes

      Key objectives: Definitions, alignment, expectations-setting.

      Potential content for section:

      • Last fiscal year budgeted vs. actuals
      • Expenditure by type
      • Major capital projects completed
      • Top vendor spend
      • Drivers of last year’s expenditures and efficiencies
      • Last fiscal year in in detail (expense view, service view, business view, innovation view)
      • Expenditure trends for the past five years

      “If they don’t know the consequences of their actions, how are they ever going to change their actions?”

      – Angela Hintz, VP of PMO & Integrated Services,
      Blue Cross and Blue Shield of Louisiana

      Start at the highest level

      See Tabs 1 “Historical Events & Projects,” 3 “Historical Analysis,” and 6 “Vendor Worksheet” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Total budgeted vs. total actuals

      Graph

      Mandatory: Demonstrates the variance between what you budgeted for last year and what was actually spent. Explaining causes of variance is key.

      l actuals by expenditure type

      Graph

      Mandatory: Provides a comparative breakdown of last year’s expenditure by non-project OpEx, non-project CapEx, and project CapEx. This offers an opportunity to explain different types of IT expenditure and why they’re the relative size they are.

      Major capital projects completed

      List

      Mandatory: Illustrates progress made toward strategically important objectives.

      Top vendors

      List

      Recommended: A list of vendors that incurred the highest costs, including their relative portion of overall expenditure. These are usually business software vendors, i.e. tools your stakeholders use every day. The number of vendors shown is up to you.

      The image contains screenshots from Tabs 1, 3, and 6 of the IT Cost Forecasting and Budgeting Workbook.

      Describe drivers of costs and savings

      See Tab 1, “Historical Events & Projects” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Cost drivers

      List

      Mandatory: A list of major events, circumstances, business decisions, or non-negotiable factors that necessitated expenditure. Be sure to focus on the unplanned or unexpected situations that caused upward variance.

      Savings drivers

      List

      Mandatory: A list of key initiatives pursued, or circumstances that resulted in efficiencies or savings. Include any deferred or canceled projects.

      The image contains screenshots from Tab 1 of the IT Cost Forecasting and Budgeting Workbook.

      Also calculate and list the magnitude of costs incurred or savings realized in hard financial terms so that the full impact of these events is truly understood by your stakeholders.

      “What is that ongoing cost?
      If we brought in a new platform, what
      does that do to our operating costs?”

      – Kristen Thurber, IT Director, Office of the CIO, Donaldson Company

      End with longer-term five-year trends

      See Tab 3 “Historical Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      IT actual expenditure
      year over year

      Graph

      Mandatory: This is crucial for showing overall IT expenditure patterns, particularly percentage changes up or down year to year, and what the drivers of those changes were.

      IT actuals as a % of organizational revenue

      Graph

      Mandatory: You need to set the stage for the proposed percentage of organizational revenue to come. The CFO will be looking for consistency and an overall decreasing pattern over time.

      IT expenditure per FTE year over year

      Graph

      Optional: This can be a powerful metric as it’s simple and easily to understand.

      The image contains screenshots from Tab 3 of the IT Cost Forecasting and Budgeting Workbook.

      The historical analysis you can do is endless. You can generate many more cuts of the data or go back even further – it’s up to you.

      Keep in mind that you won’t have a lot of time during your presentation, so stick to the high-level, high-impact graphs that demonstrate overarching trends or themes.

      Show different views of the details

      See Tab 3 “Historical Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Budgeted vs. actuals CFO expense view

      Graph

      Mandatory: Showing different types of workforce expenditure compared to different types of vendor expenditure will be important to the CFO.

      Budgeted vs. actuals CIO services view

      Graph

      Optional: Showing the expenditure of some IT services will clarify the true total costs of delivering and supporting these services if misunderstandings exist.

      Budgeted vs. actuals CXO business view

      Graph

      Optional: A good way to show true consumption levels and the relative IT haves and have-nots. Potentially political, so consider sharing one-on-one with relevant business unit leaders instead of doing a big public reveal.

      Budgeted vs. actual CEO innovation view

      Graph

      Optional: Clarifies how much the organization is investing in innovation or growth versus keeping the lights on. Of most interest to the CEO and possibly the CFO, and good for starting conversations about how well funding is aligned with strategic directions.

      The image contains screenshots from Tab 3 of the IT Cost Forecasting and Budgeting Workbook.

      5.1a Select your retrospective content

      30 minutes

      1. Open your copy of the IT Cost Forecasting and Budgeting Workbook.
      2. From Tabs 1, “Historical Events & Projects, 3 “Historical Analysis”, and 6, “Vendor Worksheet,” select the visual outputs (graphs and lists) you plan to include in the retrospective section of your presentation. Consider the following when determining what to include or exclude:
        1. Fundamentals: Elements such as budgeted vs. actual, distribution across expenditure types, and drivers of variance are mandatory.
        2. Key clarifications: What expectations need to be set or common misunderstandings cleared up? Strategically insert visuals that introduce and explain important concepts early.
        3. Your time allowance. Plan for a maximum of seven minutes for every half hour of total presentation time.
      3. Note what you plan to include in your presentation and set aside.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Data and graphs from the completed IT Cost Forecasting and Budgeting Workbook
      • Selected content and visuals for the historical/ retrospective section of the IT Budget Executive Presentation
      MaterialsParticipants
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Next, transition from past expenditure to your proposal for the future

      Build a logical bridge between what happened in the past to what’s coming up next year using a comparative approach and feature major highlights.

      This transitional phase between the past and the future is important for the following reasons:

      1. It illustrates any consistent patterns of IT expenditure that may exist and be relevant in the near term.
      2. It sets the stage for explaining any deviations from historical patterns that you’re about to propose.
      3. It grounds proposed IT expenditure within the context of commitments made in previous years.

      Consider this the essential core of your presentation – this is the key message and what your audience came to hear.

      Target timeframe for presentation: 10 minutes

      Key objectives: Transition, reveal proposed budget.

      Potential content for section:

      • Last year’s actuals vs. next year’s proposed.
      • Next year’s proposed budget in context of the past five years’ year-over-year actuals.
      • Last year’s actual expenditure type distribution vs. next year’s proposed budget distribution.
      • Major projects to be started next year.

      “The companies...that invest the most in IT aren’t necessarily the best performers.
      On average, the most successful small and medium companies are more frugal when it comes to
      company spend on IT (as long as they do it judiciously).”

      – Source: Techvera, 2023

      Compare next year to last year

      See Tab 8, “Proposed Budget Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Last year’s total actuals vs. next year’s total forecast

      Proposed budget in context: Year-over-year expenditure

      Last year’s actuals vs. next year’s proposed by expenditure type

      Last year’s expenditure per FTE vs. next year’s proposed

      Graph

      Graph

      Graph

      Graph

      Mandatory: This is the most important graph for connecting the past with the future and is also the first meaningful view your audience will have of your proposed budget for next year.

      Mandatory: Here, you will continue the long-term view introduced in your historical data by adding on next year’s projections to your existing five-year historical trend. The percentage change from last year to next year will be the focus.

      Recommended: A double-comparative breakdown of last year vs. next year by non-project OpEx, non-project CapEx, and project CapEx illustrates where major events, decisions, and changes are having their impact.

      Optional: This graph is particularly useful in demonstrating the success of cost-control if the actual proposed budget is higher that the previous year but the IT cost per employee has gone down.

      The image contains screenshots from Tab 8 of the IT Cost Forecasting and Budgeting Workbook.

      Select business projects to profile

      See Tab 5, “Project CapEx Forecast” in your IT Cost Forecasting and Budgeting Workbook for the data and information to create these outputs.

      Major project profile

      Slide

      Mandatory: Focus on projects for which funding is already committed and lean toward those that are strategic or clearly support business goal attainment. How many you profile is up to you, but three to five is suggested.

      Minor project overview

      List

      Optional: List other projects on IT’s agenda to communicate the scope of IT’s project-related responsibilities and required expenditure to be successful. Include in-progress projects that will be completed next year and net-new projects on the roster.

      The image contains screenshots from Tab 5 of the IT Cost Forecasting and Budgeting Workbook.

      You can’t profile every project on the list, but it’s important that your stakeholders see their priorities clearly reflected in your budget; projects are the best way to do this.

      If you’ve successfully pre-sold your budget and partnered with business-unit leaders to define IT initiatives, your stakeholders should already be very familiar with the project summaries you put in front of them in your presentation.

      5.1b Select your transitional past-to-future content

      30 minutes

      1. Open your copy of the IT Cost Forecasting and Budgeting Workbook.
      2. From Tabs 5, “Project CapEx Forecast” and 7, “Proposed Budget Analysis”, select the visual outputs (graphs and lists) you plan to include in the transitional section of your presentation. Consider the following when determining what to include or exclude:
        1. Shift from CapEx to OpEx: If this has been a point of contention or confusion with your CFO in the past, or if your organization has actively committed to greater cloud or outsourcing intensity, you’ll want to show this year-to-year shift in expenditure type.
        2. Strategic priorities: Profile major capital projects that reflect stakeholder priorities. If your audience is already very familiar with these projects, you may be able to skip detailed profiles and simply list them.
        3. Your time allowance. Plan for a maximum of 10 minutes for every half hour of total presentation time.
      3. Note what you plan to include in your presentation and set aside.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Data and graphs from the completed IT Cost Forecasting and Budgeting Workbook
      • Selected content and visuals for the past-to-future transitional section of the IT Budget Executive Presentation
      MaterialsParticipants
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Finally, carefully select detailed drill-downs that add clarity and depth to your proposed budget

      The graphs you select here will be specific to your audience and any particular message you need to send.

      This detailed phase of your presentation is important because it allows you to:

      1. Highlight specific areas of IT expenditure that often get buried under generalities.
      2. View your proposed budget from different perspectives that are most meaningful to your audience, such as traditional workforce vs. vendor allocations, expenditure by IT service, business-unit consumption, and the allocation of funds to innovation and growth versus daily IT operations.
      3. Get stakeholder attention. For example, laying out exactly how much money will be spent next year in support of the Sales Department compared to other units will get the VP of Sales’ attention…and everyone else’s, for that matter. This kind of transparency is invaluable for enabling meaningful conversations and thoughtful decision-making about IT spend.

      Target timeframe for presentation: 7 minutes, but this phase of the presentation may naturally segue into the final Q&A.

      Key objectives: Transparency, dialogue, buy-in.

      Potential content for section:

      • Allocation across workforce vs. vendors
      • Top vendors by expenditure
      • Allocation across on-premises vs. cloud
      • Allocation across core IT services
      • Allocation across core business units
      • Allocation across business focus area

      “A budget is a quantified version of
      your service-level agreements.”

      – Darin Stahl, Distinguished Analysis & Research Fellow,
      Info-Tech Research Group,

      Start with the expense view details

      See Tab 8, “Proposed Budget Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Proposed budget: Workforce and vendors by expenditure type

      Graph

      Mandatory: This is the traditional CFO’s view, so definitely show it. The compelling twist here is showing it by expenditure type, i.e. non-project OpEx, non-project CapEx, and project CapEx.

      Proposed budget: Cloud vs. on-premises vendor expenditure

      Graph

      Optional: If this is a point of contention or if an active transition to cloud solutions is underway, then show it.

      Top vendors

      Graph

      Recommended: As with last year’s actuals, showing who the top vendors are slated to be next year speaks volumes to stakeholders about exactly where much of their money is going.

      If you have a diverse audience with diverse interests, be very selective – you don’t want to bore them with things they don’t care about.

      The image contains screenshots from Tab 8 of the IT Cost Forecasting and Budgeting Workbook.

      Offer choice details on the other views

      See Tab 8, “Proposed Budget Analysis” in your IT Cost Forecasting and Budgeting Workbook for these outputs.

      Proposed budget: IT services by expenditure type

      Graph

      Optional: Business unit leaders will be most interested in the application services. Proposed expenditure on security and data and BI services may be of particular interest given business priorities. Don’t linger on infrastructure spend unless chargeback is in play.

      Proposed budget: Business units by expenditure type

      Graph

      Optional: The purpose of this data is to show varying business units where they stand in terms of consumption. It may be more appropriate to show this graph in a one-on-one meeting or other context.

      Proposed budget: Business focus by expenditure type

      Graph

      Optional: The CEO will care most about this data. If they’re not in the room, then consider bypassing it and discuss it separately with the CFO.

      Inclusion of these graphs really depends on the makeup of your audience. It’s a good decision to show all of them to your CFO at some point before the formal presentation. Consider getting their advice on what to include and exclude.

      The image contains screenshots from Tab 8 of the IT Cost Forecasting and Budgeting Workbook.

      5.1c Select next year’s expenditure sub-category details

      30 minutes

      1. Open your copy of the IT Cost Forecasting and Budgeting Workbook.
      2. From Tab 8, “Proposed Budget Analysis,” select the visual outputs (graphs) you plan to include in the targeted expenditure sub-category details section of your presentation. Consider the following when determining what to include or exclude:
        1. The presence of important fence-sitters. If there are key individuals who require more convincing, this is where you show them the reality of what it costs to deliver their most business-critical IT services to them.
        2. The degree to which you’ve already gone over the numbers previously with your audience. Again, if you’ve done your pre-selling, this data may be old news and not worth going over again.
        3. Your time allowance. Plan for a maximum of seven minutes for every half hour of total presentation time.
      3. Note what you plan to include in your presentation and set aside.

      Download the IT Cost Forecasting and Budgeting Workbook

      InputOutput
      • Data and graphs from the completed IT Cost Forecasting and Budgeting Workbook
      • Selected content and visuals for the expenditure category details section of the IT Budget Executive Presentation
      MaterialsParticipants
      • Whiteboard/flip charts
      • Head of IT
      • IT Financial Lead
      • Other IT Management

      Finalize your line-up and put your selected content into a presentation template

      This step is about nailing down the horizontal logic of the story you want to tell. Start by ordering and loading the visualizations of your budget data.

      Download Info-Tech’s IT Budget Executive Presentation Template

      The image contains a screenshot of the IT Budget Executive Presentation Template.

      If you prefer, use your own internal presentation standard template instead and Info-Tech’s template as a structural guide.

      Regardless of the template you use, Info-Tech recommends the following structure:

      1. Summary: An overview of your decision-making assumptions, initial targets given the business context, and the total proposed IT budget amount.
      2. Retrospective: An overview of previous years’ performance, with a specific focus on last fiscal year.
      3. Proposed budget overview: A high-level view of the proposed budget for next fiscal year in the context of last year’s performance (i.e. the bridge from past to future), including alternative scenarios considered and capital projects on the roster.
      4. Proposed budget details by category: Detailed views of the proposed budget by expense type, IT service, business unit, and business focus category.
      5. Next steps: Include question-and-answer and itemization of your next actions through to submitting your final budget to the CFO.

      Draft the commentary that describes and highlights your data’s key messages

      This is where the rationales that you perfected earlier come into play.

      Leave the details for the speaker’s notes.
      Remember that this is an executive presentation. Use tags, pointers, and very brief sentences in the body of the presentation itself. Avoid walls of text. You want your audience to be listening to your words, not reading a slide.

      Speak to everything that represents an increase or decrease of more than 5% or that simply looks odd.
      Being transparent is essential. Don’t hide anything. Acknowledge the elephant in the room before your audience does to quickly stop suspicious or doubtful thoughts

      Identify causes and rationales.
      This is why your numbers are as they are. However, if you’re not 100% sure what all driving factors are, don’t make them up. Also, if the line between cause and effect isn’t straight, craft in advance a very simple way of explaining it that you can offer whenever needed.

      Be neutral and objective in your language.
      You need to park strong feelings at the door. You’re presenting rational facts and thoroughly vetted recommendations. The best defense is not to be defensive, or even offensive for that matter. You don’t need to argue, plead, or apologize – let your information speak for itself and allow the audience to arrive at their own logical conclusions.

      Re-emphasize your core themes to create connections.
      If a single strategic project is driving cost increases across multiple cost categories, point it out multiple times if needed to reinforce its importance. If an increase in one area is made possible by a significant offset in another, say so to demonstrate your ongoing commitment to efficiencies. If a single event from last year will continue having cost impacts on several IT services next year, spell this out.

      5.2 Develop an executive presentation

      Duration: 2 hours

      1. Download the IT Budget Executive Presentation PowerPoint template.
      2. Open your working version of the IT Cost Forecasting and Budgeting Workbook and copy and paste your selected graphs and tables into the template. Note: Pasting as an image will preserve graph formatting.
      3. Incorporate observations and insights about your proposed budget and other analysis into the template where indicated.
      4. Conduct an internal review of the final presentation to ensure it includes all the elements you need and is error-free.

      Note: Refer to your organization’s standards and norms for executive-level presentations and either adapt the Info-Tech template accordingly or use your own.

      Download the IT Budget Executive Presentation template

      Input Output
      • Tabular and graphical data outputs in the IT Cost Forecasting and Budgeting Workbook
      • Interpretive commentary based on your analysis
      • Executive presentation summarizing your proposed IT budget
      Materials Participants
      • IT Cost Forecasting and Budgeting Workbook
      • IT Budget Executive Presentation template
      • CIO/IT Directors
      • IT Financial Lead
      • Other IT Management

      Now it’s time to present your proposed IT budget for next fiscal year

      If you’ve done your homework and pre-sold your budget, the presentation itself should be a mere formality with no surprises for anyone, including you.

      Some final advice on presenting your proposed budget…

      Partner up

      If something big in your budget is an initiative that’s for a specific business unit, let that business unit’s leader be the face of it and have IT play the role of supporting partner.

      Use your champions

      Let your advocates know in advance that you’d appreciate hearing their voice during the presentation if you encounter any pushback, or just to reinforce your main messages.

      Focus on the CFO

      The CFO is the most important stakeholder in the room at the end of the day, even more than the CEO in some cases. Their interests should take priority if you’re pressed for time.

      Avoid judgment

      Let the numbers speak for themselves. Do point out highlights and areas of interest but hold off on offering emotion-driven opinions. Let your audience draw their own conclusions.

      Solicit questions

      You do want dialogue. However, keep your answers short and to the point. What does come up in discussion is a good indication of where you’ll need to spend more time in the future.

      The only other thing that can boost your chances is if you’re lucky enough to be scheduled to present between 10:00 and 11:00 on a Thursday morning when people are most agreeable. Beyond that, apply the standard rules of good presentations to optimize your success.

      Your presentation is done – now re-focus on budget finalization and submission

      This final stage tends to be very administrative. Follow the rules and get it done.

      • Incorporate feedback: Follow up on comments from your first presentation and reflect them in your budget if appropriate. This may include:
        • Having follow-up conversations with stakeholders.
        • Further clarifying the ROI projections or business benefits.
        • Adjusting proposed expenditure amounts based on new information or a shift in priorities.
        • Adding details or increasing granularity around specific issues of interest.
      • Trim: Almost every business unit leader will need to make cuts to their initial budget proposal. After all, the CFO has a finite pool of money to allocate. If all’s gone well, it may only be a few percent. Resurrect your less-costly alternative scenario and selectively apply the options you laid out there. Focus on downsizing or deferring capital projects if possible. If you must trim OpEx, remind the CFO about any service-level adjustments that will need to happen to make the less expensive alternatives work.
      • Re-present: It’s not unusual to have to present your budget one more time after you’ve made your adjustments. In some organizations, the first presentation is to an internal executive group while the second one is to a governing board. The same rules apply to this second presentation as to your first one.
      • Submit: Slot your final budget into the list of accounts prescribed in the budget template provided by Finance. These templates often don’t align with IT’s budget categories, but you’ll have to make do.

      Phase recap: Create and deliver your presentation

      You’ve reached the end of the budget creation and approval process. Now you can refocus on using your budget as a living governance tool.

      This phase focused on developing your final proposed budget presentation for delivery to your various stakeholders. Here, you:

      • Planned your final content. You selected the data and visuals to include and highlight.
      • Built your presentation. You pulled everything together into a PowerPoint template and crafted commentary to tell a cohesive IT budget story.
      • Presented to stakeholders. You delivered your proposed IT budget and solicited their comments and feedback.
      • Made final adjustments and submitted your budget. You applied final tweaks, deconstructed your budget to fit Finance’s template, and submitted it for entry into Finance’s system.

      “Everyone understands that there’s never enough money. The challenge is prioritizing the right work and funding it.”

      – Trisha Goya, Director, IT Governance & Administration, Hawaii Medical Service Association

      Next Steps

      “Keep that conversation going throughout the year so that at budgeting time no one is surprised…Make sure that you’re telling your story all year long and keep track of that story.”

      – Angela Hintz, VP of PMO & Integrated Services,
      Blue Cross and Blue Shield of Louisiana

      This final section will provide you with:

      • An overall summary of accomplishment.
      • Recommended next steps.
      • A list of contributors to this research.
      • Some related Info-Tech resources.

      Summary of Accomplishment

      You’ve successfully created a transparent IT budget and gotten it approved.

      By following the phases and steps in this blueprint, you have:

      1. Learned more about what an IT budget does and what it means to your key stakeholders.
      2. Assembled your budgeting team and critical data needed for forecasting and budgeting, as well as set expenditure goals for next fiscal year, and metrics for improving the budgeting process overall.
      3. Forecasted your project and non-project CapEx and OpEx for next fiscal year and beyond.
      4. Fine-tuned your proposed expenditure rationales.
      5. Crafted and delivered an executive presentation and got your budget approved.

      What’s next?

      Use your approved budget as an ongoing IT financial management governance tool and track your budget process improvement metrics.

      If you would like additional support, have our analysts guide you through an Info-Tech full-service engagement or Guided Implementation.

      Contact your account representative for more information.

      1-888-670-8889

      Research Contributors and Experts

      Monica Braun

      Research Director, ITFM Practice

      Info-Tech Research Group

      Carol Carr

      Technical Counselor (Finance)

      Info-Tech Research Group

      Larry Clark

      Executive Counselor

      Info-Tech Research Group

      Duane Cooney

      Executive Counselor

      Info-Tech Research Group

      Lynn Fyhrlund

      Former Chief Information Officer

      Milwaukee County

      Jay Gnuse

      Information Technology Director

      Chief Industries

      Trisha Goya

      Director, IS Client Services

      Hawaii Medical Service Association

      Angela Hintz

      VP of PMO & Integrated Services

      Blue Cross and Blue Shield of Louisiana

      Rick Hopfer

      Chief Information Officer

      Hawaii Medical Service Association

      Theresa Hughes

      Executive Counselor

      Info-Tech Research Group

      Research Contributors and Experts

      Dave Kish

      Practice Lead, IT Financial Management Practice

      Info-Tech Research Group

      Matt Johnson

      IT Director Governance and Business Solutions

      Milwaukee County

      Titus Moore

      Executive Counselor

      Info-Tech Research Group

      Angie Reynolds

      Principal Research Director, IT Financial Management Practice

      Info-Tech Research Group

      Mark Roman

      Managing Partner, Executive Services

      Info-Tech Research Group

      Darin Stahl

      Distinguished Analyst & Research Fellow

      Info-Tech Research Group

      Miguel Suarez

      Head of Technology

      Seguros Monterrey New York Life

      Kristen Thurber

      IT Director, Office of the CIO

      Donaldson Company

      Related Info-Tech Research & Services

      Achieve IT Spend & Staffing Transparency

      • IT spend has increased in volume and complexity, but how IT spend decisions are made has not kept pace.
      • Lay a foundation for meaningful conversations and informed decision making around IT spend by transparently mapping exactly where IT funds are really going.

      IT Spend & Staffing Benchmarking Service

      • Is a do-it-yourself approach to achieving spend transparency too onerous? Let Info-Tech do the heavy lifting for you.
      • Using Info-Tech’s ITFM Cost Model, our analysts will map your IT expenditure to four different stakeholder views – CFO Expense View, CIO Service View, CXO Business View, and CEO Innovation View – so that you clearly show where expenditure is going in terms that stakeholders can relate to and better demonstrate IT’s value to the business.
      • Get a full report that shows how your spend is allocated plus benchmarks that compare your results to those of your industry peers.

      Build Your IT Cost Optimization Roadmap

      • Cost optimization is usually thought about in terms of cuts, when it’s really about optimizing IT’s cost-to-value ratio.
      • Develop a cost-optimization strategy based on your organization’s circumstances and timeline focused on four key areas of IT expenditure: assets, vendors, projects, and workforce.

      Bibliography

      “How Much Should a Company Spend on IT?” Techvera, no date. Accessed 3 Mar. 2023.
      “State of the CIO Study 2023.” Foundry, 25 Jan. 2023. Accessed 3 Mar. 2023.
      Aberdeen Strategy & Research. “The State of IT 2023.” Spiceworks. Ziff Davis, 2022. Accessed 28 Feb. 2023.
      Ainsworth, Paul. “Responsibilities of the Modern CFO - A Function in Transition.” TopTal, LLC., no date. Accessed 15 Feb. 2023.
      Balasaygun, Kaitlin. “For the first time in a long time, CFOs can say no to tech spending.” CNBC CFO Council, 19 Jan. 2023. Accessed 17 Feb. 2023.
      Bashir, Ahmad. “Objectives of Capital Budgeting and factors affecting Capital Budget Decisions.” LinkedIn, 27 May 2017. Accessed 14 Apr. 2023.
      Blackmon, Kris. “Building a Data-Driven Budget Pitch the C-Suite Can't Refuse.” NetSuite Brainyard, 21 Sep. 2021. Accessed 17 Feb. 2023
      Butcher, Daniel. “CFO to CFO: Budgeting to Fund Strategic Plans.” Strategic Finance Magazine/Institute of Management Accountants, 1 Dec. 2021. Accessed 17 Feb. 2023
      Gray, Patrick. “IT Budgeting: A Cheat Sheet.” TechRepublic, 29 Jul. 2020. Accessed 28 Feb. 2023.
      Greenbaum, David. “Budget vs. Actuals: Budget Variance Analysis & Guide.” OnPlan, 15 Mar. 2022. Accessed 22 Mar. 2023.
      Huber, Michael and Joan Rundle. “How to Budget for IT Like a CFO.” Huber & Associates, no date. Accessed 15 Feb. 2023.
      Kinney, Tara. “Executing Your Department Budget Like a CFO.” Atomic Revenue, LLC., no date. Accessed 15 Feb. 2023.
      Lafley, A.G. “What Only the CFO Can Do.” Harvard Business Review, May 2009. Accessed 15 Mar. 2009.
      Moore, Peter D. “IN THE DIGITAL WORLD, IT should be run as a profit center, not a cost center.” Wild Oak Enterprise, 26 Feb. 2020. Accessed 3 Mar. 2023.
      Nordmeyer, Bille. “What Factors Are Going to Influence Your Budgeting Decisions?” bizfluent, 8 May 2019. Accessed 14 Apr. 2023
      Ryan, Vincent. “IT Spending and 2023 Budgets Under Close Scrutiny.” CFO, 5 Dec. 2022. Accessed 3 Mar. 2023.
      Stackpole, Beth. “State of the CIO, 2022: Focus turns to IT fundamentals.” CIO Magazine, 21 Mar. 2022. Accessed 3 Mar. 2023.

      The Essential COVID-19 Childcare Policy for Every Organization, Yesterday

      • Buy Link or Shortcode: {j2store}598|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Manage & Coach
      • Parent Category Link: /manage-coach
      • Helping employees navigate personal and business responsibilities to find solutions that ensure both are taken care of.
      • Reducing potential disruption to business operations through employee absenteeism due to increased care-provider responsibilities.

      Our Advice

      Critical Insight

      • Remote work is complicated by children at home with school closures. Implement alternative temporary work arrangements that allow and support employees to balance work and personal obligations.
      • Adjustments to work arrangements and pay may be necessary. Temporary work arrangements while caring for dependents over a longer-term pandemic may require adjustments to the duties carried out, number of hours worked, and adjustments to employee pay.
      • Managing remotely is more than staying in touch by phone. As a leader you will need to provide clear options that provide solutions to your employees to avoid them getting overwhelmed while taking care of the business to ensure there is a business long term.

      Impact and Result

      • Develop a policy that provides parameters around mutually agreed adjustments to performance levels while balancing dependent care with work during a pandemic.
      • Take care of the business through clear guidelines on compensation while taking care of the health and wellness of your people.
      • Develop detailed work-from-home plans that lessen disruption to your work while taking care of children or aged parents.

      The Essential COVID-19 Childcare Policy for Every Organization, Yesterday Research & Tools

      Start here. Read The Essential COVID-19 Childcare Policy for Every Organization, Yesterday

      Read our recommendations and follow the steps to develop a policy that will help your employees work productively while managing care-provider responsibilities at home.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • The Essential COVID-19 Childcare Policy for Every Organization, Yesterday Storyboard
      • Pandemic Dependent Care Policy
      • COVID-19 Dependent Care Policy Manager Action Toolkit
      • COVID-19 Dependent Care Policy Employee Guide
      • Dependent-Flextime Agreement Template
      • Workforce Planning Tool
      • Nine Ways to Support Working Caregivers Today
      • Employee Resource Group (ERG) Charter Template
      [infographic]

      Marketing Management Suite Software Selection Guide

      • Buy Link or Shortcode: {j2store}552|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Selecting and implementing the right MMS platform – one that aligns with your requirements is a significant undertaking.
      • Despite the importance of selecting and implementing the right MMS platform, many organizations struggle to define an approach to picking the most appropriate vendor and rolling out the solution in an effective and cost-efficient manner.
      • IT often finds itself in the unenviable position of taking the fall for an MMS platform that doesn’t deliver on the promise of the MMS strategy.

      Our Advice

      Critical Insight

      • MMS platform selection must be driven by your overall customer experience management strategy. Link your MMS selection to your organization’s CXM framework.
      • Determine what exactly you require from your MMS platform; leverage use cases to help guide selection.
      • Ensure strong points of integration between your MMS and other software such as CRM and POS. Your MMS solution should not live in isolation; it must be part of a wider ecosystem.

      Impact and Result

      • An MMS platform that effectively meets business needs and delivers value.
      • Reduced costs during MMS vendor platform selection and faster time to results after implementation.

      Marketing Management Suite Software Selection Guide Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Marketing Management Suite Software Selection Guide – A deck that walks you through the process of building your business case and selecting the proper MMS platform.

      This blueprint will help you build a business case for selecting the right MMS platform, define key requirements, and conduct a thorough analysis and scan of the current state of the ever-evolving MMS market space.

      • Marketing Management Suite Software Selection Guide Storyboard
      [infographic]

      Further reading

      Marketing Management Suite Software Selection Guide

      Streamline your organizational approach to selecting a right-sized marketing management platform.

      Analyst perspective

      A robustly configured and comprehensive MMS platform is a crucial ingredient to help kick-start your organization's cross-channel and multichannel marketing management initiatives.

      Modern marketing management suites (MMS) are imperative given today's complex, multitiered, and often non-standardized marketing processes. Relying on isolated methods such as lead generation or email marketing techniques for executing key cross-channel and multichannel marketing initiatives is not enough to handle the complexity of contemporary marketing management activities.

      Organizations need to invest in highly customizable and functionally extensive MMS platforms to provide value alongside the marketing value chain and a 360-degree view of the consumer's marketing journey. IT needs to be rigorously involved with the sourcing and implementation of the new MMS tool, and the necessary business units also need to own the requirements and be involved from the initial stages of software selection.

      To succeed with MMS implementation, consider drafting a detailed roadmap that outlines milestone activities for configuration, security, points of integration, and data migration capabilities and provides for ongoing application maintenance and support.

      This is a picture of Yaz Palanichamy

      Yaz Palanichamy
      Senior Research Analyst, Customer Experience Strategy
      Info-Tech Research Group

      Executive summary

      Your Challenge

      • Many organizations struggle with taking a systematic and structured approach to selecting a right-sized marketing management suite (MMS) – an indispensable part of managing an organization's specific and nuanced marketing management needs.
      • Organizations must define a clear-cut strategic approach to investing in a new MMS platform. Exercising the appropriate selection and implementation rigor for a right-sized MMS tool is a critical step in delivering concrete business value to sustain various marketing value chains across the organization.

      Common Obstacles

      • An MMS vendor that is not well aligned to marketing requirements wastes resources and causes an endless cascade of end-user frustration.
      • The MMS market is rapidly evolving, making it difficult for vendors to retain a competitive foothold in the space.
      • IT managers and/or marketing professionals often find themselves in the unenviable position of taking the fall for MMS platforms that fail to deliver on the promise of the overarching marketing management strategy.

      Info-Tech's Approach

      • MMS platform selection must be driven by your overall marketing management strategy. Email marketing techniques, social marketing, and/or lead management strategies are often not enough to satisfy the more sophisticated use cases demanded by increasingly complex customer segmentation levels.
      • For organizations with a large audience or varied product offerings, a well-integrated MMS platform enables the management of various complex campaigns across many channels, product lines, customer segments, and marketing groups throughout the enterprise.

      Info-Tech Insight

      IT must collaborate with marketing professionals and other key stakeholder groups to define a unified vision and holistic outlook for a right-sized MMS platform.

      Info-Tech's methodology for selecting a right-sized marketing management suite platform

      1. Understand Core MMS Features

      2. Build the Business Case & Streamline Requirements

      3. Discover the MMS Market Space & Prepare for Implementation

      Phase Steps

      1. Define MMS Platforms
      2. Classify Table Stakes & Differentiating Capabilities
      3. Explore Trends
      1. Build the Business Case
      2. Streamline the Requirements Elicitation Process for a New MMS Platform
      3. Develop an Inclusive RFP Approach
      1. Discover Key Players in the Vendor Landscape
      2. Engage the Shortlist & Select Finalist
      3. Prepare for Implementation

      Phase Outcomes

      1. Consensus on scope of MMS and key MMS platform capabilities
      1. MMS platform selection business case
      2. Top-level use cases and requirements
      3. Procurement vehicle best practices
      1. Market analysis of MMS platforms
      2. Overview of shortlisted vendors
      3. Implementation considerations

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1: Understand what a marketing management suite is. Discuss core capabilities and key trends.

      Call #2: Build the business case
      to select a right-sized MMS.

      Call #3: Define your core
      MMS requirements.

      Call #4: Build and sustain procurement vehicle best practices.

      Call #5: Evaluate the MMS vendor landscape and short-list viable options.


      Call #6: Review implementation considerations.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      The MMS procurement process should be broken into segments:

      1. Create a vendor shortlist using this buyer's guide.
      2. Define a structured approach to selection.
      3. Review the contract.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      EXECUTIVE BRIEF

      What are marketing management suite platforms?

      Our Definition: Marketing management suite (MMS) platforms are core enterprise applications that provide a unified set of marketing processes for a given organization and, typically, the capability to coordinate key cross-channel marketing initiatives.

      Key product capabilities for sophisticated MMS platforms include but are not limited to:

      • Email marketing
      • Lead nurturing
      • Social media management
      • Content curation and distribution
      • Marketing reporting and analytics
      • Consistent brand messaging

      Using a robust and comprehensive MMS platform equips marketers with the appropriate tools needed to make more informed decisions around campaign execution, resulting in better targeting, acquisition, and customer retention initiatives. Moreover, such tools can help bolster effective revenue generation and ensure more viable growth initiatives for future marketing growth enablement strategies.

      Info-Tech Insight

      Feature sets are rapidly evolving over time as MMS offerings continue to proliferate in this market space. Ensure that you focus on core components such as customer conversion rates and new lead captures through maintaining well- integrated multichannel campaigns.

      Marketing Management Suite Software Selection Buyer's Guide

      Info-Tech Insight

      A right-sized MMS software selection and procurement decision should involve comprehensive requirements and needs analysis by not just Marketing but also other organizational units such as IT, in conjunction with input suppled from the internal vendor procurement team.

      MMS Software Selection & Vendor Procurement Journey. The three main steps are: Envision the Art of the Possible; Elicit Granular Requirements; Contextualize the MMS Vendor Market Space

      Phase 1

      Understand Core MMS Features

      Phase 1

      Phase 2

      Phase 3

      1.1 Define MMS Platforms

      1.2 Classify Table Stakes & Differentiating Capabilities

      1.3 Explore Trends

      2.1 Build the Business Case

      2.2 Streamline Requirements Elicitation

      2.3 Develop an Inclusive RFP Approach

      3.1 Discover Key Players in the Vendor Landscape

      3.2 Engage the Shortlist & Select Finalist

      3.3 Prepare for Implementation

      This phase will walk you through the following activities:

      • Level-set an understanding of MMS technology.
      • Define which MMS features are table stakes (standard) and which are key differentiating functionalities.
      • Identify the art of the possible in a modern MMS platform from sales, marketing, and service lenses.

      This phase involves the following participants:

      • CMO
      • Digital Marketing Project Manager
      • Marketing Data Analytics Analyst
      • Marketing Management Executive

      What are marketing management suite platforms?

      Our Definition: Marketing management suite (MMS) platforms are core enterprise applications that provide a unified set of marketing processes for a given organization and, typically, the capability to coordinate key cross-channel marketing initiatives.

      Key product capabilities for sophisticated MMS platforms include but are not limited to:

      • Email marketing
      • Lead nurturing
      • Social media management
      • Content curation and distribution
      • Marketing reporting and analytics
      • Consistent brand messaging

      Using a robust and comprehensive MMS platform equips marketers with the appropriate tools needed to make more informed decisions around campaign execution, resulting in better targeting, acquisition, and customer retention initiatives. Moreover, such tools can help bolster effective revenue generation and ensure more viable growth initiatives for future marketing growth enablement strategies.

      Info-Tech Insight

      Feature sets are rapidly evolving over time as MMS offerings continue to proliferate in this market space. Ensure that you focus on core components such as customer conversion rates and new lead captures through maintaining well- integrated multichannel campaigns.

      Marketing through the ages

      Tracing the foundational origins of marketing management practices

      Initial traction for marketing management strategies began with the need to holistically understand the effects of advertising efforts and how the media mix could be best optimized.

      1902

      1920s-1930s

      1942

      1952-1964

      1970s-1990s

      Recognizing the increasing need for focused and professional marketing efforts, the University of Pennsylvania offers the first marketing course, dubbed "The Marketing of Products."

      As broadcast media began to peak, marketers needed to manage a greater number of complex and interspersed marketing channels.

      The introduction of television ads in 1942 offered new opportunities for brands to reach consumers across a growing media landscape. To generate the highest ROI, marketers sought to understand the consumer and focus on more tailored messaging and product personalization. Thus, modern marketing practices were born.

      Following the introduction of broadcast media, marketers had to develop strategies beyond traditional spray-and-pray methods. The first modern marketing measurement concept, "marketing mix," was conceptualized in 1952 and popularized in 1964 by Neil Borden.

      This period marked the digital revolution and the new era of marketing. With the advent of new communications technology and the modern internet, marketing management strategies reached new heights of sophistication. During the early 1990s, search engines emerged to help users navigate the web, leading to early forms of search engine optimization and advertising.

      Where it's going: the future state of marketing management

      1. Increasing Complexity Driving Consumer Purchasing Decisions
        • "The main complexity is dealing with the increasing product variety and changing consumer demands, which is forcing marketers to abandon undifferentiated marketing strategies and even niche marketing strategies and to adopt a mass customization process interacting one-to-one with their customers." – Complexity, 2019
      2. Consumers Seeking More Tailored Brand Personalization
        • Financial Services marketers lead all other industries in AI application adoption, with 37% currently using them (Salesforce, 2019).
      3. The Inclusion of More AI-Enabled Marketing Strategies
        • According to a 2022 Nostro report, 70% of consumers say it is important that brands continue to offer personalized consumer experiences.
      4. Green Marketing
        • Recent studies have shown that up to 80% of all consumers are interested in green marketing strategies (Marketing Schools, 2020).

      Marketing management by the numbers

      Key trends

      6%

      As a continuously growing discipline, marketing management roles are predicted to grow faster than average, at a rate of 6% over the next decade.

      Source: U.S. Bureau of Labor Statistics, 2021

      17%

      While many marketing management vendors offer A/B testing, only 17% of marketers are actively using A/B testing on landing pages to increase conversion rates.

      Source: Oracle, 2022

      70%

      It is imperative that technology and SaaS companies begin to use marketing automation as a core component of their martech strategy to remain competitive. About 70% of technology and SaaS companies are employing integrated martech tools.

      Source: American Marketing Association, 2021

      Understand MMS table stakes features

      Organizations can expect nearly all MMS vendors to provide the following functionality

      Email Marketing

      Lead Nurturing

      Reporting, Analytics, and Marketing KPIs

      Marketing Campaign Management

      Integrational Catalog

      The use of email alongside marketing efforts to promote a business' products and services. Email marketing can be a powerful tool to maintain connections with your audience and ensure sustained brand promotion.

      The process of developing and nurturing relationships with key customer contacts at every major touchpoint in their customer journey. MMS platforms can use automated lead-nurturing functions that are triggered by customer behavior.

      The use of well-defined metrics to help curate, gather, and analyze marketing data to help track performance and improve the marketing department's future marketing decisions and strategies.

      Tools needed for the planning, execution, tracking, and analysis of direct marketing campaigns. Such tools are needed to help gauge your buyers' sentiments toward your company's product offerings and services.

      MMS platforms should generally have a comprehensive open API/integration catalog. Most MMS platforms should have dedicated integration points to interface with various tools across the marketing landscape (e.g. social media, email, SEO, CRM, CMS tools, etc.).

      Identify differentiating MMS features

      While not always deemed must-have functionality, these features may be the deciding factor when choosing between two MMS-focused vendors.

      Digital Asset Management (DAM)

      A DAM can help manage digital media asset files (e.g. photos, audio files, video).

      Customer Data Management

      Customer data management modules help your organization track essential customer information to maximize your marketing results.

      Text-Based Marketing

      Text-based marketing strategy is ideal for any organization primarily focused on coordinating structured and efficient marketing campaigns.

      Customer
      Journey Orchestration

      Customer journey orchestration enables users to orchestrate customer conversations and journeys across the entire marketing value chain.

      AI-Driven Workflows

      AI-powered workflows can help eliminate complexities and allow marketers to automate and optimize tasks across the marketing spectrum.

      Dynamic Segmentation

      Dynamic segmentation to target audience cohorts based on recent actions and stated preferences.

      Advanced Email Marketing

      These include capabilities such as A/B testing, spam filter testing, and detailed performance reporting.

      Ensure you understand the art of the possible across the MMS landscape

      Understanding the trending feature sets that encompass the broader MMS vendor landscape will best equip your organization with the knowledge needed to effectively match today's MMS platforms with your organization's marketing requirements.

      Holistically examine the potential of any MMS solution through three main lenses:

      Data-Driven
      Digital Advertising

      Adapt innovative techniques such as conversational marketing to help collect, analyze, and synthesize crucial audience information to improve the customer marketing experience and pre-screen prospects in a more conscientious manner.

      Next Best Action Marketing

      Next best action marketing (NBAM) is a customer-centric paradigm/marketing technique designed to capture specific information about customers and their individual preferences. Predicting customers' future actions by understanding their intent during their purchasing decisions stage will help improve conversion rates.

      AI-Driven Customer
      Segmentation

      The use of inclusive and innovative AI-based forecast modeling techniques can help more accurately analyze customer data to create more targeted segments. As such, marketing messages will be more accurately tailored to the customer that is reading them.

      Art of the possible: data-driven digital advertising

      CONVERSATIONAL MARKETING INTELLIGENCE

      Are you curious about the measures needed to boost engagement among your client base and other primary target audience groups? Conversational marketing intelligence metrics can help collect and disseminate key descriptive data points across a broader range of audience information.

      AI-DRIVEN CONVERSATIONAL MARKETING DEVICES

      Certain social media channels (e.g. LinkedIn and Facebook) like to take advantage of click-to-Messenger-style applications to help drive meaningful conversations with customers and learn more about their buying preferences. In addition, AI-driven chatbot applications can help the organization glean important information about the customer's persona by asking probing questions about their marketing purchase behaviors and preferences.

      METAVERSE- DRIVEN BRANDING AND ADVERTISING

      One of the newest phenomena in data-driven marketing technology and digital advertising techniques is the metaverse, where users can represent themselves and their brand via virtual avatars to further gamify their marketing strategies. Moreover, brands can create immersive experiences and engage with influencers and established communities and collect a wealth of information about their audience that can help drive customer retention and loyalty.

      Case study

      This is the logos for Gucci and Roblox.

      Metaverse marketing extends the potential for commercial brand development and representation: a deep dive into Gucci's metaverse practice

      INDUSTRY: Luxury Goods Apparel
      SOURCE: Vogue Business

      Challenge

      Beginning with a small, family-owned leather shop known as House of Gucci in Florence, Italy, businessman and fashion designer Guccio Gucci sold saddles, leather bags, and other accessories to horsemen during the 1920s. Over the years, Gucci's offerings have grown to include various other personal luxury goods.

      As consumer preferences have evolved over time, particularly with the younger generation, Gucci's professional marketing teams looked to invest in virtual technology environments to help build and sustain better brand awareness among younger consumer audiences.

      Solution

      In response to the increasing presence of metaverse-savvy gamers on the internet, Gucci began investing in developing its online metaverse presence to bolster its commercial marketing brand there.

      A recent collaboration with Roblox, an online gaming platform that offers virtual experiences, provided Gucci the means to showcase its fashion items using the Gucci Garden – a virtual art installation project for Generation Z consumers, powered by Roblox's VR technology. The Gucci Garden virtual system featured a French-styled garden environment where players could try on and buy Gucci virtual fashion items to dress up their blank avatars.

      Results

      Gucci's disruptive, innovative metaverse marketing campaign project with Roblox is proof of its commitment to tapping new marketing growth channels to showcase the brand to engage new and prospective consumers (e.g. Roblox's player base) across more unique sandboxed/simulation environments.

      The freedom and flexibility in the metaverse environments allows brands such as Gucci to execute a more flexible digital marketing approach and enables them to take advantage of innovative metaverse-driven technologies in the market to further drive their data-driven digital marketing campaigns.

      Art of the possible: next best action marketing (NBAM)

      NEXT BEST ACTION PREDICTIVE MODELING

      To improve conversion propensity, next best action techniques can use predictive modeling methods to help build a dynamic overview of the customer journey. With information sourced from actionable marketing intelligence data, MMS platforms can use NBAM techniques to identify customer needs based on their buying behavior, social media interactions, and other insights to determine what unique set of actions should be taken for each customer.

      MACHINE LEARNING–BASED RECOMMENDER SYSTEMS

      Rules-based recommender systems can help assign probabilities of purchasing behaviors based on the patterns in touchpoints of a customer's journey and interaction with your brand. For instance, a large grocery chain company such as Walmart or Whole Foods will use ML-based recommender systems to decide what coupons they should offer to their customers based on their purchasing history.

      Art of the possible: AI-driven customer segmentation

      MACHINE/DEEP LEARNING (ML/DL) ALGORITHMS

      The inclusion of AI in data analytics helps make customer targeting more accurate
      and meaningful. Organizations can analyze customer data more thoroughly and generate in-depth contextual and descriptive information about the targeted segments. In addition, they can use this information to automate the personalization of marketing campaigns for a specific target audience group.

      UNDERSTANDING CUSTOMER SENTIMENTS

      To greatly benefit from AI-powered customer segmentation, organizations must deploy specialized custom AI solutions to help organize qualitative comments into quantitative data. This approach requires companies to use custom AI models and tools that will analyze customer sentiments and experiences based on data extracted from various touchpoints (e.g. CRM systems, emails, chatbot logs).

      Phase 2

      Build the Business Case and Streamline Requirements

      Phase 1

      Phase 2

      Phase 3

      1.1 Define MMS Platforms

      1.2 Classify Table Stakes & Differentiating Capabilities

      1.3 Explore Trends

      2.1 Build the Business Case

      2.2 Streamline Requirements Elicitation

      2.3 Develop an Inclusive RFP Approach

      3.1 Discover Key Players in the Vendor Landscape

      3.2 Engage the Shortlist & Select Finalist

      3.3 Prepare for Implementation

      This phase will walk you through the following activities:

      • Define and build the business case for the selection of a right-sized MMS platform.
      • Elicit and prioritize granular requirements for your MMS platform.

      This phase involves the following participants:

      • CMO
      • Technical Marketing Analyst
      • Digital Marketing Project Manager
      • Marketing Data Analytics Analyst
      • Marketing Management Executive

      Software Selection Engagement

      5 Advisory Calls over a 5-Week Period to Accelerate Your Selection Process

      Expert analyst guidance over 5 weeks on average to select software and negotiate with the vendor.

      Save money, align stakeholders, speed up the process and make better decisions.

      Use a repeatable, formal methodology to improve your application selection process.

      Better, faster results, guaranteed, included in your membership.

      This is an image of the plan for five advisory calls over a five-week period.

      CLICK HERE to book your Selection Engagement

      Elicit and prioritize granular requirements for your marketing management suite (MMS) platform

      Understanding business needs through requirements gathering is the key to defining everything you need from your software. However, it is an area where people often make critical mistakes.

      Poorly scoped requirements

      Best practices

      • Fail to be comprehensive and miss certain areas of scope.
      • Focus on how the solution should work instead of what it must accomplish.
      • Have multiple levels of detail within the requirements, causing inconsistency and confusion.
      • Drill all the way down to system-level detail.
      • Add unnecessary constraints based on what is done today rather than focusing on what is needed for tomorrow.
      • Omit constraints or preferences that buyers think are obvious.
      • Get a clear understanding of what the system needs to do and what it is expected to produce.
      • Test against the principle of MECE – requirements should be "mutually exclusive and collectively exhaustive."
      • Explicitly state the obvious and assume nothing.
      • Investigate what is sold on the market and how it is sold. Use language that is consistent with that of the market and focus on key differentiators – not table stakes.
      • Contain the appropriate level of detail – the level should be suitable for procurement and sufficient for differentiating vendors.

      Info-Tech Insight
      Poor requirements are the number one reason projects fail. Review Info-Tech's Improve Requirements Gathering blueprint to learn how to improve your requirements analysis and get results that truly satisfy stakeholder needs.

      Info-Tech's approach

      Develop an inclusive and thorough approach to the RFP process

      Identity Need; Define Business requirements; Gain Business Authorization; Perform RFI/RFP; Negotiate Agreement; Purchase Goods and Services; Assess and Measure Performance.

      Info-Tech Insight

      Review Info-Tech's process and understand how you can prevent your organization from leaking negotiation leverage while preventing vendors from taking control of your RFP.

      The Info-Tech difference:

      1. The secret to managing an RFP is to make it as manageable and as thorough as possible. The RFP process should be like any other aspect of business – by developing a standard process. With a process in place, you are better able to handle whatever comes your way, because you know the steps you need to follow to produce a top-notch RFP.
      2. The business then identifies the need for more information about a product/service or determines that a purchase is required.
      3. A team of stakeholders from each area impacted gather all business, technical, legal, and risk requirements. What are the expectations of the vendor relationship post-RFP? How will the vendors be evaluated?
      4. Based on the predetermined requirements, either an RFI or an RFP is issued to vendors with a due date.

      Leverage Info-Tech's Contract Review Service to level the playing field with your shortlisted vendors

      You may be faced with multiple products, services, master service agreements, licensing models, service agreements, and more.
      Use Info-Tech's Contract Review Service to gain insights on your agreements:

      1. Are all key terms included?
      2. Are they applicable to your business?
      3. Can you trust that results will be delivered?
      4. What questions should you be asking from an IT perspective?

      Validate that a contract meets IT's and the business' needs by looking beyond the legal terminology. Use a practical set of questions, rules, and guidance to improve your value for dollar spent.

      This is an image of three screenshots from Info-Tech's Contract Review Service.

      CLICK to BOOK The Contract Review Service

      CLICK to DOWNLOAD Master Contract Review and Negotiation for Software Agreements

      Phase 3

      Discover the MMS Market Space and Prepare for Implementation

      Phase 1

      Phase 2

      Phase 3

      1.1 Define MMS Platforms

      1.2 Classify Table Stakes & Differentiating Capabilities

      1.3 Explore Trends

      2.1 Build the Business Case

      2.2 Streamline Requirements Elicitation

      2.3 Develop an Inclusive RFP Approach

      3.1 Discover Key Players in the Vendor Landscape

      3.2 Engage the Shortlist & Select Finalist

      3.3 Prepare for Implementation

      This phase will walk you through the following activities:

      • Dive into the key players of the MMS vendor landscape.
      • Understand best practices for building a vendor shortlist.
      • Understand key implementation considerations for MMS.

      This phase involves the following participants:

      • CMO
      • Marketing Management Executive
      • Applications Manager
      • Digital Marketing Project Manager
      • Sales Executive
      • Vendor Outreach and Partnerships Manager

      Review your use cases to start your shortlist

      Your Info-Tech analysts can help you narrow down the list of vendors that will meet your requirements.

      Next steps will include:

      1. Reviewing your requirements.
      2. Checking out SoftwareReviews.
      3. Shortlisting your vendors.
      4. Conducting demos and detailed proposal reviews.
      5. Selecting and contracting with a finalist!

      Get to know the key players in the MMS landscape

      The following slides provide a top-level overview of the popular players you will encounter in your MMS shortlisting process.

      This is a series of images of the logos for the companies which will be discussed later in this blueprint.

      Evaluate software category leaders through vendor rankings and awards

      SoftwareReviews

      This is an image of two screenshots from the Data Quadrant Report.

      The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

      Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.

      This is an image of two screenshots from the Emotional Footprint Report.

      The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

      Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

      Speak with category experts to dive deeper into the vendor landscape

      SoftwareReviews

      • Fact-based reviews of business software from IT professionals.
      • Product and category reports with state-of-the-art data visualization.
      • Top-tier data quality backed by a rigorous quality assurance process.
      • User-experience insight that reveals the intangibles of working with a vendor.

      CLICK HERE to ACCESS

      Comprehensive software reviews
      to make better IT decisions

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      SoftwareReviews is powered by Info-Tech

      Technology coverage is a priority for Info-Tech, and SoftwareReviews provides the most comprehensive unbiased data on today's technology. Combined with the insight of our expert analysts, our members receive unparalleled support in their buying journey.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Advanced Campaign Management
      • Email Marketing Automation
      • Multichannel Integration

      Areas to Improve:

      • Mobile Marketing Management
      • Advanced Data Segmentation
      • Pricing Sensitivity and Implementation Support Model

      This is an image of SoftwareReviews analysis for Adobe Experience Cloud.

      history

      This is the Logo for Adobe Experience Cloud

      "Adobe Experience Cloud (AEC), formerly Adobe Marketing Cloud (AMC), provides a host of innovative multichannel analytics, social, advertising, media optimization, and content management products (just to name a few). The Adobe Marketing Cloud package allows users with valid subscriptions to download the entire collection and use it directly on their computer with open access to online updates. Organizations that have a deeply ingrained Adobe footprint and have already reaped the benefits of Adobe's existing portfolio of cloud services products (e.g. Adobe Creative Cloud) will find the AEC suite a functionally robust and scalable fit for their marketing management and marketing automation needs.

      However, it is important to note that AEC's pricing model is expensive when compared to other competitors in the space (e.g. Sugar Market) and, therefore, is not as affordable for smaller or mid-sized organizations. Moreover, there is the expectation of a learning curve with the AEC platform. Newly onboarded users will need to spend some time learning how to navigate and work comfortably with AEC's marketing automaton modules. "
      - Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      Adobe Experience Cloud Platform pricing is opaque.
      Request a demo.*

      *Info-Tech recommends reaching out to the vendor's internal sales management team for explicit details on individual pricing plans for the Adobe Marketing Cloud suite.

      2021

      Adobe Experience Platform Launch is integrated into the Adobe Experience Platform as a suite of data collection technologies (Experience League, Adobe).

      November 2020

      Adobe announces that it will spend $1.5 billion to acquire Workfront, a provider of marketing collaboration software (TechTarget, 2020).

      September 2018

      Adobe acquires marketing automation software company Marketo (CNBC, 2018).

      June 2018

      Adobe buys e-commerce services provider Magento Commerce from private equity firm Permira for $1.68 billion (TechCrunch, 2018).

      2011

      Adobe acquires DemDex, Inc. with the intention of adding DemDex's audience-optimization software to the Adobe Online Marketing Suite (Adobe News, 2011).

      2009

      Adobe acquires online marketing and web analytics company Omniture for $1.8 billion and integrates its products into the Adobe Marketing Cloud (Zippia, 2022).

      Adobe platform launches in December 1982.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Marketing Workflow Management
      • Advanced Data Segmentation
      • Marketing Operations Management

      Areas to Improve:

      • Email Marketing Automation
      • Marketing Asset Management
      • Process of Creating and/or Managing Marketing Lists

      This is an image of SoftwareReviews analysis for Dynamics 365

      history

      This is the logo for Dynamics 365

      2021

      Microsoft Dynamics 365 suite adds customer journey orchestration as a viable key feature (Tech Target, 2021)

      2019

      Microsoft begins adding to its Dynamics 365 suite in April 2019 with new functionalities such as virtual agents, fraud detection, new mixed reality (Microsoft Dynamics 365 Blog, 2019).

      2017

      Adobe and Microsoft expand key partnership between Adobe Experience Manager and Dynamics 365 integration (TechCrunch, 2017).

      2016

      Microsoft Dynamics CRM paid seats begin growing steadily at more than 2.5x year-over-year (TechCrunch, 2016).

      2016

      On-premises application, called Dynamics 365 Customer Engagement, contains the Dynamics 365 Marketing Management platform (Learn Microsoft, 2023).

      Microsoft Dynamics 365 product suite is released on November 1, 2016.

      "Microsoft Dynamics 365 for Marketing remains a viable option for organizations that require a range of innovative MMS tools that can provide a wealth of functional capabilities (e.g. AI-powered analytics to create targeted segments, A/B testing, personalizing engagement for each customer). Moreover, Microsoft Dynamics 365 for Marketing offers trial options to sandbox their platform for free for 30 days to help users familiarize themselves with the software before buying into the product suite.

      However, ensure that you have the time to effectively train users on implementing the MS Dynamics 365 platform. The platform does not score high on customizability in SoftwareReviews reports. Developers have only a limited ability to modify the core UI, so organizations need to be fully equipped with the knowledge needed to successfully navigate MS-based applications to take full advantage of the platform. For organizations deep in the Microsoft stack, D365 Marketing is a compelling option."
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      Dynamics 365
      Marketing

      Dynamics 365
      Marketing (Attachment)

      • Starts from $1,500 per tenant/month*
      • Includes 10,000 contacts, 100,000 interactions, and 1,000 SMS messages
      • For organizations without any other Dynamics 365 application
      • Starts from $750 per tenant/month*
      • Includes 10,000 contacts, 100,000 interactions, and 1,000 SMS messages
      • For organizations with a qualifying Dynamics 365 application

      * Pricing correct as of October 2022. Listed in USD and absent discounts. See pricing on vendor's website for latest information.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Marketing Analytics
      • Marketing Workflow Management
      • Lead Nurturing

      Areas to Improve:

      • Advanced Campaign Management
      • Email Marketing Automation
      • Marketing Segmentation

      This is an image of SoftwareReviews analysis for HubSpot

      history

      This is an image of the Logo for HubSpot

      2022

      HubSpot Marketing Hub releases Campaigns 2.0 module for its Marketing Hub platform (HubSpot, 2022).

      2018


      HubSpot announces the launch of its Marketing Hub Starter platform, a new offering that aims to give growing teams the tools they need to start marketing right (HubSpot Company News, 2018).

      2014

      HubSpot celebrates its first initial public offering on the NYSE market (HubSpot Company News, 2014).

      2013

      HubSpot opens its first international office location in Dublin, Ireland
      (HubSpot News, 2013).

      2010

      Brian Halligan and Dharmesh Shah write "Inbound Marketing," a seminal book that focuses on inbound marketing principles (HubSpot, n.d.).

      HubSpot opens for business in Cambridge, MA, USA, in 2005.

      "HubSpot's Marketing Hub software ranks consistently high in scores across SoftwareReviews reports and remains a strong choice for organizations that want to run successful inbound marketing campaigns that make customers interested and engaged with their business. HubSpot Marketing Hub employs comprehensive feature sets, including the option to streamline ad tracking and management, perform various audience segmentation techniques, and build personalized and automated marketing campaigns.

      However, SoftwareReviews reports indicate end users are concerned that HubSpot Marketing Hub's platform may be slightly overpriced in recent years and not cost effective for smaller and mid-sized companies that are working with a limited budget. Moreover, when it comes to mobile user accessibility reports, HubSpot's Marketing Hub does not directly offer data usage reports in relation to how mobile users navigate various web pages on the customer's website."
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      HubSpot Marketing Hub (Starter Package)

      HubSpot Marketing Hub (Professional Package)

      HubSpot Marketing Hub (Enterprise Package)

      • Starts from $50/month*
      • Includes 1,000 marketing contacts
      • All non-marketing contacts are free, up to a limit of 15 million overall contacts (marketing contacts + non-marketing contracts)
      • Starts from $890/month*
      • Includes 2,000 marketing contacts
      • Onboarding is required for a one-time fee of $3,000
      • Starts from $3600/month*
      • Includes 10,000 marketing contacts
      • Onboarding is required for a one-time fee of $6,000

      *Pricing correct as of October 2022. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Email Marketing Automation
      • Customer Journey Mapping
      • Contacts Management

      Areas to Improve:

      • Pricing Model Flexibility
      • Integrational API Support
      • Antiquated UI/CX Design Elements

      This is an image of SoftwareReviews analysis for Maropost

      history

      This is an image of the Logo for MAROPOST Marketing Cloud

      2022

      Maropost acquires Retail Express, leading retail POS software in Australia for $55M (PRWire, 2022).

      2018


      Maropost develops innovative product feature updates to its marketing cloud platform (e.g. automated social campaign management, event segmentation for mobile apps) (Maropost, 2019).

      2015

      US-based communications organization Success selects Maropost Marketing Cloud for marketing automation use cases (Apps Run The World, 2015).

      2017

      Maropost is on track to become one of Toronto's fastest-growing companies, generating $30M in annual revenue (MarTech Series, 2017).

      2015

      Maropost is ranked as a "High Performer" in the Email Marketing category in a G2 Crowd Grid Report (VentureBeat, 2015).

      Maropost is founded in 2011 as a customer-centric ESP platform.

      Maropost Marketing Cloud – Essential

      Maropost
      Marketing Cloud –Professional

      Maropost
      Marketing Cloud –Enterprise

      • Starts from $279/month*
      • Includes baseline features such as email campaigns, A/B campaigns, transactional emails, etc.
      • Starts from $849/month*
      • Includes additional system functionalities of interest (e.g. mobile keywords, more journeys for marketing automation use cases)
      • Starts from $1,699/month*
      • Includes unlimited number of journeys
      • Upper limit for custom contact fields is increased by 100-150

      *Pricing correct as of October 2022. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Advanced Data Segmentation
      • Marketing Analytics
      • Multichannel Integration

      Areas to Improve:

      • Marketing Operations
        Management
      • Marketing Asset Management
      • Community Marketing Management

      This is an image of SoftwareReviews analysis for Oracle Marketing Cloud.

      history

      This is an image of the Logo for Oracle Marketing Cloud

      2021

      New advanced intelligence capabilities within Oracle Eloqua Marketing Automation help deliver more targeted and personalized messages (Oracle, Marketing Automation documentation).

      2015


      Oracle revamps its marketing cloud with new feature sets, including Oracle ID Graph for cross-platform identification of customers, AppCloud Connect, etc. (Forbes, 2015).

      2014

      Oracle announces the launch of the Oracle Marketing Cloud (TechCrunch, 2014).

      2005

      Oracle acquires PeopleSoft, a company that produces human resource management systems, in 2005 for $10.3B (The Economic Times, 2016).

      1982

      Oracle becomes the first company to sell relational database management software (RDBMS). In 1982 it has revenue of $2.5M (Encyclopedia.com).

      Relational Software, Inc (RSI) – later renamed Oracle Corporation – is founded in 1977.

      "Oracle Marketing Cloud offers a comprehensive interwoven and integrated marketing management solution that can help end users launch cross-channel marketing programs and unify all prospect and customer marketing signals within one singular view. Oracle Marketing Cloud ranks consistently high across our SoftwareReviews reports and sustains top scores in overall customer experience rankings at a factor of 9.0. The emotional sentiment of users interacting with Oracle Marketing Cloud is also highly favorable, with Oracle's Emotional Footprint score at +93.

      Users should be aware that some of the reporting mechanisms and report-generation capabilities may not be as mature as those of some of its competitors in the MMS space (e.g. Salesforce, Adobe). Data exportability also presents a challenge in Oracle Marketing Cloud and requires a lot of internal tweaking between end users of the system to function properly. Finally, pricing sensitivity may be a concern for small and mid-sized organizations who may find Oracle's higher-tiered pricing plans to be out of reach. "
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      Oracle Marketing Cloud pricing is opaque.
      Request a demo.*

      *Info-Tech recommends reaching out to the vendor's internal sales management team for explicit details on individual pricing plans for the Adobe Marketing Cloud suite.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Marketing Analytics
      • Advanced Campaign Management
      • Email Marketing Automation
      • Social Media Marketing Management

      Areas to Improve:

      • Community Marketing Management
      • Marketing Operations Management
      • Pricing Sensitivity and Vendor Support Model

      This is an image of SoftwareReviews analysis for Salesforce

      history

      This is an image of the Logo for Salesforce Marketing Cloud

      2022

      Salesforce announces sustainability as a core company value (Forbes, 2022).

      2012



      Salesforce unveils Salesforce Marketing Cloud during Dreamforce 2012, with 90,000 registered attendees (Dice, 2012).

      2009

      Salesforce launches Service Cloud, bringing customer service and support automation features to the market (TechCrunch, 2009).

      2003


      The first Dreamforce event is held at the Westin St. Francis hotel in downtown San Francisco
      (Salesforce, 2020).

      2001


      Salesforce delivers $22.4M in revenue for the fiscal year ending January 31, 2002 (Salesforce, 2020).

      Salesforce is founded in 1999.

      "Salesforce Marketing Cloud is a long-term juggernaut of the marketing management software space and is the subject of many Info-Tech member inquiries. It retains strong composite and customer experience (CX) scores in our SoftwareReviews reports. Some standout features of the platform include marketing analytics, advanced campaign management functionalities, email marketing automation, and customer journey management capabilities. In recent years Salesforce has made great strides in improving the overall user experience by investing in new product functionalities such as the Einstein What-If Analyzer, which helps test how your next email campaign will impact overall customer engagement, triggers personalized campaign messages based on an individual user's behavior, and uses powerful real-time segmentation and sophisticated AI to deliver contextually relevant experiences that inspire customers to act.

      On the downside, we commonly see Salesforce's solutions as costlier than competitors' offerings, and its commercial/sales teams tend to be overly aggressive in marketing its solutions without a distinct link to overarching business requirements. "
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      Marketing Cloud Basics

      Marketing Cloud Pro

      Marketing Cloud Corporate

      Marketing Cloud Enterprise

      • Starts at $400*
      • Per org/month
      • Personalized promotional email marketing
      • Starts at $1,250*
      • Per org/month
      • Personalized marketing automation with email solutions
      • Starts at $3,750*
      • Per org/month
      • Personalized cross-channel strategic marketing solutions

      "Request a Quote"

      *Pricing correct as of October 2022. Listed in USD and absent discounts. See pricing on vendor's website for latest information.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Email Marketing Automation
      • Marketing Workflow Management
      • Marketing Analytics

      Areas to Improve:

      • Mobile Marketing Management
      • Marketing Operations Management
      • Advanced Data Segmentation

      This is an image of SoftwareReviews analysis for SAP

      history

      This is an image of the Logo for SAP

      2022

      SAP announces the second cycle of the 2022 SAP Customer Engagement Initiative. (SAP Community Blog, 2022).

      2020

      SAP acquires Austrian cloud marketing company Emarsys (TechCrunch, 2020).

      2015

      SAP Digital for Customer Engagement launches in May 2015 (SAP News, 2015).

      2009

      SAP begins branching out into three markets of the future (mobile technology, database technology, and cloud). SAP acquires some of its competitors (e.g. Ariba, SuccessFactors, Business Objects) to quickly establish itself as a key player in those areas (SAP, n.d.).

      1999

      SAP responds to the internet and new economy by launching its mysap.com strategy (SAP, n.d.).

      SAP is founded In 1972.

      "Over the years, SAP has positioned itself as one of the usual suspects across the enterprise applications market. While SAP has a broad range of capabilities within the CRM and customer experience space, it consistently underperforms in many of our user-driven SoftwareReviews reports for MMS and adjacent areas, ranking lower in MMS product feature capabilities such as email marketing automation and advanced campaign management than other mainstream MMS vendors, including Salesforce Marketing Cloud and Adobe Experience Cloud. The SAP Customer Engagement Marketing platform seems decidedly a secondary focus for SAP, behind its more compelling presence across the enterprise resource planning space.

      If you are approaching an MMS selection from a greenfield lens and with no legacy vendor baggage for SAP elsewhere, experience suggests that your needs will be better served by a vendor that places greater primacy on the MMS aspect of their portfolio."
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      SAP Customer Engagement Marketing pricing is opaque:
      Request a demo.*

      *Info-Tech recommends reaching out to the vendor's internal sales management team for explicit details on individual pricing plans for the Adobe Marketing Cloud suite.

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Social Media Automation
      • Email Marketing Automation
      • Marketing Analytics

      Areas to Improve:

      • Ease of Data Integration
      • Breadth of Features
      • Marketing Workflow Management

      b

      SoftwareReviews' Enterprise MMS Rankings

      Strengths:

      • Campaign Management
      • Segmentation
      • Email Delivery

      Areas to Improve:

      • Mobile Optimization
      • A/B Testing
      • Content Authoring

      This is an image of SoftwareReviews analysis for ZOHO Campaigns.

      history

      This is an image of the Logo for ZOHO Campaigns

      2021

      Zoho announces CRM-Campaigns sync (Zoho Campaigns Community Learning, 2021).

      2020

      Zoho reaches more than 50M customers in January ( Zippia, n.d.).

      2017

      Zoho launches Zoho One, a comprehensive suite of 40+ applications (Zoho Blog, 2017).

      2012

      Zoho releases Zoho Campaigns (Business Wire, 2012).

      2007

      Zoho expands into the collaboration space with the release of Zoho Docs and Zoho Meetings (Zoho, n.d.).

      2005

      Zoho CRM is released (Zoho, n.d.).

      Zoho platform is founded in 1996.

      "Zoho maintains a long-running repertoire of end-to-end software solutions for business development purposes. In addition to its flagship CRM product, the company also offers Zoho Campaigns, which is an email marketing software platform that enables contextually driven marketing techniques via dynamic personalization, email interactivity, A/B testing, etc. For organizations that already maintain a deep imprint of Zoho solutions, Zoho Campaigns will be a natural extension to their immediate software environment.

      Zoho Campaigns is a great ecosystem play in environments that have a material Zoho footprint. In the absence of an existing Zoho environment, it's prudent to consider other affordable products as well."
      Yaz Palanichamy
      Senior Research Analyst, Info-Tech Research Group

      Free Version

      Standard

      Professional

      • Starts at $0*
      • Per user/month billed annually
      • Up to 2,000 contacts
      • 6,000 emails/month
      • Starts at $3.75*
      • Per user/month billed annually
      • Up to 100,000 contacts
      • Advanced email templates
      • SMS marketing
      • Starts at $6*
      • Per user/month billed annually
      • Advanced segmentation
      • Dynamic content

      *Pricing correct as of October 2022. Listed in USD and absent discounts.

      See pricing on vendor's website for latest information.

      Leverage Info-Tech's research to plan and execute your MMS implementation

      Use Info-Tech's three-phase implementation process to guide your planning:

      1. Assess

      2. Prepare

      3. Govern & Course Correct

      Download Info-Tech's Governance and Management of Enterprise Software Implementation
      Establish and execute an end-to-end, agile framework to succeed with the implementation of a major enterprise application.

      Ensure your implementation team has a high degree of trust and communication

      If external partners are needed, dedicate an internal resource to managing the vendor and partner relationships.

      Communication

      Teams must have some type of communication strategy. This can be broken into:

      • Regularity: Having a set time each day to communicate progress and a set day to conduct retrospectives.
      • Ceremonies: Injecting awards and continually emphasizing delivery of value to encourage relationship building and constructive motivation.
      • Escalation: Voicing any concerns and having someone responsible for addressing them.

      Proximity

      Distributed teams create complexity as communication can break down. This can be mitigated by:

      • Location: Placing teams in proximity to eliminate the barrier of geographical distance and time zone differences.
      • Inclusion: Making a deliberate attempt to pull remote team members into discussions and ceremonies.
      • Communication Tools: Having the right technology (e.g. video conference) to help bring teams closer together virtually.

      Trust

      Members should trust other members are contributing to the project and completing their required tasks on time. Trust can be developed and maintained by:

      • Accountability: Having frequent quality reviews and feedback sessions. As work becomes more transparent, people become more accountable.
      • Role Clarity: Having a clear definition of what everyone's role is.

      Selecting a right-sized MMS platform

      This selection guide allows organizations to execute a structured methodology for picking an MMS platform that aligns with their needs. This includes:

      • Alignment and prioritization of key business and technology drivers for an MMS selection business case.
      • Identification of key use cases and requirements for a right-sized MMS platform.
      • A comprehensive market scan of key players in the MMS market space.

      This formal MMS selection initiative will drive business-IT alignment, identify pivotal sales and marketing automation priorities, and thereby allow for the rollout of a streamlined MMS platform that is highly likely to satisfy all stakeholder needs.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Summary of accomplishment

      Knowledge Gained

      • What marketing management is
      • Historical origins of marketing management
      • The future of marketing management
      • Key trends in marketing management suites

      Processes Optimized

      • Requirements gathering
      • RFPs and contract reviews
      • Marketing management suite vendor selection
      • Marketing management platform implementation

      Marketing Management

      • Adobe Experience Cloud
      • Microsoft Dynamics 365 for Marketing
      • HubSpot Marketing Hub
      • Maropost Marketing Cloud
      • Oracle Marketing Cloud

      Vendors Analyzed

      • Salesforce Marketing Cloud
      • SAP
      • Sugar Market
      • Zoho Campaigns

      Related Info-Tech Research

      Select a Marketing Management Suite

      Many organizations struggle with taking a systematic approach to selection that pairs functional requirements with specific marketing workflows, and as a result they choose a marketing management suite (MMS) that is not well aligned to their needs, wasting resources and causing end-user frustration.

      Get the Most Out of Your CRM

      Customer relationship management (CRM) application portfolios are often messy,
      with multiple integration points, distributed data, and limited ongoing end-user training. A properly optimized CRM ecosystem will reduce costs and increase productivity.

      Customer Relationship Management Platform Selection Guide

      Speed up the process to build your business case and select your CRM solution. Despite the importance of CRM selection and implementation, many organizations struggle to define an approach to picking the right vendor and rolling out the solution in an effective and cost-efficient manner.

      Bibliography

      "16 Biggest Tech Acquisitions in History." The Economic Times, 28 July 2016. Web.
      "Adobe Acquires Demdex – Brings Audience Optimization to $109 Billion Global Online Ad Market." Adobe News, 18 Jan 2011. Accessed Nov 2022.
      "Adobe Company History Timeline." Zippia, 9 Sept 2022. Accessed Nov 2022.
      "Adobe to acquire Magento for $1.68B." TechCrunch, 21 May 2018. Accessed Dec 2022.
      Anderson, Meghan Keaney. "HubSpot Launches European Headquarters." HubSpot Company News, 3 Mar 2013.
      Arenas-Gaitán, Jorge, et al. "Complexity of Understanding Consumer Behavior from the Marketing Perspective." Journal of Complexity, vol. 2019, 8 Jan 2019. Accessed Sept 2022.
      Bureau of Labor Statistics. "Advertising, Promotions, and Marketing Managers." Occupational Outlook Handbook. U.S. Department of Labor, 8 Sept 2022. Accessed 1 Nov 2022.
      "Campaigns." Marketing Hub, HubSpot, n.d. Web.
      Conklin, Bob. "Adobe report reveals best marketing practices for B2B growth in 2023 and beyond." Adobe Experience Cloud Blog, 23 Sept 2022. Web.
      "Consumer Behavior Stats 2021: The Post-Pandemic Shift in Online Shopping Habit" Nosto.com, 7 April 2022. Accessed Oct 2022.
      "Data Collection Overview." Experience League, Adobe.com, n.d. Accessed Dec 2022.
      Duduskar, Avinash. "Interview with Tony Chen, CEO at Channel Factory." MarTech Series, 16 June 2017. Accessed Nov 2022.
      "Enhanced Release of SAP Digital for Customer Engagement Helps Anyone Go Beyond CRM." SAP News, 8 Dec. 2015. Press release.
      Fang, Mingyu. "A Deep Dive into Gucci's Metaverse Practice." Medium.com, 27 Feb 2022. Accessed Oct 2022.
      Flanagan, Ellie. "HubSpot Launches Marketing Hub Starter to Give Growing Businesses the Tools They Need to Start Marketing Right." HubSpot Company News, 17 July 2018. Web.
      Fleishman, Hannah. "HubStop Announces Pricing of Initial Public Offering." HubSpot Company News, 8 Oct. 204. Web.
      Fluckinger, Don. "Adobe to acquire Workfront for $1.5 billion." TechTarget, 10 Nov 2020. Accessed Nov 2022.
      Fluckinger, Don. "Microsoft Dynamics 365 adds customer journey orchestration." TechTarget, 2 March 2021. Accessed Nov 2022.
      Green Marketing: Explore the Strategy of Green Marketing." Marketing Schools, 19 Nov 2020. Accessed Oct 2022.
      Ha, Anthony. "Oracle Announces Its Cross-Platform Marketing Cloud." TechCrunch, 30 April 2014. Web.
      Heyd, Kathrin. "Partners Welcome – SAP Customer Engagement Initiative 2022-2 is open for your registration(s)!" SAP Community Blog, 21 June 2022. Accessed Nov 2022.
      HubSpot. "Our Story." HubSpot, n.d. Web.
      Jackson, Felicia. "Salesforce Tackles Net Zero Credibility As It Adds Sustainability As A Fifth Core Value." Forbes, 16 Feb. 2022. Web.
      Kolakowski, Nick. "Salesforce CEO Marc Benioff Talks Social Future." Dice, 19 Sept. 2012. Web.
      Lardinois, Frederic. "Microsoft's Q4 earnings beat Street with $22.6B in revenue, $0.69 EPS." TechCrunch, 19 July 2016. Web.
      Levine, Barry. "G2 Crowd report finds the two email marketing tools with the highest user satisfaction." Venture Beat, 30 July 2015. Accessed Nov 2022.
      Looking Back, Moving Forward: The Evolution of Maropost for Marketing." Maropost Blog, 21 May 2019. Accessed Oct 2022.
      Maher, Sarah. "What's new with HubSpot? Inbound 2022 Feature Releases." Six & Flow, 9 July 2022. Accessed Oct 2022.
      Marketing Automation Provider, Salesfusion, Continues to Help Marketers Achieve Their Goals With Enhanced User Interface and Powerful Email Designer Updates." Yahoo Finance, 10 Dec 2013. Accessed Oct 2022.
      "Maropost Acquires Retail Express for $55 Million+ as it Continues to Dominate the Global Commerce Space." Marapost Newsroom, PRWire.com, 19 Jan 2022. Accessed Nov 2022.
      McDowell, Maghan. "Inside Gucci and Roblox's new virtual world." Vogue Business, 17 May 2021. Web.
      Miller, Ron. "Adobe and Microsoft expand partnership with Adobe Experience Manager and Dynamics 265 Integration." TechCrunch, 3 Nov 2017. Accessed Nov 2022.
      Miller, Ron. "Adobe to acquire Magento for $1.68B" TechCrunch, 21 May 2018. Accessed Nov 2022.
      Miller, Ron. "SAP continues to build out customer experience business with Emarys acquisition." TechCrunch, 1 Oct. 2020. Web.
      Miller, Ron. "SugarCRM moves into marketing automation with Salesfusion acquisition." TechCrunch, 16 May 2019.
      Novet, Jordan. "Adobe confirms it's buying Marketo for $4.75 billion." CNBC, 20 Sept 2018. Accessed Dec 2022.
      "Oracle Corp." Encyclopedia.com, n.d. Web.
      Phillips, James. "April 2019 Release launches with new AI, mixed reality, and 350+ feature updates." Microsoft Dynamics 365 Blog. Microsoft, 2 April 2019. Web.
      S., Aravindhan. "Announcing an important update to Zoho CRM-Zoho Campaigns integration." Zoho Campaigns Community Learning, Zoho, 1 Dec. 2021. Web.
      Salesforce. "The History of Salesforce." Salesforce, 19 March 2020. Web.
      "Salesfusion Integrates With NetSuite CRM to Simplify Sales and Marketing Alignment" GlobeNewswire, 6 May 2016. Accessed Oct 2022. Press release.
      "Salesfusion Integrates With NetSuite CRM to Simplify Sales and Marketing Alignment." Marketwired, 6 May 2016. Web.
      "Salesfusion is Now Sugar Market: The Customer FAQ." SugarCRM Blog, 31 July 2019. Web.
      "Salesfusion's Marketing Automation Platform Drives Awareness and ROI for Education Technology Provider" GlobeNewswire, 25 June 2015. Accessed Nov 2022. Press release.
      SAP. "SAP History." SAP, n.d. Web.
      "State of Marketing." 5th Edition, Salesforce, 15 Jan 2019. Accessed Oct 2022.
      "Success selects Maropost Marketing Cloud for Marketing Automation." Apps Run The World, 10 Jan 2015. Accessed Nov 2022.
      "SugarCRM Acquires SaaS Marketing Automation Innovator Salesfusion." SugarCRM, 16 May 2019. Press release.
      Sundaram, Vijay. "Introducing Zoho One." Zoho Blog, 25 July 2017. Web.
      "The State of MarTech: Is you MarTech stack working for you?" American Marketing Association, 29 Nov 2021. Accessed Oct 2022.
      "Top Marketing Automation Statistics for 2022." Oracle, 15 Jan 2022. Accessed Oct 2022.
      Trefis Team. "Oracle Energizes Its Marketing Cloud With New Features." Forbes, 7 April 2015. Accessed Oct 2022.
      Vivek, Kumar, et al. "Microsoft Dynamics 365 Customer Engagement (on-premises) Help, version 9.x." Learn Dynamics 365, Microsoft, 9 Jan 2023. Web.
      "What's new with HubSpot? Inbound 2022 feature releases" Six and Flow, 9 July 2022. Accessed Nov 2022.
      Widman, Jeff. "Salesforce.com Launches The Service Cloud,, A Customer Service SaaS Application." TechCrunch, 15 Jan. 2009. Web.
      "Zoho History." Zippia, n.d. Web.
      "Zoho Launches Zoho Campaigns." Business Wire, 14 Aug. 2012. Press release.
      Zoho. "About Us." Zoho, n.d. Web.

      Need hands-on assistance?

      Engage Info-Tech for a Software Selection Workshop!

      40 Hours of Advisory Assistance Delivered On-Line or In-Person

      Select Better Software, Faster.

      40 Hours of Expert Analyst Guidance
      Project & Stakeholder Management Assistance
      Save money, align stakeholders, Speed up the process & make better decisions.
      Better, faster results, guaranteed, $25K standard engagement fee

      This is an image of the plan for five advisory calls over a five week period.

      CLICK HERE to book your Workshop Engagement

      Implement an IT Chargeback System

      • Buy Link or Shortcode: {j2store}71|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Cost & Budget Management
      • Parent Category Link: /cost-and-budget-management
      • Business units voraciously consume IT services and don’t understand the actual costs of IT. This is due to lack of IT cost transparency and business stakeholder accountability for consumption of IT services.
      • Business units perceive IT costs as uncompetitive, resulting in shadow IT and a negative perception of IT.
      • Business executives have decided to implement an IT chargeback program and IT must ensure the program succeeds.

      Our Advice

      Critical Insight

      Price IT services so that business consumers find them meaningful, measurable, and manageable:

      • The business must understand what they are being charged for. If they can’t understand the value, you’ve chosen the wrong basis for charge.
      • Business units must be able to control and track their consumption levels, or they will feel powerless to control costs and you’ll never attain real buy-in.

      Impact and Result

      • Explain IT costs in ways that matter to the business. Instead of focusing on what IT pays for, discuss the value that IT brings to the business by defining IT services and how they serve business users.
      • Develop a chargeback model that brings transparency to the flow of IT costs through to business value. Demonstrate how a good chargeback model can bring about fair “pay-for-value” and “pay-for-what-you-use” pricing.
      • Communicate IT chargeback openly and manage change effectively. Business owners will want to know how their profit and loss statements will be affected by the new pricing model.

      Implement an IT Chargeback System Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement an IT chargeback program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Launch

      Make the case for IT chargeback, then assess the financial maturity of the organization and identify a pathway to success. Create a chargeback governance model.

      • Implement IT Chargeback – Phase 1: Launch
      • IT Chargeback Kick-Off Presentation

      2. Define

      Develop a chargeback model, including identifying user-facing IT services, allocating IT costs to services, and setting up the chargeback program.

      • Implement IT Chargeback – Phase 2: Define
      • IT Chargeback Program Development & Management Tool

      3. Implement

      Communicate the rollout of the IT chargeback model and establish a process for recovering IT services costs from business units.

      • Implement IT Chargeback – Phase 3: Implement
      • IT Chargeback Communication Plan
      • IT Chargeback Rollout Presentation
      • IT Chargeback Financial Presentation

      4. Revise

      Gather and analyze feedback from business owners, making necessary modifications to the chargeback model and communicating the implications.

      • Implement IT Chargeback – Phase 4: Revise
      • IT Chargeback Change Communication Template
      [infographic]

      Workshop: Implement an IT Chargeback System

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Kick-Off IT Chargeback

      The Purpose

      Make the case for IT chargeback.

      Identify the current and target state of chargeback maturity.

      Establish a chargeback governance model.

      Key Benefits Achieved

      Investigated the benefits and challenges of implementing IT chargeback.

      Understanding of the reasons why traditional chargeback approaches fail.

      Identified the specific pathway to chargeback success.

      Activities

      1.1 Investigate the benefits and challenges of implementing IT chargeback

      1.2 Educate business owners and executives on IT chargeback

      1.3 Identify the current and target state of chargeback maturity

      1.4 Establish chargeback governance

      Outputs

      Defined IT chargeback mandate

      IT chargeback kick-off presentation

      Chargeback maturity assessment

      IT chargeback governance model

      2 Develop the Chargeback Model

      The Purpose

      Develop a chargeback model.

      Identify the customers and user-facing services.

      Allocate IT costs.

      Determine chargeable service units.

      Key Benefits Achieved

      Identified IT customers.

      Identified user-facing services and generated descriptions for them.

      Allocated IT costs to IT services.

      Identified meaningful, measurable, and manageable chargeback service units.

      Activities

      2.1 Identify user-facing services and generate descriptions

      2.2 Allocate costs to user-facing services

      2.3 Determine chargeable service units and pricing

      2.4 Track consumption

      2.5 Determine service charges

      Outputs

      High-level service catalog

      Chargeback model

      3 Communicate IT Chargeback

      The Purpose

      Communicate the implementation of IT chargeback.

      Establish a process for recovering the costs of IT services from business units.

      Share the financial results of the charge cycle with business owners.

      Key Benefits Achieved

      Managed the transition to charging and recovering the costs of IT services from business units.

      Communicated the implementation of IT chargeback and shared the financial results with business owners.

      Activities

      3.1 Create a communication plan

      3.2 Deliver a chargeback rollout presentation

      3.3 Establish a process for recovering IT costs from business units

      3.4 Share the financial results from the charge cycle with business owners

      Outputs

      IT chargeback communication plan

      IT chargeback rollout presentation

      IT service cost recovery process

      IT chargeback financial presentation

      4 Review the Chargeback Model

      The Purpose

      Gather and analyze feedback from business owners on the chargeback model.

      Make necessary modifications to the chargeback model and communicate implications.

      Key Benefits Achieved

      Gathered business stakeholder feedback on the chargeback model.

      Made necessary modifications to the chargeback model to increase satisfaction and accuracy.

      Managed changes by communicating the implications to business owners in a structured manner.

      Activities

      4.1 Address stakeholder pain points and highly disputed costs

      4.2 Update the chargeback model

      4.3 Communicate the chargeback model changes and implications to business units

      Outputs

      Revised chargeback model with business feedback, change log, and modifications

      Chargeback change communication

      State of Hybrid Work in IT

      • Buy Link or Shortcode: {j2store}551|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Attract & Select
      • Parent Category Link: /attract-and-select

      Hybrid work is here, but there is no consensus among industry leaders on how to do it right. IT faces the dual challenge of supporting its own employees while enabling the success of the broader organization. In the absence of a single best practice to adopt, how can IT departments make the right decisions when it comes to the new world of hybrid?

      Our Advice

      Critical Insight

      • Don’t make the mistake of emulating the tech giants, unless they are your direct competition. Instead, look to organizations that have walked your path in terms of scope, organizational goals, industry, and organizational structure. Remember, your competitors are not just those who compete for the same customers but also those who compete for your employees.
      • Hybrid and remote teams require more attention, connection, and leadership from managers. The shift from doing the day-to-day to effectively leading is critical for the success of nontraditional work models. As hybrid and remote work become engrained in society, organizations must ensure that the concept of the “working manager” is as obsolete as the rotary telephone.

      Impact and Result

      Read this concise report to learn:

      • What other IT organizations are doing in the new hybrid world.
      • How hybrid has impacted infrastructure, operations, and business relations.
      • How to succeed at building a highly effective hybrid team.
      • How Info-Tech can help you make hybrid an asset for your IT department.

      State of Hybrid Work in IT Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. State of Hybrid Work in IT: A Trend Report – A walkthrough of the latest data on the impact of the hybrid work revolution in IT.

      Read this report to learn how IT departments are using the latest trends in hybrid work for greater IT effectiveness. Understand what work models are best for IT, how IT can support a remote organization, and how hybrid work changes team dynamics.

      • State of Hybrid Work in IT: A Trends Report

      Infographic

      Further reading

      State of Hybrid Work in IT: A Trend Report

      When tech giants can’t agree and best practices change by the minute, forge your own path to your next normal.

      Hybrid is here. Now how do we do this?

      The pandemic has catapulted hybrid work to the forefront of strategic decisions an organization needs to make. According to our State of Hybrid Work in IT survey conducted in July of 2022, nearly all organizations across all industries are continuing some form of hybrid or remote work long-term (n=518). Flexible work location options are the single greatest concern for employees seeking a new job. IT departments are tasked with not only solving hybrid work questions for their own personnel but also supporting a hybrid-first organization, which means significant changes to technology and operations.

      Faced with decisions that alter the very foundation of how an organization functions, IT leaders are looking for best practices and coming up empty. The world of work has changed quickly and unexpectedly. If you feel you are “winging it” in the new normal, you are not alone.

      95% of organizations are continuing some form of hybrid or remote work.

      n=518

      47% of respondents look at hybrid work options when evaluating a new employer, vs. 46% who look at salary.

      n=518

      Hybrid work model decision tree

      Your organization, your employees, your goals – your hybrid work

      The days of a “typical” workplace have passed. When it comes to the new world of hybrid work, there is no best-of-breed example to follow.

      Among the flood of contradictory decisions made by industry leaders, your IT organization must forge its own path, informed by the needs of your employees and your organizational goals.

      All IT work models can support the broader organization. However, IT is more effective in a hybrid work mode.

      Stay informed on where your industry is headed, but learn from, rather than follow, industry leaders.

      All industries reported primarily using partial, balanced & full hybrid work models.

      All industries reported some fully remote work, ranging from 2-10% of organizations surveyed.

      Construction and healthcare & life sciences did not require any fully in-office work. Other industries, between 1-12% required fully in-office work.

      The image contains a screenshot of the Enablement of Organizational Goals.

      Move beyond following tech giants

      The uncomfortable truth about hybrid work is that there are many viable models, and the “best of breed” depends on who you ask. In the post-pandemic workspace, for every work location model there is an industry leader that has made it functional. And yet this doesn’t mean that every model will be viable for your organization.

      In the absence of a single best practice, rely on an individualized cost-benefit assessment rooted in objective feasibility criteria. Every work model – whether it continues your status quo or overhauls the working environment – introduces risk. Only in the context of your particular organization does that risk become quantifiable.

      Don’t make the mistake of emulating the tech giants, unless they are your direct competition. Instead, look to organizations that have walked your path in terms of scope, organizational goals, industry, and organizational structure.

      External

      Internal

      Political

      Economic

      Social

      Technological

      Legal

      Environmental

      Operations

      Culture

      Resources

      Risk

      Benefit

      Employee Preferences

      Comparative

      Your competitors

      Info-Tech Insight

      Remember, your competitors are not just those who compete for the same customers but also those who compete for your employees.

      IT must balance commitments to both the organization and its employees

      IT has two roles: to effectively support the broader organization and to function effectively within the department. It therefore has two main stakeholder relationships: the organization it supports and the employees it houses. Hybrid work impacts both. Don't make the mistake of overweighting one relationship at the expense of the other. IT will only function effectively when it addresses both.

      Track your progress with the right metrics

      IT and the organization

      • Business satisfaction with IT
      • Perception of IT value

      Diagnostic tool: Business Vision

      IT and its employees

      • Employee engagement

      Diagnostic tool:
      Employee Engagement Surveys

      This report contains:

      1. IT and the Organization
        1. IT Effectiveness
          in a Hybrid World
        2. The Impact of Hybrid on Infrastructure & Operations
      2. IT and Its Employees
        1. What Hybrid Means for the IT Workforce
        2. Leadership for Hybrid IT Teams

      This report is based on organizations like yours

      The image contains graphs that demonstrate demographics of organizations.

      This report is based on organizations like yours

      The image contains two graphs that demonstrate a breakdown of departments in an organization.

      This report is based on organizations like yours

      The image contains two graphs that demonstrate the workforce type and operating budget.


      This report is based on organizations like yours

      The image contains two graphs that demonstrate organization maturity and effectiveness score.

      At a high level, hybrid work in IT is everywhere

      INDUSTRY

      • Arts & Entertainment (including sports)
      • Retail & Wholesale
      • Utilities
      • Transportation & Warehousing
      • Not-for-Profit (incl. professional associations)
      • Education
      • Professional Services
      • Manufacturing
      • Media, Information, Telecom & Technology
      • Construction
      • Gaming & Hospitality
      • Government
      • Healthcare & Life Sciences
      • Financial Services (incl. banking & insurance)

      ORGANIZATIONAL SIZE

      Small

      <100

      Medium

      101-5,000

      Large

      >5,000

      Employees

      POSITION LEVEL

      • Executive
      • Director
      • Supervisor/Manager
      • Student/Contractor/Team Member

      100% of industries, organizational sizes, and position levels reported some form of hybrid or remote work.

      Work model breakdown at the respondent level

      5% 21% 30% 39% 5%

      No Remote
      Work

      Partial Hybrid

      Balanced Hybrid

      Full Hybrid

      Full Remote

      Work

      n=516

      Industry lens: Work location model

      The image contains a screenshot of a graph that demonstrates the work location model with the work model breakdown at the respondent level.

      Percentage of IT roles currently in a hybrid or remote work arrangement

      The image contains a screenshot of two graphs that demonstrate the percentage of IT roles currently in a hybrid or remote work arrangement.

      Work location model by organization size

      The image contains a screenshot of a graph that demonstrates work location model by organization size.

      Hybrid work options

      The image contains a screenshot of two pie graphs that demonstrate hybrid work options.

      Expense reimbursement

      28% 27% 22% 26% 13% 4%

      None

      Internet/home phone

      Just internet

      Home office setup

      Home utilities

      Other

      NOTES

      n=518

      Home office setup: One-time lump-sum payment

      Home utilities: Gas, electricity, lights, etc.

      Other: Office supplies, portion of home rent/mortgage payments, etc.

      01 TECHNOLOGY

      IT and the Organization

      Section 1

      The promise of hybrid work for IT department effectiveness and the costs of making it happen

      In this section:

      1. IT Effectiveness in a Hybrid World
      2. The Impact of Hybrid on Infrastructure & Operations

      Hybrid work models in IT bolster effectiveness

      IT’s effectiveness, meaning its ability to enable organizational goal attainment, is its ultimate success metric. In the post-pandemic world, this indicator is intimately tied to IT’s work location model, as well as IT’s ability to support the work location model used by the broader organization.

      In 2022, 90% of organizations have embraced some form of hybrid work (n=516). And only a small contingent of IT departments have more than 90% of roles still working completely in office, with no remote work offered (n=515).

      This outcome was not unexpected, given the unprecedented success of remote work during the pandemic. However, the implications of this work model were far less certain. Would productivity remain once the threat of layoffs had passed? Would hybrid work be viable in the long term, once the novelty wore off? Would teams be able to function collaboratively without meeting face to face? Would hybrid allow a great culture
      to continue?

      All signs point to yes. For most IT departments, the benefits of hybrid work outweigh its costs. IT is significantly more effective when some degree of remote or hybrid work is present.

      The image contains a screenshot of a graph on how hybrid work models in IT bolster effectiveness.

      n=518

      Remote Work Effectiveness Paradox

      When IT itself works fully onsite, lower effectiveness is reported (6.2). When IT is tasked with supporting fully, 100% remote organizations (as opposed to being fully remote only within IT), lower effectiveness is reported then as well (5.9). A fully remote organization means 100% virtual communication, so the expectations placed on IT increase, as do the stakes of any errors. Of note, hybrid work models yield consistent effectiveness scores when implemented at both the IT and organizational levels.

      IT has risen to the challenge of hybrid

      Despite the challenges initially posed by hybrid and remote organizations, IT has thrived through the pandemic and into this newly common workplace.

      Most organizations have experienced an unchanged or increased level of service requests and incidents. However, for the majority of organizations, service desk support has maintained (58%) or improved (35%). Only 7% of IT organizations report decreased service desk support.

      Is your service desk able to offer the same level of support compared to the pre-pandemic/pre-hybrid work model?

      The image contains a screenshot of a graph that demonstrates service desk levels.

      How has the volume of your service requests/incidents changed?

      The image contains a screenshot of a graph that demonstrates volume of service requests/incidents changed.

      Has hybrid work impacted your customer satisfaction scores?

      The image contains a graph that demonstrates if hybrid work impacted customer satisfaction scores.

      Industry lens: Volume of service requests

      It is interesting to note that service request volumes have evolved similarly across industries, mirroring the remarkable consistency with which hybrid work has been adopted across disparate fields, from construction to government.

      Of note are two industries where the volume of service requests mostly increased: government and media, information, telecom & technology.

      With the global expansion of digital products and services through the pandemic, it’s no surprise to see volumes increase for media, information, telecom & technology. With government, the shift from on premises to rapid and large-scale hybrid or remote work for administrative and knowledge worker roles likely meant additional support from IT to equip employees and end users with the necessary tools to carry out work offsite.

      How has the volume of your service requests/incidents changed?

      The image contains a screenshot of a graph that demonstrates the volume of service requests/incidents changed.

      The transition to hybrid was worth the effort

      Hybrid and remote work have been associated with greater productivity and organizational benefits since before the pandemic. During emergency remote work, doubts arose about whether productivity would be maintained under such extreme circumstances and were quickly dispelled. The promise of remote productivity held up.

      Now, cautiously entering a “new normal,” the question has emerged again. Will long-term hybrid work bring the same benefits?

      The expectations have held up, with hybrid work benefits ranging from reduced facilities costs to greater employee performance.

      Organizational hybrid work may place additional strain on IT,
      but it is clear IT can handle the challenge. And when it does,
      the organizational benefits are tremendous.

      88% of respondents reported increased or consistent Infrastructure & Operations customer satisfaction scores.

      What benefits has the organization achieved as a result of moving to a hybrid work model?

      The image contains a bar graph that demonstrates the benefits of a hybrid work model.

      n=487

      Hybrid has sped up modernization of IT processes and infrastructure

      Of the organizations surveyed, the vast majority reported significant changes to both the process and the technology side of IT operations. Four key processes affected by the move to hybrid were:

      • Incident management
      • Service request support
      • Asset management
      • Change management

      Within Infrastructure & Operations, the area with the greatest degree
      of change was network architecture (reported by 44% of respondents), followed closely by service desk (41%) and recovery workspaces and mitigations (40%).

      63% of respondents reported changes to conference room technology to support hybrid meetings.

      n=496

      IT Infrastructure & Operations changes, upgrades, and modernization

      The image contains a screenshot of a bar graph that demonstrates IT Infrastructure & Operations Changes, Upgrades, and Modernizations.

      What process(es) had the highest degree of change in response to supporting hybrid work?

      The image contains a screenshot of a bar graph that demonstrates the highest degree of change in response to supporting hybrid work.

      Hybrid has permanently changed deployment strategy

      Forty-five percent of respondents reported significant changes to deployment as a result of hybrid work, with an additional 42% reporting minor changes. Only 13% of respondents stated that their deployment processes remained unchanged following the shift to hybrid work.

      With the ever-increasing globalization of business, deployment modernization practices such as the shift to zero touch are no longer optional or a bonus. They are a critical part of business operation that bring efficiency benefits beyond just supporting hybrid work.

      The deployment changes brought on by hybrid span across industries. Even in manufacturing, with the greatest proportion of respondents reporting “no change” to deployment practices (33%), most organizations experienced some degree of change.

      Has a hybrid work model led you to make any changes to your deployment, such as zero touch, to get equipment to end users?

      The image contains a graph to demonstrate if change was possible with hybrid models.

      Industry lens: Deployment changes

      Has a hybrid work model led you to make any changes to your deployment, such as zero touch, to get equipment to end users?

      The image contains a screenshot of a graph that demonstrates deployment changes at an industry lens.

      Hybrid work has accelerated organizational digitization

      Over half of respondents reported significantly decreased reliance on printed copies as a result of hybrid. While these changes were on the horizon for many organizations even before the pandemic, the necessity of keeping business operations running during lockdowns meant that critical resources could be invested in these processes. As a result, digitization has leapt forward.

      This represents an opportunity for businesses to re-evaluate their relationships with printing vendors. Resources spent on printing can be reduced or reallocated, representing additional savings as a result of moving to hybrid. Additionally, many respondents report a willingness – and ability – from vendors to partner with organizations in driving innovation and enabling digitization.

      With respect to changes pertaining to hard copies/printers as a result of your hybrid work model:

      The image contains a screenshot of a bar graph that demonstrates how hybrid work has accelerated organizational digitization.

      Hybrid work necessitates network and communications modernization

      The majority (63%) of respondents reported making significant changes to conference room technology as a result of hybrid work. A significant proportion (30%) report that such changes were not needed, but this includes organizations who had already set up remote communication.

      An important group is the remaining 8% of respondents, who cite budgetary restrictions as a key barrier in making the necessary technology upgrades. Ensure the business case for communication technology appropriately reflects the impact of these upgrades, and reduce the impact of legacy technology where possible:

      • Recognize not just meeting efficiency but also the impact on culture, engagement, morale, and external and internal clients.
      • Connect conference room tech modernization to the overall business goals and work it into the IT strategy.
      • Leverage the scheduling flexibility available in hybrid work arrangements to reduce reliance on inadequate conference technology by scheduling in-person meetings where possible and necessary.

      Have you made changes/upgrades
      to the conference room technology to support hybrid meetings?
      (E.g. Some participants joining remotely, some participants present in a conference room)

      The image contains a screenshot of a graph that demonstrates if network and communications modernization was needed.

      How we can help

      Metrics

      Resources

      Create a Work-From-Anywhere IT Strategy

      Stabilize Infrastructure & Operations During Work-From-Anywhere

      Sustain Work-From-Home in the New Normal

      Establish a Communication & Collaboration Systems Strategy

      Modernize the Network

      Simplify Remote Deployment With Zero-Touch Provisioning

      For a comprehensive list of resources, visit
      Info-Tech’s Hybrid Workplace Research Center

      02 PEOPLE

      IT and Its Employees

      Section 2

      Cultivate the dream team in a newly hybrid world

      In this section:

      1. What Hybrid Means for the IT Workforce
      2. Leadership for IT Hybrid Teams

      Hybrid means permanent change to how IT hires

      Since before the pandemic, the intangibles of having a job that works with your lifestyle have been steadily growing in importance. Considerations like flexible work options, work-life balance, and culture are more important to employees now than they were two years ago, and employers must adapt.

      Salary alone is no longer enough to recruit the best talent, nor is it the key to keeping employees engaged and productive. Hybrid work options are the single biggest concern for IT professionals seeking new employment, just edging out salary. This means employers must not offer just some work flexibility but truly embrace a hybrid environment.

      The image contains a screenshot of several graphs that compare results from 2019 to 2021 on what is important to employees.

      What are you considering when looking at a potential employer?

      The image contains a screenshot of a bar graph that demonstrates what needs to be considered when looking at a potential employer.

      A recession may not significantly impact hybrid work decisions overall

      Declining economic conditions suggest that a talent market shift may be imminent. Moving toward a recession may mean less competition for top talent, but this doesn't mean hybrid will be left behind as a recruitment tactic.

      Just over half of IT organizations surveyed are considering expanding hybrid work or moving to fully remote work even in a recession. Hybrid work is a critical enabler of organizational success when resources are scarce, due to the productivity benefits and cost savings it has demonstrated. Organizations that recognize this and adequately invest in hybrid tools now will have equipped themselves with an invaluable tool for weathering a recession storm, should one come.

      What impact could a potential recession in the coming year have on your decisions around your work location?

      The image contains a screenshot of a graph that demonstrates the potential impact of a recession.

      Hybrid work may help small organizations in a declining economy

      The potential for a recession has a greater impact on the workforce decisions of small organizations. They likely face greater financial pressures than medium and large-sized organizations, pressures that could necessitate halting recruitment efforts or holding firm on current salaries and health benefits.

      A reliance on intangible benefits, like the continuation of hybrid work, may help offset some of negative effects of such freezes, including the risk of lower employee engagement and productivity. Survey respondents indicated that hybrid work options (47%) were slightly more important to them than salary/compensation (46%) and significantly more important than benefits (29%), which could work in favor of small organizations in keeping the critical employees needed to survive an economic downturn.

      Small

      Medium Large
      90% 82% 66%

      Currently considering some form of hiring/salary freeze or cutbacks, if a recession occurs

      NOTES

      n=520

      Small: <101 employees

      Medium: 101-5000 employees

      Large: >5,000 employees

      Hybrid mitigates the main challenge of remote work

      One advantage of hybrid over remote work is the ability to maintain an in-office presence, which provides a failsafe should technology or other barriers stand in the way of effective distance communication. To take full advantage of this, teams should coordinate tasks with location, so that employees get the most out of the unique benefits of working in office and remotely.

      Activities to prioritize for in-office work:

      • Collaboration and brainstorming
      • Team-building activities
      • Introductions and onboarding

      Activities to prioritize for remote work:

      • Individual focus time

      As a leader, what are your greatest concerns with hybrid work?

      The image contains a bar graph that demonstrates concerns about hybrid work as an employer.

      Hybrid necessitates additional effort by managers

      When it comes to leading a hybrid team, there is no ignoring the impact of distance on communication and team cohesion. Among leaders’ top concerns are employee wellbeing and the ability to pick up on signs of demotivation among team members.

      The top two tactics used by managers to mitigate these concerns center on increasing communication:

      • Staying available through instant messaging.
      • Increasing team meetings.

      Tactics most used by highly effective IT departments

      The image contains a screenshot of tactics most used by highly effective IT departments.

      Team success is linked to the number of tools at the manager’s disposal

      The most effective hybrid team management tools focus on overcoming the greatest obstacle introduced by remote work: barriers to communication and connection.

      The most effective IT organizations use a variety of tactics. For managers looking to improve hybrid team effectiveness, the critical factor is less the tactic used and more the ability to adapt their approach to their team’s needs and incorporate team feedback. As such, IT effectiveness is linked to the total number of tactics used by managers.

      IT department effectiveness

      The image contains a screenshot of a graph that demonstrates IT department effectiveness.

      Autonomy is key to hybrid team success

      Not all hybrid work models are created equal. IT leaders working with hybrid teams have many decisions to make, from how many days will be spent in and out of office to how much control employees get over which days they work remotely.

      Employee and manager preferences are largely aligned regarding the number of days spent working remotely or onsite: Two to three days in office is the most selected option for both groups, although overall manager preferences lean slightly toward more time spent in office.

      Comparison of leader and employee preference for days in-office

      The image contains a screenshot of a graph that compares leader and employee preference for days in-office.

      Do employees have a choice in the days they work in office/offsite?

      The image contains a screenshot of a graph that demonstrates if employees have a choice in the days they work in office or offsite.

      For most organizations, employees get a choice of which days they spend working remotely. This autonomy can range from complete freedom to a choice between several pre-approved days depending on team scheduling needs.

      Work is still needed to increase autonomy in hybrid teams

      Organizations’ success in establishing hybrid team autonomy varies greatly post pandemic. Responses are roughly equally split between staff feeling more, less, or the same level of autonomy as before the pandemic. Evaluated in the context of most organizations continuing a hybrid approach, this leads to the conclusion that not all hybrid implementations are being conducted equally effectively when it comes to employee empowerment.

      As an employee, how much control do you have over the decisions related to where, when, and how you work currently?

      The image contains a screenshot of a graph that demonstrates autonomy in hybrid teams.

      Connectedness in hybrid teams lags behind

      A strong case can be made for fostering autonomy and empowerment on hybrid teams. Employees who report lower levels of control than before the pandemic also report lower engagement indicators, such as trust in senior leadership, motivation, and intention to stay with the organization. On the other hand, employees experiencing increased levels of control report gains in these areas.

      The only exception to these gains is the sense of team connectedness, which employees experiencing more control report as lower than before the pandemic. A greater sense of connectedness among employees reporting decreased control may be related to more mandatory in-office time or a sense of connection over shared team-level disengagement.

      These findings reinforce the need for hybrid teams to invest in team building and communication practices and confirm that significant benefits are to be had when a sense of autonomy can be successfully instilled.

      Employees who experience less control than before the pandemic report lowered engagement indicators ... except sense of connectedness

      The image contains a screenshot of a graph that demonstrates less control, means lowered engagement.

      Employees who experience more control than before the pandemic report increased engagement indicators ... except sense of connectedness

      The image contains a screenshot of a graph that demonstrates more control, means increased engagement.

      Case study: Hybrid work at Microsoft Canada

      The Power of Intentionality

      When the pandemic hit, technology was not in question. Flexible work options had been available and widely used, and the technology to support them was in place.

      The leadership team turned their focus to ensuring their culture survived and thrived. They developed a laser-focused approach for engaging their employees by giving their leaders tools to hold conversations. The dialogue was ongoing to allow the organization to adapt to the fast pace of changing conditions.

      Every tactic, plan, and communication started with the question, “What outcome are we striving for?”

      With a clear outcome, tools were created and leaders supported to drive the desired outcome.

      “We knew we had the technology in place. Our concern was around maintaining our strong culture and ensuring continued engagement and connection with our employees.”

      Lisa Gibson, Chief of Staff, Microsoft Canada

      How we can help

      Metrics

      Resources

      Webinar: Effectively Manage Remote Teams

      Build a Better Manager: Manage Your People

      Info-Tech Leadership Training

      Adapt Your Onboarding Process to a Virtual Environment

      Virtual Meeting Primer

      For a comprehensive list of resources, visit
      Info-Tech’s Hybrid Workplace Research Center

      Recommendations

      The last two years have been a great experiment, but it’s not over.

      BE INTENTIONAL

      • Build a team charter on how and when to communicate.
      • Create necessary tools/templates.

      INVOLVE EMPLOYEES

      • Conduct surveys and focus groups.
        Have conversations to understand sentiment.

      ALLOW CHOICE

      • Provide freedom for employees to have some level of choice in hybrid arrangements.

      BE TRANSPARENT

      • Disclose the rationale.
      • Share criteria and decision making.

      Info-Tech Insight

      Hybrid and remote teams require more attention, connection, and leadership from managers. The shift from doing the day-to-day to effectively leading is critical for the success of nontraditional work models. As hybrid and remote work become engrained in society, organizations must ensure that the concept of the “working manager” is as obsolete as the rotary telephone.

      Bibliography

      “8 Unexpected Benefits of Online Learning for Development.” Center for Creative Leadership (CCL), 14 Oct. 2020. Accessed 5 Nov. 2021.
      “2021 Global Workplace Report.” NTT, 2021. Accessed 6 July 2022.
      “Advantages of Online Learning for Leadership Development: What Our Research Says.” CCL, 8 Dec. 2020. 5 Nov. 2021.
      “Annual Work Trend Index Report – Great Expectations: Making Hybrid Work Work.” Microsoft WorkLab, 2022. Accessed 6 July 2022.
      Aten, Jason. “Google’s Employees Return to the Office Today. This Former Exec Says Hybrid Work Won’t Last.” Inc.Com, 4 April 2022. Web.
      Bariso, Justin. “Google Spent 2 Years Researching What Makes a Great Remote Team. It Came Up With These 3 Things.” Inc.Com, 8 April 2019. Web.
      Berger, Chloe. “What Is ‘Hybrid Guilt’? Going to Office Part-Time May Be Worst Option.” Fortune, 22 Aug. 2022. Web.
      Brodkin, Jon. “After Remote-Work Ultimatum, Musk Reveals Plan to Cut 10% of Tesla Jobs.” Ars Technica, 3 June 2022. Web.
      Brown, Brené, host. “Brené with Scott Sonenshein on Why We’ll Never Be the Same Again (and Why It’s Time to Talk About It).” Dare to Lead with Brené Brown, 11 April 2022. Brené Brown, https://brenebrown.com/podcast/why-well-never-be-the-same-again-and-why-its-time-to-talk-about-it/.
      Burgess, Mark. “Most Asset Managers Operating Under Hybrid Work Model: Survey.” Advisor’s Edge, 13 Sept. 2022. Web.
      Caminiti, Susan. “Workers Want Hybrid but Say It’s Exhausting Them. Here’s How Companies Can Fix That.” CNBC, 8 Feb. 2022. Web.
      Capossela, Chris. “The next Chapter of Our Hybrid Workplace: Update on Our Washington State Work Sites.” The Official Microsoft Blog, 14 Feb. 2022. Web.
      Carrigan, John. “Meta Embraces ‘Work From Anywhere’ Ahead of Return to Office.” Human Resources Director, 25 March 2022. Web.
      Chaturvedi, H., and Ajoy Kumar Dey. The New Normal: Reinventing Professional Life and Familial Bonding in the Post COVID 19 Era. Bloomsbury Publishing, 2021.
      Commonwealth of Massachusetts. “Alternative Work Options.” Mass.Gov, n.d. Accessed 17 Sept. 2022.
      Commonwealth of Massachusetts. “Hybrid Work for Commonwealth Employees.” Mass.Gov, n.d. Accessed 17 Sept. 2022.
      “COVID-19 and the Future of Business.” IBM, 21 Sept. 2020. Web.
      Daniel, Will. “The Layoffs at Tesla Show That White-Collar Workers Are Screwed, Hedge Funder Famous from ‘The Big Short’ Predicts.” Fortune, 29 June 2022. Web.
      D’Auria, Gemma, and Aaron De Smet. “Leadership in a Crisis: Responding to Coronavirus.” McKinsey, 16 March 2020. Web.
      Dave, Paresh. “Google Mandates Workers Back to Silicon Valley, Other Offices from April 4.” Reuters, 3 March. 2022. Web.
      Delaney, Kevin. “What We Know Now About the Business Impact of Hybrid Work.” Time, 6 Sept. 2022. Web.
      Dobson, Sarah. “Legal Considerations for Hybrid Work.” Canadian HR Reporter, 15 Sept. 2022. Web.
      Dondo, Jean. “Hybrid Work Is the Way for More Than a Quarter of Canadian Investment Firms.” Wealth Professional, 14 Sept. 2022. Web.
      Elias, Jennifer. “Twitter to Reopen Offices March 15, Though Remote Work Remains an Option.” CNBC, 3 March 2022. Web.
      Esade Business & Law School. “Leadership After Covid-19: Learning To Navigate The Unknown Unknowns.” Forbes, 30 March 2021. Web.
      “Famous Companies Without Offices.” The Hoxton Mix, 19 Oct. 2021. Web.
      Gerdeman, Dina. “COVID Killed the Traditional Workplace. What Should Companies Do Now?” HBS Working Knowledge, 8 March 2021. Web.
      Gleason, Mike. “Apple’s Hybrid Work Plans Draw Worker Pushback.” SearchUnifiedCommunications, TechTarget, 24 Aug. 2022. Web.
      Gleeson, Brent. “13 Tips For Leading And Managing Remote Teams.” Forbes, 26 Aug. 2020. Web.
      Gratton, Lynda. “How to Do Hybrid Right.” Harvard Business Review, 1 May 2021. Web.
      “Guide: Understand team effectiveness.” re:Work, Google, n.d. Accessed 5 Nov. 2021.
      Hardy, Karen. “Your Business Has Decided on Hybrid Work… Now What?” CIO, 12 Sept. 2022. Web.
      Hirsch, Arlene S. “How to Boost Employee Performance in a Hybrid Work Environment.” SHRM, 6 Sept. 2022. Web.
      “How to Get Hybrid Work Right.” CBRE Canada, 14 June 2022. Web.
      “Hybrid Work: When Freedom Benefits from Rules.” Audi, 12 Sept. 2022. Accessed 18 Sept. 2022.
      “Hybrid Workplace | Global Culture Report.” O.C. Tanner, 2022, Web.
      “Intel Is Hiring for Various Roles with Temporary Remote Work Benefits.” SightsIn Plus, 11 June 2022. Web.
      Iyer, Viswanathan. “Council Post: Hybrid Work: Beyond The Point Of No Return.” Forbes, 14 Sept. 2022. Web.
      Johnson, Ricardo. “Securing Hybrid Work All Starts with Zero-Trust.” SC Media, 29 Aug. 2022. Web.
      Jones, Jada. “The Rules of Work Are Changing, and Hybrid Work Is Winning.” ZDNET, 1 Sept. 2022. Web.
      Kowitt, Beth. “Inside Google’s Push to Nail Hybrid Work and Bring Its 165,000-Person Workforce Back to the Office Part-Time.” Fortune, 17 May 2022. Web.
      Kumra, Gautam, and Diaan-Yi Lin. “The Future of (Hybrid) Work.” McKinsey, 2 Sept. 2022. Web.
      Lagowska, Urszula, et al. “Leadership under Crises: A Research Agenda for the Post-COVID-19 Era.” Brazilian Administration Review, vol. 17, no. 2, Aug. 2020. Web.
      Larson, Barbara Z., et al. “A Guide to Managing Your (Newly) Remote Workers.” Harvard Business Review, 18 March 2020. Web.
      “Leadership During COVID-19: Resources for Times of Uncertainty.” CCL, n.d. Accessed 5 Nov. 2021.
      “Managing Remote Employees: How to Lead From a Distance.” CCL, 7 April 2020. Accessed 5 Nov. 2021.
      “Managing Remote Teams.” Know Your Team, n.d. Web. Accessed 5 Nov. 2021.
      Mayhem, Julian. “Virtual Leadership - Essential Skills for Managing Remote Teams.” VirtualSpeech, 4 Nov. 2020. Web.
      McKendrick, Joe. “Keeping Hybrid Workers In Sync, Digitally And In-Person.” Forbes, 22 Aug. 2022. Web.
      McKenna, Karissa, et al. “Webinar: Build Leadership Skills for the New World of Work.” CCL, 15 June 2020. Accessed 5 Nov. 2021.
      Mearian, Lucas. “Microsoft Edges Back to ‘Normal’ with Workplace Reopening Plan.” Computerworld, 14 Feb. 2022. Web.
      “Meta Careers.” Meta, n.d. Accessed 17 Sept. 2022.
      Miller, Mark. “5 Tips to Make Your Hybrid Work Model More Effective.” Entrepreneur, 25 Aug. 2022. Web.
      Nica, Irina. “How to Manage a Remote Team: 14 Effective Tips for Your Business.” Business 2 Community, 8 July 2021. Web.
      O’Halloran, Joe. “Organisations Struggle to Support IT in a Hybrid Work Model.” ComputerWeekly.com, 17 June 2022. Web.
      Ong, Ivan. “Council Post: Why Hybrid Work Is The Way To Go.” Forbes, 12 Sept. 2022. Web.
      Osborne, Charlie. “The End of Fully Remote Work? Google Begins Shift to the Hybrid Office.” ZDNet. 3 March 2022. Web.
      Pazzanese, Christina. “Back to Office? Stay Remote? Go Hybrid?” Harvard Gazette, 24 Aug. 2022. Web.
      “PinFlex.” Pinterest Careers, n.d. Accessed 17 Sept. 2022.
      Rand, Ben. “Does Hybrid Work Actually Work? Insights from 30,000 Emails.” Harvard Business School – Working Knowledge, 6 Sept. 2022. Web.
      “Remote Locations, Working with Flexibility.” Amazon.jobs, n.d. Accessed 17 Sept. 2022.
      Renjen, Punit. “The Heart of Resilient Leadership: Responding to COVID-19.” Deloitte Insights, 16 March 2020. Web.
      Shih, Clara. “Keeping Hybrid Employees Engaged.” Harvard Business Review, 11 Aug. 2022. Web.
      Singerman, Michelle. “Is the Hybrid Work Model Working? CPAs Spill the Beans.” Chartered Professional Accountants Canada, 24 Aug. 2022. Web.
      Stern, Stefan. “Hybrid Working: Why the Office-Home Balance Is Still a Challenge.” Financial Times, 4 Sept. 2022.
      Subramaniam, Vanmala, et al. “Ready to Go Back to the Office? Employers and Workers Are Divided over the Fate of Remote Work.” The Globe and Mail, 1 Sept. 2022. Web.
      Tong, Goh Chiew. “Inflation and Hybrid Work ‘skyrocketed’ Demand for Flexible Workspace, WeWork Says.” CNBC, 6 Sept. 2022. Web.
      Tsipursky, Gleb. “Commentary: The Psychology behind Why Some Leaders Are Resisting a Hybrid Work Model.” Fortune, 8 June 2021. Web.
      Turner, Jack. “Tesla Doubles Down on Remote Working Ban, Tracks Office Attendance.” Tech.Co, 3 July 2022. Web.
      “Virtual Leadership Styles for Remote Businesses.” Maryville Online, 4 Feb. 2021. Web.
      “Webinar: How Leaders Can Build Organizational Resilience.” CCL, 15 June 2020. Accessed 5 Nov. 2021.
      “Why GitLab Uses the Term All-Remote to Describe Its 100% Remote Workforce.” GitLab, 2022. Accessed 17 Sept. 2022.
      Wigert, Ben, and Sangeeta Agrawal. “Returning to the Office: The Current, Preferred and Future State of Remote Work.” Gallup, 31 Aug. 2022. Web.
      Wingard, Jason. “Elon Musk’s Big Bet Against Remote Work: Will Tesla Win?” Forbes, 4 June 2022. Web.

      Identify and Build the Data & Analytics Skills Your Organization Needs

      • Buy Link or Shortcode: {j2store}301|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management

      The rapid technological evolution in platforms, processes, and applications is leading to gaps in the skills needed to manage and use data. Some common obstacles that could prevent you from identifying and building the data & analytics skills your organization needs include:

      • Lack of resources and knowledge to secure professionals with the right mix of D&A skills and right level of experience/skills
      • Lack of well-formulated and robust data strategy
      • Underestimation of the value of soft skills

      Our Advice

      Critical Insight

      Skill deficiency is frequently stated as a roadblock to realizing corporate goals for data & analytics. Soft skills and technical skills are complementary, and data & analytics teams need a combination of both to perform effectively. Identify the essential skills and the gap with current skills that fit your organization’s data strategy to ensure the right skills are available at the right time and minimize pertinent risks.

      Impact and Result

      Follow Info-Tech's advice on the roles and skills needed to support your data & analytics strategic growth objectives and how to execute an actionable plan:

      • Define the skills required for each essential data & analytics role.
      • Identify the roles and skills gaps in alignment with your current data strategy.
      • Establish an action plan to close the gaps and reduce risks.

      Identify and Build the Data & Analytics Skills Your Organization Needs Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and Build the Data & Analytics Skills Your Organization Needs Deck – Use this research to assist you in identifying and building roles and skills that are aligned with the organization’s data strategy.

      To generate business value from data, data leaders must first understand what skills are required to achieve these goals, identify the current skill gaps, and then develop skills development programs to enhance the relevant skills. Use Info-Tech's approach to identify and fill skill gaps to ensure you have the right skills at the right time.

      • Identify and Build the Data & Analytics Skills Your Organization Needs Storyboard

      2. Data & Analytics Skills Assessment and Planning Tool – Use this tool to help you identify the current and required level of competency for data & analytics skills, analyze gaps, and create an actionable plan.

      Start with skills and roles identified as the highest priority through a high-level maturity assessment. From there, use this tool to determine whether the organization’s data & analytics team has the key role, the right combination of skill sets, and the right level competency for each skill. Create an actionable plan to develop skills and fill gaps.

      • Data & Analytics Skills Assessment and Planning Tool
      [infographic]

      Further reading

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Blending soft skills with deep technical expertise is essential for building successful data & analytics teams.

      Analyst Perspective

      Blending soft skills with deep technical expertise is essential for building successful data & analytics teams.

      In today's changing environment, data & analytics (D&A) teams have become an essential component, and it is critical for organizations to understand the skill and talent makeup of their D&A workforce. Chief data & analytics officers (CDAOs) or other equivalent data leaders can train current data employees or hire proven talent and quickly address skills gaps.

      While developing technical skills is critical, soft skills are often left underdeveloped, yet lack of such skills is most likely why the data team would face difficulty moving beyond managing technology and into delivering business value.

      Follow Info-Tech's methodology to identify and address skills gaps in today's data workplace. Align D&A skills with your organization's data strategy to ensure that you always have the right skills at the right time.

      Ruyi Sun
      Research Specialist,
      Data & Analytics, and Enterprise Architecture
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      The rapid technological evolution in platforms, processes, and applications is leading to gaps in the skills needed to manage and use data. Some critical challenges organizations with skills deficiencies might face include:

      • Time loss due to delayed progress and reworking of initiatives
      • Poor implementation quality and low productivity
      • Reduced credibility of data leader and data initiatives

      Common Obstacles

      Some common obstacles that could prevent you from identifying and building the data and analytics (D&A) skills your organization needs are:

      • Lack of resources and knowledge to secure professionals with the right mixed D&A skills and the right experience/skill level
      • Lack of well-formulated and robust data strategy
      • Neglecting the value of soft skills and placing all your attention on technical skills

      Info-Tech's Approach

      Follow Info-Tech's guidance on the roles and skills required to support your D&A strategic growth objectives and how to execute an actionable plan:

      • Define skills required for each essential data and analytics role
      • Identify roles and skills gap in alignment with your current data strategy
      • Establish action plan to close the gaps and reduce risks

      Info-Tech Insight

      Skills gaps are a frequently named obstacle to realizing corporate goals for D&A. Soft skills and technical skills are complementary, and a D&A team needs both to perform effectively. Identify the essential skills and the gap with current skills required by your organization's data strategy to ensure the right skill is available at the right time and to minimize applicable risks.

      The rapidly changing environment is impacting the nature of work

      Scarcity of data & analytics (D&A) skills

      • Data is one of the most valuable organizational assets, and regardless of your industry, data remains the key to informed decision making. More than 75% of businesses are looking to adopt technologies like big data, cloud computing, and artificial intelligence (AI) in the next five years (World Economic Forum, 2023). As organizations pivot in response to industry disruptions and technological advancements, the nature of work is changing, and the demand for data expertise has grown.
      • Despite an increasing need for data expertise, organizations still have trouble securing D&A roles due to inadequate upskilling programs, limited understanding of the skills required, and more (EY, 2022). Notably, scarce D&A skills have been critical. More workers will need at least a base level of D&A skills to adequately perform their jobs.

      Stock image of a data storage center.

      Organizations struggle to remain competitive when skills gaps aren't addressed

      Organizations identify skills gaps as the key barriers preventing industry transformation:

      60% of organizations identify skills gaps as the key barriers preventing business transformation (World Economic Forum, 2023)

      43% of respondents agree the business area with the greatest need to address potential skills gaps is data analytics (McKinsey & Company, 2020)

      Most organizations are not ready to address potential role disruptions and close skills gaps:

      87% of surveyed companies say they currently experience skills gaps or expect them within a few years (McKinsey & Company, 2020)

      28% say their organizations make effective decisions on how to close skills gaps (McKinsey & Company, 2020)

      Neglecting soft skills development impedes CDOs/CDAOs from delivering value

      According to BearingPoint's CDO survey, cultural challenges and limited data literacy are the main roadblocks to a CDO's success. To drill further into the problem and understand the root causes of the two main challenges, conduct a root cause analysis (RCA) using the Five Whys technique.

      Bar Chart of 'Major Roadblocks to the Success of a CDO' with 'Limited data literacy' at the top.
      (Source: BearingPoint, 2020)

      Five Whys RCA

      Problem: Poor data literacy is the top challenge CDOs face when increasing the value of D&A. Why?

      • People that lack data literacy find it difficult to embrace and trust the organization's data insights. Why?
      • Data workers and the business team don't speak the same language. Why?
      • No shared data definition or knowledge is established. Over-extensive data facts do not drive business outcomes. Why?
      • Leaders fail to understand that data literacy is more than technical training, it is about encompassing all aspects of business, IT, and data. Why?
      • A lack of leadership skills prevents leaders from recognizing these connections and the data team needing to develop soft skills.

      Problem: Cultural challenge is one of the biggest obstacles to a CDO's success. Why?

      • Decisions are made from gut instinct instead of data-driven insights, thus affecting business performance. Why?
      • People within the organization do not believe that data drives operational excellence, so they resist change. Why?
      • Companies overestimate the organization's level of data literacy and data maturity. Why?
      • A lack of strategies in change management, continuous improvement & data literacy for data initiatives. Why?
      • A lack of expertise/leaders possessing these relevant soft skills (e.g. change management, etc.).

      As organizations strive to become more data-driven, most conversations around D&A emphasize hard skills. Soft skills like leadership and change management are equally crucial, and deficits there could be the root cause of the data team's inability to demonstrate improved business performance.

      Data cannot be fully leveraged without a cohesive data strategy

      Business strategy and data strategy are no longer separate entities.

      • For any chief data & analytics officer (CDAO) or equivalent data leader, a robust and comprehensive data strategy is the number one tool for generating measurable business value from data. Data leaders should understand what skills are required to achieve these goals, consider the current skills gap, and build development programs to help employees improve those skills.
      • Begin your skills development programs by ensuring you have a data strategy plan prepared. A data strategy should never be formulated independently from the business. Organizations with high data maturity will align such efforts to the needs of the business, making data a major part of the business strategy to achieve data centricity.
      • Refer to Info-Tech's Build a Robust and Comprehensive Data Strategy blueprint to ensure data can be leveraged as a strategic asset of the organization.

      Diagram of 'Data Strategy Maturity' with two arrangements of 'Data Strategy' and 'Business Strategy'. One is 'Aligned', the other is 'Data Centric.'

      Info-Tech Insight

      The process of achieving data centricity requires alignment between the data and business teams, and that requires soft skills.

      Follow Info-Tech's methodology to identify the roles and skills needed to execute a data strategy

      1. Define Key Roles and Skills

        Digital Leadership Skills, Soft Skills, Technical Skills
        Key Output
        • Defined essential competencies, responsibilities for some common data roles
      2. Uncover the Skills Gap

        Data Strategy Alignment, High-Level Data Maturity Assessment, Skills Gap Analysis
        Key Output
        • Data roles and skills aligned with your current data strategy
        • Identified current and target state of data skill sets
      3. Build an Actionable Plan

        Initiative Priority, Skills Growth Feasibility, Hiring Feasibility
        Key Output
        • Identified action plan to address the risk of data skills deficiency

      Info-Tech Insight

      Skills gaps are a frequently named obstacle to realizing corporate goals for D&A. Soft skills and technical skills are complementary, and a D&A team needs both to perform effectively. Identify the essential skills and the gap with current skills that fit your organization's data strategy to ensure the right skill is available at the right time and to minimize applicable risks.

      Research benefits

      Member benefits

      • Reduce time spent defining the target state of skill sets.
      • Gain ability to reassess the feasibility of execution on your data strategy, including resources and timeline.
      • Increase confidence in the data leader's ability to implement a successful skills development program that is aligned with the organization's data strategy, which correlates directly to successful business outcomes.

      Business benefits

      • Reduce time and cost spent hiring key data roles.
      • Increase chance of retaining high-quality data professionals.
      • Reduce time loss for delayed progress and rework of initiatives.
      • Optimize quality of data initiative implementation.
      • Improve data team productivity.

      Insight summary

      Overarching insight

      Skills gaps are a frequently named obstacle to realizing corporate goals for D&A. Soft skills and technical skills are complementary, and a D&A team needs both to perform effectively. Identify the essential skills and the gap with current skills that fit your organization's data strategy to ensure the right skill is available at the right time and to minimize applicable risks.

      Phase 1 insight

      Technological advancements will inevitably require new technical skills, but the most in-demand skills go beyond mastering the newest technologies. Soft skills are essential to data roles as the global workforce navigates the changes of the last few years.

      Phase 2 insight

      Understanding and knowing your organization's data maturity level is a prerequisite to assessing your current skill and determining where you must align in the future.

      Phase 3 insight

      One of the misconceptions that organizations have includes viewing skills development as a one-time effort. This leads to underinvestment in data team skills, risk of falling behind on technological changes, and failure to connect with business partners. Employees must learn to continuously adapt to the changing circumstances of D&A.

      While the program must be agile and dynamic to reflect technological improvements in the development of technical skills, the program should always be anchored in soft skills because data management is fundamentally about interaction, collaboration, and people.

      Tactical insight

      Seeking input and support across your business units can align stakeholders to focus on the right data analytics skills and build a data learning culture.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is four to six calls over the course of two to three months.

      What does a typical GI on this topic look like?

      Phase 1

      Phase 2

      Phase 3

      Call #1: Understand common data & analytics roles and skills, and your specific objectives and challenges. Call #2: Assess the current data maturity level and competency of skills set. Identify the skills gap. Call #3: Identify the relationship between current initiatives and capabilities. Initialize the corresponding roadmap for the data skills development program.

      Call #4: (follow-up call) Touching base to follow through and ensure that benefits have received.

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Phase 1

      Define Key Roles and Skills

      Define Key Roles and Skills Uncover the Skills Gap Build an Actionable Plan

      This phase will walk you through the following activities:

      • 1.1 Review D&A Skill & Role List in Data & Analytics Assessment and Planning Tool

      This phase involves the following participants:

      • Data leads

      Key resources for your data strategy: People

      Having the right role is a key component for executing effective data strategy.

      D&A Common Roles

      • Data Steward
      • Data Custodian
      • Data Owner
      • Data Architect
      • Data Modeler
      • Artificial Intelligence (AI) and Machine Learning (ML) Specialist
      • Database Administrator
      • Data Quality Analyst
      • Security Architect
      • Information Architect
      • System Architect
      • MDM Administrator
      • Data Scientist
      • Data Engineer
      • Data Pipeline Developer
      • Data Integration Architect
      • Business Intelligence Architect
      • Business Intelligence Analyst
      • ML Validator

      AI and ML Specialist is projected to be the fastest-growing occupation in the next five years (World Economic Forum, 2023).

      While tech roles take an average of 62 days to fill, hiring a senior data scientist takes 70.5 days (Workable, 2019). Start your recruitment cycle early for this demand.

      D&A Leader Roles

      • Chief Data Officer (CDO)/Chief Data & Analytics Officer (CDAO)
      • Data Governance Lead
      • Data Management Lead
      • Information Security Lead
      • Data Quality Lead
      • Data Product Manager
      • Master Data Manager
      • Content and Record Manager
      • Data Literacy Manager

      CDOs act as impactful change agents ensuring that the organization's data management disciplines are running effectively and meeting the business' data needs. Only 12.0% of the surveyed organizations reported having a CDO as of 2012. By 2022, this percentage had increased to 73.7% (NewVantage Partners, 2022).

      Sixty-five percent of respondents said lack of data literacy is the top challenge CDOs face today (BearingPoint, 2020). It has become imperative for companies to consider building a data literacy program which will require a dedicated data literacy team.

      Key resources for your data strategy: Skill sets

      Distinguish between the three skills categories.

      • Soft Skills

        Soft skills are described as power skills regarding how you work, such as teamwork, communication, and critical thinking.
      • Digital Leadership Skills

        Not everyone working in the D&A field is expected to perform advanced analytical tasks. To thrive in increasingly data-rich environments, however, every data worker, including leaders, requires a basic technological understanding and skill sets such as AI, data literacy, and data ethics. These are digital leadership skills.
      • Technical Skills

        Technical skills are the practical skills required to complete a specific task. For example, data scientists and data engineers require programming skills to handle and manage vast amounts of data.

      Info-Tech Insight

      Technological advancements will inevitably require new technical skills, but the most in-demand skills go beyond mastering the newest technologies. Soft skills are essential to data roles as the global workforce navigates the changes of the last few years.

      Soft skills aren't just nice to have

      They're a top asset in today's data workplace.

      Leadership

      • Data leaders with strong leadership abilities can influence the organization's strategic execution and direction, support data initiatives, and foster data cultures. Organizations that build and develop leadership potential are 4.2 times more likely to financially outperform those that do not (Udemy, 2022).

      Business Acumen

      • The process of deriving conclusions and insights from data is ultimately utilized to improve business decisions and solve business problems. Possessing business acumen helps provide the business context and perspectives for work within data analytics fields.

      Critical Thinking

      • Critical thinking allows data leaders at every level to objectively assess a problem before making judgment, consider all perspectives and opinions, and be able to make decisions knowing the ultimate impact on results.

      Analytical Thinking

      • Analytical thinking remains the most important skill for workers in 2023 (World Economic Forum, 2023). Data analytics expertise relies heavily on analytical thinking, which is the process of breaking information into basic principles to analyze and understand the logic and concepts.

      Design Thinking & Empathy

      • Design thinking skills help D&A professionals understand and prioritize the end-user experience to better inform results and assist the decision-making process. Organizations with high proficiency in design thinking are twice as likely to be high performing (McLean & Company, 2022).

      Learning Focused

      • The business and data analytics fields continue to evolve rapidly, and the skills, especially technical skills, must keep pace. Learning-focused D&A professionals continuously learn, expanding their knowledge and enhancing their techniques.

      Change Management

      • Change management is essential, especially for data leaders who act as change agents developing and enabling processes and who assist others with adjusting to changes with cultural and procedural factors. Organizations with high change management proficiency are 2.2 times more likely to be high performing (McLean & Company, 2022).

      Resilience

      • Being motivated and adaptable is essential when facing challenges and high-pressure situations. Organizations highly proficient in resilience are 1.8 times more likely to be high performing (McLean & Company, 2022).

      Managing Risk & Governance Mindset

      • Risk management ability is not limited to highly regulated institutions. All data workers must understand risks from the larger organizational perspective and have a holistic governance mindset while achieving their individual goals and making decisions.

      Continuous Improvement

      • Continuously collecting feedback and reflecting on it is the foundation of continuous improvement. To uncover and track the lessons learned and treat them as opportunities, data workers must be able to discover patterns and connections.

      Teamwork & Collaboration

      • Value delivery in a data-centric environment is a team effort, requiring collaboration across the business, IT, and data teams. D&A experts with strong collaborative abilities can successfully work with other teams to achieve shared objectives.

      Communication & Active Listening

      • This includes communicating with relevant stakeholders about timelines and expectations of data projects and associated technology and challenges, paying attention to data consumers, understanding their requirements and needs, and other areas of interest to the organization.

      Technical skills for everyday excellence

      Digital Leadership Skills

      • Technological Literacy
      • Data and AI Literacy
      • Cloud Computing Literacy
      • Data Ethics
      • Data Translation

      Data & Analytics Technical Competencies

      • Data Mining
      • Programming Languages (Python, SQL, R, etc.)
      • Data Analysis and Statistics
      • Computational and Algorithmic Thinking
      • AI/ML Skills (Deep Learning, Computer Vision, Natural Language Processing, etc.)
      • Data Visualization and Storytelling
      • Data Profiling
      • Data Modeling & Design
      • Data Pipeline (ETL/ELT) Design & Management
      • Database Design & Management
      • Data Warehouse/Data Lake Design & Management

      1.1 Review D&A Skill & Role List in the Data & Analytics Assessment and Planning Tool

      Sample of Tab 2 in the Data & Analytics Assessment and Planning Tool.

      Tab 2. Skill & Role List

      Objective: Review the library of skills and roles and customize them as needed to align with your organization's language and specific needs.

      Download the Data & Analytics Assessment and Planning Tool

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Phase 2

      Uncover the Skills Gap

      Define Key Roles and Skills Uncover the Skills Gap Build an Actionable Plan

      This phase will walk you through the following activities:

      • 2.1 High-level assessment of your present data management maturity
      • 2.2 Interview business and data leaders to clarify current skills availability
      • 2.3 Use the Data & Analytics Assessment and Planning Tool to Identify your skills gaps

      This phase involves the following participants:

      • Data leads
      • Business leads and subject matter experts (SMEs)
      • Key business stakeholders

      Identify skills gaps across the organization

      Gaps are not just about assigning people to a role, but whether people have the right skill sets to carry out tasks.

      • Now that you have identified the essential skills and roles in the data workplace, move to Phase 2. This phase will help you understand the required level of competency, assess where the organization stands today, and identify gaps to close.
      • Using the Data & Analytics Assessment and Planning Tool, start with areas that are given the highest priority through a high-level maturity assessment. From there, three levels of gaps will be found: whether people are assigned to a particular position, the right combination of D&A skill sets, and the right competency level for each skill.
      • Lack of talent assigned to a position

      • Lack of the right combination of D&A skill sets

      • Lack of appropriate competency level

      Info-Tech Insight

      Understanding your organization's data maturity level is a prerequisite to assessing the skill sets you have today and determining where you need to align in the future.

      2.1 High-level assessment of your present data management maturity

      Identifying and fixing skills gaps takes time, money, and effort. Focus on bridging the gap in high-priority areas.

      Input: Current state capabilities, Use cases (if applicable), Data culture diagnostic survey results (if applicable)
      Output: High-level maturity assessment, Prioritized list of data management focused area
      Materials: Data Management Assessment and Planning Tool (optional), Data & Analytics Assessment and Planning Tool
      Participants: Data leads, Business leads and subject matter experts (SMEs), Key business stakeholders

      Objectives:

      Prioritize these skills and roles based on your current maturity levels and what you intend to accomplish with your data strategy.

      Steps:

      1. (Optional Step) Refer to the Build a Robust and Comprehensive Data Strategy blueprint. You can assess your data maturity level using the following frameworks and methods:
        • Review current data strategy and craft use cases that represent high-value areas that must be addressed for their teams or functions.
        • Use the data culture assessment survey to determine your organization's data maturity level.
      2. (Optional Step) Refer to the Create a Data Management Roadmap blueprint and Data Management Assessment and Planning Tool to dive deep into understanding and assessing capabilities and maturity levels of your organization's data management enablers and understanding your priority areas and specific gaps.
      3. If you have completed Data Management Assessment and Planning Tool, fill out your maturity level scores for each of the data management practices within it - Tab 3 (Current-State Assessment). Skip Tab 4 (High-Level Maturity Assessment).
      4. If you have not yet completed Data Management Assessment and Planning Tool, skip Tab 3 and continue with Tab 4. Assign values 1 to 3 for each capability and enabler.
      5. You can examine your current-state data maturity from a high level in terms of low/mid/high maturity using either Tabs 3 or 4.
      6. Suggested focus areas along the data journey:
        • Low Maturity = Data Strategy, Data Governance, Data Architecture
        • Mid Maturity = Data Literacy, Information Management, BI and Reporting, Data Operations Management, Data Quality Management, Data Security/Risk Management
        • High Maturity = MDM, Data Integration, Data Product and Services, Advanced Analytics (ML & AI Management).

      Download the Data & Analytics Assessment and Planning Tool

      2.2 Interview business and data leaders to clarify current skills availability

      1-2 hours per interview

      Input: Sample questions targeting the activities, challenges, and opportunities of each unit
      Output: Identified skills availability
      Materials: Whiteboard/Flip charts, Data & Analytics Assessment and Planning Tool
      Participants: Data leads, Business leads and subject matter experts (SMEs), Key business stakeholders

      Instruction:

      1. Conduct a deep-dive interview with each key data initiative stakeholder (data owners, SMEs, and relevant IT/Business department leads) who can provide insights on the skill sets of their team members, soliciting feedback from business and data leaders about skills and observations of employees as they perform their daily tasks.
      2. Populate a current level of competency for each skill in the Data & Analytics Assessment and Planning Tool in Tabs 5 and 6. Having determined your data maturity level, start with the prioritized data management components (e.g. if your organization sits at low data maturity level, start with identifying relevant positions and skills under data governance, data architecture, and data architecture elements).
      3. More detailed instructions on how to utilize the workbook are at the next activity.

      Key interview questions that will help you :

      1. Do you have personnel assigned to the role? What are their primary activities? Do the personnel possess the soft and technical skills noted in the workbook? Are you satisfied with their performance? How would you evaluate their degree of competency on a scale of "vital, important, nice to have, or none"? The following aspects should be considered when making the evaluation:
        • Key Performance Indicators (KPIs): Business unit data will show where the organization is challenged and will help identify potential areas for development.
        • Project Management Office: Look at successful and failed projects for trends in team traits and competencies.
        • Performance Reviews: Look for common themes where employees excel or need to improve.
        • Focus Groups: Speak with a cross section of employees to understand their challenges.
      2. What technology is currently used? Are there requirements for new technology to be bought and/or optimized in the future? Will the workforce need to increase their skill level to carry out these activities with the new technology in place?

      Download the Data & Analytics Assessment and Planning Tool

      2.3 Use the Data & Analytics Assessment and Planning Tool to identify skills gaps

      1-3 hours — Not everyone needs the same skill levels.

      Input: Current skills competency, Stakeholder interview results and findings
      Output: Gap identification and analysis
      Materials: Data & Analytics Assessment and Planning Tool
      Participants: Data leads

      Instruction:

      1. Select your organization's data maturity level in terms of Low/Mid/High in cell A6 for both Tab 5 (Soft Skills Assessment) and Tab 6 (Technical Skills Assessment) to reduce irrelevant rows.
      2. Bring together key business stakeholders (data owners, SMEs, and relevant IT custodians) to determine whether the data role exists in the organization. If yes, assign a current-state value from “vital, important, nice to have, or none” for each skill in the assessment tool. Info-Tech has specified the desired/required target state of each skill set.
      3. Once you've assigned the current-state values, the tool will automatically determine whether there is a gap in skill set.

      Download the Data & Analytics Assessment and Planning Tool

      Identify and Build the Data & Analytics Skills Your Organization Needs

      Phase 3

      Build an Actionable Plan

      Define Key Roles and Skills Uncover the Skills Gap Build an Actionable Plan

      This phase will walk you through the following activities:

      • 3.1 Use the Data & Analytics Assessment and Planning Tool to build your actionable roadmap

      This phase involves the following participants:

      • Data leads
      • Business leads and subject matter experts (SMEs)
      • Key business stakeholders

      Determine next steps and decision points

      There are three types of internal skills development strategies

      • There are three types of internal skills development strategies organizations can use to ensure the right people with the right abilities are placed in the right roles: reskill, upskill, and new hire.
      1. Reskill

        Reskilling involves learning new skills for a different or newly defined position.
      2. Upskill

        Upskilling involves building a higher level of competency in skills to improve the worker's performance in their current role.
      3. New hire

        New hire involves hiring workers who have the essential skills to fill the open position.

      Info-Tech Insight

      One of the misconceptions that organizations have includes viewing skills development as a one-time effort. This leads to underinvestment in data team skills, risk of falling behind on technological changes, and failure to connect with business partners. Employees must learn to continuously adapt to the changing circumstances of D&A. While the program must be agile and dynamic to reflect technological improvements in the development of technical skills, the program should always be anchored in soft skills because data management is fundamentally about interaction, collaboration, and people.

      How to determine when to upskill, reskill, or hire to meet your skills needs

      Reskill

      Reskilling often indicates a change in someone's career path, so this decision requires a goal aligned with both individuals and the organization to establish a mutually beneficial situation.

      When making reskilling decisions, organizations should also consider the relevance of the skill for different positions. For example, data administrators and data architects have similar skill sets, so reskilling is appropriate for these employees.

      Upskill

      Upskilling tends to focus more on the soft skills necessary for more advanced positions. A data strategy lead, for example, might require design thinking training, which enables leaders to think from different perspectives.

      Skill growth feasibility must also be considered. Some technical skills, particularly those involving cutting-edge technologies, require continual learning to maintain operational excellence. For example, a data scientist may require AI/ML skills training to incorporate use of modern automation technology.

      New Hire

      For open positions and skills that are too resource-intensive to reskill or upskill, it makes sense to recruit new employees. Consider, however, time and cost feasibility of hiring. Some positions (e.g. senior data scientist) take longer to fill. To minimize risks, coordinate with your HR department and begin recruiting early.

      Data & Analytics skills training

      There are various learning methods that help employees develop priority competencies to achieve reskilling or upskilling.

      Specific training

      The data team can collaborate with the human resources department to plan and develop internal training sessions aimed at specific skill sets.

      This can also be accomplished through external training providers such as DCAM, which provides training courses on data management and analytics topics.

      Formal education program

      Colleges and universities can equip students with data analytics skills through formal education programs such as MBAs and undergraduate or graduate degrees in Data Science, Machine Learning, and other fields.

      Certification

      Investing time and effort to obtain certifications in the data & analytics field allows data workers to develop skills and gain recognition for continuous learning and self-improvement.

      AWS Data Analytics and Tableau Data Scientist Certification are two popular data analytics certifications.

      Online learning from general providers

      Some companies offer online courses in various subjects. Coursera and DataCamp are two examples of popular providers.

      Partner with a vendor

      The organization can partner with a vendor who brings skills and talents that are not yet available within the organization. Employees can benefit from the collaboration process by familiarizing themselves with the project and enhancing their own skills.

      Support from within your business

      The data team can engage with other departments that have previously done skills development programs, such as Finance and Change & Communications, who may have relevant resources to help you improve your business acumen and change management skills.

      Info-Tech Insight

      Seeking input and support across your business units can align stakeholders to focus on the right data analytics skills and build a data learning culture.

      Data & Analytics skills reinforcement

      Don't assume learners will immediately comprehend new knowledge. Use different methods and approaches to reinforce their development.

      Innovation Space

      • Skills development is not a one-time event, but a continuous process during which innovation should be encouraged. A key aspect of being innovative is having a “fail fast” mentality, which means collecting feedback, recognizing when something isn't working, encouraging experimentation, and taking a different approach with the goal of achieving operational excellence.
      • Human-centered design (HCD) also yields innovative outcomes with a people-first focus. When creating skills development programs for various target groups, organizations should integrate a human-centered approach.

      Commercial Lens

      • Exposing people to a commercial way of thinking can add long-term value by educating people to act in the business' best interest and raising awareness of what other business functions contribute. This includes concepts such as project management, return on investment (ROI), budget alignment, etc.

      Checklists/Rubrics

      • Employees should record what they learn so they can take the time to reflect. A checklist is an effective technique for establishing objectives, allowing measurement of skills development and progress.

      Buddy Program

      • A buddy program helps employees gain and reinforce knowledge and skills they have learned through mutual support and information exchange.

      Align HR programs to support skills integration and talent recruitment

      With a clear idea of skills needs and an executable strategy for training and reinforcing of concepts, HR programs and processes can help the data team foster a learning environment and establish a recruitment plan. The links below will direct you to blueprints produced by McLean & Company, a division of Info-Tech Research Group.

      Workforce Planning

      When integrating the skills of the future into workforce planning, determine the best approach for addressing the identified talent gaps – whether to build, buy, or borrow.

      Integrate the future skills identified into the organization's workforce plan.

      Talent Acquisition

      In cases where employee development is not feasible, the organization's talent acquisition strategy must focus more on buying or borrowing talent. This will impact the TA process. For example, sourcing and screening must be updated to reflect new approaches and skills.

      If you have a talent acquisition strategy, assess how to integrate the new roles/skills into recruiting.

      Competencies/Succession Planning

      Review current organizational core competencies to determine if they need to be modified. New skills will help inform critical roles and competencies required in succession talent pools.

      If no competency framework exists, use McLean & Company's Develop a Comprehensive Competency Framework blueprint.

      Compensation

      Evaluate modified and new roles against the organization's compensation structure. Adjust them as necessary. Look at market data to understand compensation for new roles and skills.

      Reassess your base pay structure according to market data for new roles and skills.

      Learning and Development

      L&D plays a huge role in closing the skills gap. Build L&D opportunities to support development of new skills in employees.

      Design an Impactful Employee Development Program to build the skills employees need in the future.

      3.1 Use the Data & Analytics Assessment and Planning Tool to build an actionable plan

      1-3 hours

      Input: Roles and skills required, Key decision points
      Output: Actionable plan
      Materials: Data & Analytics Assessment and Planning Tool
      Participants: Data leads, Business leads and subject matter experts (SMEs), Key business stakeholders

      Instruction:

      1. On Tab 7 (Next Steps & Decision Points), you will find a list of tasks that correspond to roles that where there is a skills gap.
      2. Customize this list of tasks initiatives according to your needs.
      3. The Gantt chart, which will be generated automatically after assigning start and finish dates for each activity, can be used to structure your plan and guarantee that all the main components of skills development are addressed.

      Sample of Tab 7 in the Data & Analytics Assessment and Planning Tool.

      Download the Data & Analytics Assessment and Planning Tool

      Related Info-Tech Research

      Sample of the Create a Data Management Roadmap blueprint.

      Create a Data Management Roadmap

      • This blueprint will help you design a data management practice that will allow your organization to use data as a strategic enabler.

      Stock image of a person looking at data dashboards on a tablet.

      Build a Robust and Comprehensive Data Strategy

      • Put a strategy in place to ensure data is available, accessible, well-integrated, secured, of acceptable quality, and suitably visualized to fuel organization-wide decision making. Start treating data as strategic and corporate asset.

      Sample of the Foster Data-Driven Culture With Data Literacy blueprint.

      Foster Data-Driven Culture With Data Literacy

      • By thoughtfully designing a data literacy training program appropriate to the audience's experience, maturity level, and learning style, organizations build a data-driven and engaged culture that helps them unlock their data's full potential and outperform other organizations.

      Research Authors and Contributors

      Authors:

      Name Position Company
      Ruyi Sun Research Specialist Info-Tech Research Group

      Contributors:

      Name Position Company
      Steve Wills Practice Lead Info-Tech Research Group
      Andrea Malick Advisory Director Info-Tech Research Group
      Annabel Lui Principal Advisory Director Info-Tech Research Group
      Sherwick Min Technical Counselor Info-Tech Research Group

      Bibliography

      2022 Workplace Learning Trends Report.” Udemy, 2022. Accessed 20 June 2023.

      Agrawal, Sapana, et al. “Beyond hiring: How companies are reskilling to address talent gaps.” McKinsey & Company, 12 Feb. 2020. Accessed 20 June 2023.

      Bika, Nikoletta. “Key hiring metrics: Useful benchmarks for tech roles.” Workable, 2019. Accessed 20 June 2023.

      Chroust, Tomas. “Chief Data Officer – Leaders of data-driven enterprises.” BearingPoint, 2020. Accessed 20 June 2023.

      “Data and AI Leadership Executive Survey 2022.” NewVantage Partners, Jan 2022. Accessed 20 June 2023.

      Dondi, Marco, et al. “Defining the skills citizens will need in the future world of work.” McKinsey & Company, June 2021. Accessed 20 June 2023.

      Futschek, Gerald. “Algorithmic Thinking: The Key for Understanding Computer Science.” Lecture Notes in Computer Science, vol. 4226, 2006.

      Howard, William, et al. “2022 HR Trends Report.” McLean & Company, 2022. Accessed 20 June 2023.

      “Future of Jobs Report 2023.” World Economic Forum, May 2023. Accessed 20 June 2023.

      Knight, Michelle. “What is Data Ethics?” Dataversity, 19 May 2021. Accessed 20 June 2023.

      Little, Jim, et al. “The CIO Imperative: Is your technology moving fast enough to realize your ambitions?” EY, 22 Apr. 2022. Accessed 20 June 2023.

      “MDM Roles and Responsibilities.” Profisee, April 2019. Accessed 20 June 2023.

      “Reskilling and Upskilling: A Strategic Response to Changing Skill Demands.” TalentGuard, Oct. 2019. Accessed 20 June 2023.

      Southekal, Prashanth. “The Five C's: Soft Skills That Every Data Analytics Professional Should Have.” Forbes, 17 Oct. 2022. Accessed 20 June 2023.

      Select Software With the Right Satisfaction Drivers in Mind

      • Buy Link or Shortcode: {j2store}606|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Selection & Implementation
      • Parent Category Link: /selection-and-implementation
      • Software selection needs to provide satisfaction. Across the board, satisfaction is easy to achieve in the short term, but long-term satisfaction is much harder to attain. It’s not clear what leads to long-term satisfaction, and it’s even more difficult to determine which software continuously delivers on key satisfaction drivers to support the business.

      Our Advice

      Critical Insight

      • Software satisfaction drops over time. After the initial purchase, the novelty factor of new software begins to wane, and only long-term satisfaction drivers sustain satisfaction after five years.
      • Surface-level satisfaction has immediate effects, but it only provides satisfaction in the short term. Deep satisfaction has a lasting impact that can shape organizational satisfaction and productivity in meaningful ways.
      • Empower IT decision makers with knowledge about what drives satisfaction in the top five and bottom five software vendors in spotlighted categories.

      Impact and Result

      • Reorient discussion around how software is implemented around satisfaction rather than what’s in fashion.
      • Identify software satisfaction drivers that provide deep satisfaction to get the most out of software over the long term.
      • Appreciate the best from the rest and learn which software categories and brands buck the trend of declining satisfaction.

      Select Software With the Right Satisfaction Drivers in Mind Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand what drives user satisfaction

      Gain insight on the various factors that influence software satisfaction.

      • Select Software With the Right Satisfaction Drivers in Mind Storyboard

      2. Learn what provides deep satisfaction

      Reduce the size of your RFPs or skip them entirely to limit time spent watching vendor dog and pony shows.

      3. Appreciate what separates the best from the rest

      Narrow the field to four contenders prior to in-depth comparison and engage in accelerated enterprise architecture oversight.

      [infographic]

      Define Service Desk Metrics That Matter

      • Buy Link or Shortcode: {j2store}491|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Consolidate your metrics and assign context and actions to ones currently tracked.
      • Establish tension metrics to see and tell the whole story.
      • Split your metrics for each stakeholder group. Assign proper cadences for measurements as a first step to building an effective dashboard.

      Our Advice

      Critical Insight

      • Identify the metrics that serve a real purpose and eliminate the rest. Establish a formal review process to ensure metrics are still valid, continue to provide the answers needed, and are at a manageable and usable level.

      Impact and Result

      • Tracking goal- and action-based metrics allows you to make meaningful, data-driven decisions for your service desk. You can establish internal benchmarks to set your own baselines.
      • Predefining the audience and cadence of each metric allows you to construct targeted dashboards to aid your metrics analysis.

      Define Service Desk Metrics That Matter Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define Service Desk Metrics That Matter Storyboard – A deck that shows you how to look beyond benchmarks and rely on internal metrics to drive success.

      Deciding which service desk metrics to track and how to analyze them can be daunting. Use this deck to narrow down your goal-oriented metrics as a starting point and set your own benchmarks.

      • Define Service Desk Metrics That Matter Storyboard

      2. Service Desk Metrics Workbook – A tool to organize your service desk metrics.

      For each metric, consider adding the relevant overall goal, audience, cadence, and action. Use the audience and cadence of the metric to split your tracked metrics into various dashboards. Your final list of metrics and reports can be added to your service desk SOP.

      • Service Desk Metrics Workbook
      [infographic]

      Further reading

      Define Service Desk Metrics That Matter

      Look beyond benchmarks and rely on internal metrics to drive success.

      Analyst Perspective

      Don’t get paralyzed by benchmarks when establishing metrics

      When establishing a suite of metrics to track, it’s tempting to start with the metrics measured by other organizations. Naturally, benchmarking will enter the conversation. While benchmarking is useful, measuring you organization against others with a lack of context will only highlight your failures. Furthermore, benchmarks will highlight the norm or common practice. It does not necessarily highlight best practice.

      Keeping the limitations of benchmarking in mind, establish your own metrics suite with action-based metrics. Define the audience, cadence, and actions for each metric you track and pair them with business goals. Measure only what you need to.

      Slowly improve your metrics process over time and analyze your environment using your own data as your benchmark.

      Benedict Chang

      Research Analyst, Infrastructure & Operations

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Measure the business value provided by the service desk.
      • Consolidate your metrics and assign context and actions to ones currently tracked.
      • Establish tension metrics to see and tell the whole story.
      • Split your metrics for each stakeholder group. Assign proper cadences for measurements as a first step to building an effective dashboard or effective dashboards.

      Common Obstacles

      • Becoming too focused on benchmarks or unidimensional metrics (e.g. cost, first-contact resolution, time to resolve) can lead to misinterpretation of the data and poorly informed actions.
      • Sifting through the many sources of data post hoc can lead to stalling in data analysis or slow reaction times to poor metrics.
      • Dashboards can quickly become cluttered with uninformative metrics, thus reducing the signal-to-noise ratio of meaningful data.

      Info-Tech's Approach

      • Use metrics that drive productive change and improvement. Track only what you need to report on.
      • Ensure each metric aligns with the desired business goal, is action-based, and includes the answers to what, why, how, and who.
      • Establish internal benchmarks by analyzing the trends from your own data to set baselines.
      • Act on the results of your metrics by adjusting targets and measuring success.

      Info-Tech Insight

      Identify the metrics that serve a real purpose and eliminate the rest. Establish a formal review process to ensure metrics are still valid, continue to provide the answers needed, and are at a manageable and usable level.

      Improve your metrics to align IT with strategic business goals

      The right metrics can tell the business how hard IT works and how well they perform.

      • Only 19% of CXOs feel that their organization is effective at measuring the success of IT projects with their current metrics.
      • Implementing the proper metrics can facilitate communication between the business division and IT practice.
      • The proper metrics can help IT know what issues the business has and how the CEO and CIO should tackle them.
      • If the goals above resonate with your organization, our blueprint Take Control of Infrastructure and Operations Metrics will take you through the right steps.

      Current Metrics Suite

      19% Effective

      36% Some Improvement Necessary

      45% Significant Improvement Necessary

      Source: Info-Tech Research Group’s CEO/CIO Alignment Diagnostic, 2019; N=622

      CXOs stress that value is the most critical area for IT to improve in reporting

      • You most likely have to improve your metrics suite by addressing business value.
      • Over 80% of organizations say they need improvement to their business value metrics, with 32% of organizations reporting that significant improvement is needed.
      • Of course, measuring metrics for service desk operations is important, but don’t forget business-oriented metrics such as measuring knowledgebase articles written for shift-left enablement, cost (time and money) of service desk tickets, and overall end-user satisfaction.

      The image shows a bar graph with percentages on the Y-Acis, and the following categories on the X-Axis: Business value metrics; Stakeholder satisfaction reporting; Risk metrics; Technology performance & operating metrics; Cost & Salary metrics; and Ad hoc feedback from executives and staff. Each bar is split into two sections, with the blue section marked a Significant Improvement Necessary, and the purple section labelled Some Improvement necessary. Two sections are highlighted with red circles: Business Value metrics--32% blue; 52% purple; and Technology performance & operating metrics--23% blue and 51% purple.

      Source: Info-Tech Research Group’s CEO/CIO Alignment Diagnostic, 2019; N=622

      Benchmarking used in isolation will not tell the whole story

      Benchmarks can be used as a step in the metrics process

      They can be the first step to reach an end goal, but if benchmarks are observed in isolation, it will only highlight your failures.

      Benchmarking relies on standardized models

      This does not account for all the unique variables that make up an IT organization.

      For example, benchmarks that include cost and revenue may include organizations that prioritize first-call resolution (FCR), but the variables that make up this benchmark model will be quite different within your own organization.

      Info-Tech Insight

      Benchmarks reflect the norm and common practice, not best practice.

      Benchmarks are open to interpretation

      Taking the time to establish proper metrics is often more valuable time spent than going down the benchmark rabbit hole.

      Being above or below the norm is neither a good nor a bad thing.

      Determining what the results mean for you depends on what’s being measured and the unique factors, characteristics, and priorities in your organization.

      If benchmark data is a priority within your IT organization, you may look up organizations like MetricNet, but keep the following in mind:

      Review the collected benchmark data

      See where IT organizations in your industry typically stand in relation to the overall benchmark.

      Assess the gaps

      Large gaps between yourself and the overall benchmark could indicate areas for improvement or celebration. Use the data to focus your analysis, develop deeper self-awareness, and prioritize areas for potential concern.

      Benchmarks are only guidelines

      The benchmark source data may not come from true peers in every sense. Each organization is different, so always explore your unique context when interpreting any findings.

      Rely on internal metrics to measure and improve performance

      Measure internal metrics over time to define goals and drive real improvement

      • Internally measured metrics are more reliable because they provide information about your actual performance over time. This allows for targeted improvements and objective measurements of your milestones.
      • Whether a given metric is the right one for your service desk will depend on several different factors, including:
        • The maturity and capability of your service desk processes
        • The volume of service requests and incidents
        • The complexity of your environment when resolving tickets
        • The degree to which your end users are comfortable with self-service

      Take Info-Tech’s approach to metrics management

      Use metrics that drive productive change and improvement. Track only what you need to report on.

      Ensure each metric aligns with the desired business goal, is action-based, and includes the answers to what, why, how, and who.

      Establish internal benchmarks by analyzing the trends from your own data to set baselines.

      Act on the results of your metrics by adjusting targets and measuring success.

      Define action-based metrics to cut down on analysis paralysis

      Every metric needs to be backed with the following criteria:

      • Defining audience, cadence, goal, and action for each metric allows you to keep your tracked metrics to a minimum while maximizing the value.
      • The audience and cadence of each metric may allow you to define targeted dashboards.

      Audience - Who is this metric tracked for?

      Goal - Why are you tracking this metric? This can be defined along with the CSFs and KPIs.

      Cadence - How often are you going to view, analyze, and action this metric?

      Action - What will you do if this metric spikes, dips, trends up, or trends down?

      Activity 1. Define your critical success factors and key performance indicators

      Critical success factors (CSFs) are high-level goals that help you define the direction of your service desk. Key performance indicators (KPIs) can be treated as the trend of metrics that will indicate that you are moving in the direction of your CSFs. These will help narrow the data you have to track and action (metrics).

      CSFs, or your overall goals, typically revolve around three aspects of the service desk: time spent on tickets, resources spent on tickets, and the quality of service provided.

      1. As a group, brainstorm the CSFs and the KPIs that will help narrow your metrics. Use the Service Desk Metrics Workbook to record the results.
      2. Look at the example to the right as a starting point.

      Example metrics:

      Critical success factor Key performance indicator
      High End-User Satisfaction Increasing CSAT score on transactional surveys
      High end-user satisfaction score
      Proper resolution of tickets
      Low time to resolve
      Low Cost per Ticket Decreasing cost per ticket (due to efficient resolution, FCR, automation, self-service, etc.)
      Improve Access to Self-Service (tangential to improve customer service) High utilization of knowledgebase
      High utilization of portal

      Download the Service Desk Metrics Workbook

      Activity 2. Define action-based metrics that align with your KPIs and CSFs

      1. Now that you have defined your goals, continue to fill the workbook by choosing metrics that align with those goals.
      2. Use the chart below as a guide. For every metric, define the cadence of measurement, audience of the metric, and action associated with the metric. There may be multiple metrics for each KPI.
      3. If you find you are unable to define the cadence, audience, or action associated with a metric, you may not need to track the metric in the first place. Alternatively, if you find that you may action a metric in the future, you can decide to start gathering data now.

      Example metrics:

      Critical success factor Key performance indicator Metric Cadence Audience Action
      High End-User Satisfaction Increasing CSAT score on transactional surveys Monthly average of ticket satisfaction scores Monthly Management Action low scores immediately, view long-term trends
      High end-user satisfaction score Average end-user satisfaction score from annual survey Annually IT Leadership View IT satisfaction trends to align IT with business direction
      Proper resolution of tickets Number of tickets reopened Weekly Service Desk Technicians Action reopened tickets, look for training opportunities
      SLA breach rate Daily Service Desk Technicians Action reopened tickets, look for training opportunities
      Low time to resolve Average TTR (incidents) Weekly Management Look for trends to monitor resources
      Average TTR by priority Weekly Management Look for TTR solve rates to align with SLA
      Average TTR by tier Weekly Management Look for improperly escalated tickets or shift-left opportunities

      Download the Service Desk Metrics Workbook

      Activity 3. Define the data ownership, metric viability, and dashboards

      1. For each metric, define where the data is housed. Ideally, the data is directly in the ticketing tool or ITSM tool. This will make it easy to pull and analyze.
      2. Determine how difficult the metric will be to pull or track. If the effort is high, decide if the value of tracking the metric is worth the hassle of gathering it.
      3. Lastly, for each metric, use the cadence and audience to place the metric in a reporting dashboard. This will help divide your metrics and make them easier to report and action.
      4. You may use the output of this exercise to add your tracked metrics to your service desk SOP.
      5. A full suite of metrics can be found in our Infrastructure & Operations Metrics Library in the Take Control of Infrastructure Metrics Storyboard. The metrics have been categorized by low, medium, and advanced capabilities for you.

      Example metrics:

      Metric Who Owns the Data? Efforts to Track? Dashboards
      Monthly average of ticket satisfaction scores Service Desk Low Monthly Management Meeting
      Average end-user satisfaction score Service Desk Low Leadership Meeting
      Number of tickets reopened Service Desk Low Weekly Technician Standup
      SLA breach rate Service Desk Low Daily Technician Standup
      Average TTR (incidents) Service Desk Low Weekly Technician Standup
      Average TTR by priority Service Desk Low Weekly Technician Standup
      Average TTR by tier Service Desk Low Weekly Technician Standup
      Average TTR (SRs) Service Desk Low Weekly Technician Standup
      Number of tickets reopened Service Desk Low Daily Technician Standup

      Download the Service Desk Metrics Workbook

      Keep the following considerations in mind when defining which metrics matter

      Keep the customer in mind

      Metrics are typically focused on transactional efficiency and process effectiveness and not what was achieved against the customers’ need and satisfaction.

      Understand the relationships between performance and metrics management to provide the end-to-end service delivery picture you are aiming to achieve.

      Don’t settle for tool defaults

      ITSM solutions offer an abundance of metrics to choose from. The most common ones are typically built into the reporting modules of the tool suite.

      Do not start tracking everything. Choose metrics that are specifically aligned to your organization’s desired business outcomes.

      Establish tension metrics to achieve balance

      Don’t ignore the correlation and context between the suites of metrics chosen and how one interacts and affects the other.

      Measuring metrics in isolation may lead to an incomplete picture or undesired technician behavior. Tension metrics help complete the picture and lead to proper actions.

      Adjust those targets

      An arbitrary target on a metric that is consistently met month over month is useless. Each metric should inform the overall performance by combining capable service level management and customer experience programs to prove the value IT is providing to the organization.

      Related Info-Tech Research

      Standardize the Service Desk

      This project will help you build and improve essential service desk processes, including incident management, request fulfillment, and knowledge management, to create a sustainable service desk.

      Take Control of Infrastructure and Operations Metrics

      Make faster decisions and improve service delivery by using the right metrics for the job.

      Analyze Your Service Desk Ticket Data

      Take a data-driven approach to service desk optimization.

      IT Diagnostics: Build a Data-Driven IT Strategy

      Our data-driven programs ask business and IT stakeholders the right questions to ensure you have the inputs necessary to build an effective IT strategy.

      10 Secrets for Successful Disaster Recovery in the Cloud

      • Buy Link or Shortcode: {j2store}419|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,096 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • The pay-per-use pricing structure of cloud services make it a cheaper DR option, but there are gotchas you need to avoid, ranging from unexpected licensing costs to potential security vulnerabilities.
      • You likely started on the path to cloud DR with consideration of cloud storage for offsite retention of backups. Systems recovery in the cloud can be a real value-add to using cloud as a backup target.
      • Your cloud-based DR environment has to be secure and compliant, but performance also has to be “good enough” to operate the business.
      • Location still matters, and selecting the DR site that optimizes latency tolerance and geo-redundancy can be difficult.

      Our Advice

      Critical Insight

      • Keep your systems dormant until disaster strikes. Prepare as much of your environment as possible without tapping into compute resources. Enjoy the low at-rest costs, and leverage the reliability of the cloud in your failover.
      • Avoid failure on the failback! Bringing up your systems in the cloud is a great temporary solution, but an expensive long-term strategy. Make sure you have a plan to get back on premises.
      • Leverage cloud DR as a start for cloud migration. Cloud DR provides a gateway for broader infrastructure lift and shift to cloud IaaS, but this should only be the first phase of a longer-term roadmap that ends in multi-service hybrid cloud.

      Impact and Result

      • Calculate the cost of your DR solution with a cloud vendor. Test your systems often to build out more accurate budgets and to define failover and failback action plans to increase confidence in your capabilities.
      • Define “good enough” performance by consulting with the business and setting correct expectations for the recovery state.
      • Dig deeper into the various flavors of cloud-based DR beyond backup and restore, including pilot light, warm standby, and multi-site recovery. Each of these has unique benefits and challenges when done in the cloud.

      10 Secrets for Successful Disaster Recovery in the Cloud Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out the 10 secrets for success in cloud-based DR deployment, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      [infographic]

      Design a Tabletop Exercise to Support Your Security Operation

      • Buy Link or Shortcode: {j2store}319|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,599 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Threat management has become resource intensive, requiring continuous monitoring, collection, and analysis of massive volumes of security event data.
      • Security incidents are inevitable, but how they are handled is critical.
      • The increasing use of sophisticated malware is making it difficult for organizations to identify the true intent behind the attack campaign.
      • The incident response is often handled in an ad hoc or ineffective manner.

      Our Advice

      Critical Insight

      • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and share information mutually with other organizations to stay ahead of incoming threats.
      • Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.
      • You might experience a negative return on your security control investment. As technology in the industry evolves, threat actors will adopt new tools, tactics, and procedures; a tabletop exercise will help ensure teams are leveraging your security investment properly and providing relevant situational awareness to stay on top of the rapidly evolving threat landscape.

      Impact and Result

      Establish and design a tabletop exercise capability to support and test the efficiency of the core prevention, detection, analysis, and response functions that consist of an organization's threat intelligence, security operations, vulnerability management, and incident response functions.

      Design a Tabletop Exercise to Support Your Security Operation Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should design a tabletop exercise, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Plan

      Evaluate the need for a tabletop exercise.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 1: Plan

      2. Design

      Determine the topics, scope, objectives, and participant roles and responsibilities.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 2: Design

      3. Develop

      Create briefings, guides, reports, and exercise injects.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 3: Develop
      • Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

      4. Conduct

      Host the exercise in a conference or classroom setting.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 4: Conduct

      5. Evaluate

      Plan to ensure measurement and continued improvement.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate
      [infographic]

      IT Project Management Lite

      • Buy Link or Shortcode: {j2store}187|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Project Management Office
      • Parent Category Link: /project-management-office
      • Organizations want reliable project reporting and clear, consistent project management standards, but many are unwilling or unable to allocate time for it.
      • Many IT project managers are given project management responsibilities in addition to other full-time roles – without any formal allocation of time, authority, or training.
      • Most IT project managers and stakeholders actually want clear and consistent standards but resist tools and procedures they believe are too time consuming and inflexible.
      • Standard project management procedures must be “light” enough for project managers to adapt to a wide range of projects without increasing the total time required to manage projects successfully.

      Our Advice

      Critical Insight

      • Most IT project management advice is focused on the largest 10-20% of projects – projects with large enough budgets to allocate time to project management. This leaves most IT projects (and most people who manage IT projects) in limbo between high-risk ad hoc management and high-cost project management best practices.
      • Project management success doesn’t equate to project success. While formal methodologies are a key ingredient in the success of large, complex projects, most IT projects do not require the same degree of rigorous record-keeping and planning.
      • Consistent, timely, and accurate reporting is the “linchpin” in any sustainable project and portfolio management practice.

      Impact and Result

      • Maintain timely and accurate project portfolio reporting with right-sized tools and processes.
      • Establish clear and consistent project management standards that make better use of time already spent managing projects.
      • Enable project managers to manage their projects more successfully with a set of flexible and lightweight tools and templates.

      IT Project Management Lite Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess the value of a minimum-viable PMO strategy

      Perform a measured value assessment for building and managing a minimum-viable PMO.

      • IT Project Management Lite Storyboard

      2. Perform a project and portfolio needs assessment

      Focus on the minimum required to maintain accuracy of portfolio reporting and effectiveness in managing projects.

      • Minimum-Viable PMO Needs Assessment

      3. Establish standards for realistic, accurate, and consistent portfolio reporting

      Emphasize reporting high-level project status as a way to identify and address issues to achieve the best results with the least effort.

      • Minimum-Viable Project and Portfolio Management SOP

      4. Create a standard, right-sized project management toolkit

      Free PMs to focus on actually managing the project while still delivering accurate portfolio metrics.

      • Zero-Allocation Project Management Workbook

      5. Train PMs for zero allocation

      Ensure project manager compliance with the portfolio reporting process by incorporating activities that create value.

      • Zero-Allocation Project Manager Development Plan
      • Zero-Allocation Project Management Survival Guide

      6. Perform a post-implementation assessment

      Evaluate success and identify opportunities for further improvement.

      Infographic

      Workshop: IT Project Management Lite

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Preparation

      The Purpose

      Define goals and success criteria.

      Finalize agenda.

      Gather information: update project and resource lists (Info-Tech recommends using the Project Portfolio Workbook).

      Key Benefits Achieved

      More efficiently organized and executed workshop.

      Able to better customize and tailor content to your specific needs.

      Activities

      1.1 Discuss specific pain points with regards to project manager allocations

      1.2 Review project lists, tools and templates, and other documents

      1.3 Map existing strategies to Info-Tech’s framework

      Outputs

      Understanding of where efforts must be focused in workshop

      Assessment of what existing tools and templates may need to be included in zero-allocation workbook

      Revisions that need to be made based on existing strategies

      2 Make the Case and Assess Needs

      The Purpose

      Assess current state (including review of project and resource lists).

      Discuss and analyze SWOT around project and portfolio management.

      Define target state.

      Define standards / SOP / processes for project and portfolio management.

      Key Benefits Achieved

      Gain perspective on how well your processes match up with the amount of time your project managers have for their PM duties.

      Determine the value of the time and effort that your project teams are investing in project management activities.

      Begin to define resource optimized processes for zero-allocation project managers.

      Ensure consistent implementation of processes across your portfolio.

      Establish project discipline and best practices that are grounded in actual project capacity.

      Activities

      2.1 Perform and/or analyze Minimum-Viable PMO Needs Assessment

      2.2 SWOT analysis

      2.3 Identify target allocations for project management activities

      2.4 Begin to define resource optimized processes for zero-allocation project managers

      Outputs

      Current state analysis based on Minimum-Viable PMO Needs Assessment

      Overview of current strengths, weaknesses, opportunities and threats

      Target state analysis based on Minimum-Viable PMO Needs Assessment

      A refined Minimum-Viable Project and Portfolio Management SOP

      3 Establish Strategy

      The Purpose

      Select and customize project and portfolio management toolkit.

      Implement (test/pilot) toolkit and processes.

      Customize project manager training plan.

      Evaluate and refine toolkit and processes as needed.

      Key Benefits Achieved

      Ensure consistent implementation of processes across your portfolio.

      Establish project discipline and best practices that are grounded in actual project capacity.

      A customized training session that will suit the needs of your project managers.

      Activities

      3.1 Customize the Zero-Allocation Toolkit to accommodate the needs of your projects

      3.2 Test toolkit on projects currently underway

      3.3 Tweak project manager training to suit the needs of your team

      Outputs

      Customized Zero-Allocation Project Management Workbook

      A tested and standardized copy of the workbook

      A customized training session for your project managers (to take place on Day 4 of Info-Tech’s workshop)

      4 Train Your Zero-Allocation Project Managers

      The Purpose

      Communicate project and portfolio management SOP to Project Managers.

      Deliver project manager training: standards for portfolio reporting and toolkit.

      Key Benefits Achieved

      Equip project managers to improve their level of discipline and documentation without spending more time in record keeping and task management.

      Execute a successful training session that clearly and succinctly communicates your minimal and resource-optimized processes.

      Activities

      4.1 Project Manager Training, including communication of the processes and standard templates and reports that will be adopted by all project managers

      Outputs

      Educated and disciplined project managers, aware of the required processes for portfolio reporting

      5 Assess Strategy and Next Steps

      The Purpose

      Debrief from the training session.

      Plan for ongoing evaluation and improvement.

      Evaluate and refine toolkit and processes if needed.

      Answer any remaining questions.

      Key Benefits Achieved

      Assess portfolio and project manager performance in light of the strategy implemented.

      Understanding of how to keep living documents like the workbook and SOP up to date.

      Clearly defined next steps.

      Activities

      5.1 Review the customized tools and templates

      5.2 Send relevant documentation to relevant stakeholders

      5.3 Schedule review call

      5.4 Schedule follow-up call with analysts to discuss progress in six months

      Outputs

      Finalized workbook and processes

      Satisfied and informed stakeholders

      Scheduled review call

      Scheduled follow-up call

      Start Making Data-Driven People Decisions

      • Buy Link or Shortcode: {j2store}427|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Leadership Development Programs
      • Parent Category Link: /leadership-development-programs
      • Ninety-one percent of IT leaders believe that analytics is important for talent management but 59% use no workforce analytics at all, although those who use analytics are much more effective than those who don't.
      • The higher the level of analytics used, the higher the level of effectiveness of the department as a whole.

      Our Advice

      Critical Insight

      • You don't need advanced metrics and analytics to see a return on people data. Begin by getting a strong foundation in place and showing the ROI on a pilot project.
      • Complex analyses will never make up for inadequate data quality. Spend the time up front to audit and improve data quality if necessary, no matter which stage of analytics proficiency you are at.
      • Ensure you collect and analyze only data that is essential to your decision making. More is not better, and excess data can detract from the overall impact of analytics.

      Impact and Result

      • Build a small-scale foundational pilot, which will allow you to demonstrate feasibility, refine your costs estimate, and show the ROI on people analytics for your budgeting meeting.
      • Drive organizational change incrementally by identifying and communicating with the stakeholders for your people analytics pilot.
      • Choose basic analytics suitable for organizations of all sizes and understand the building blocks of data quality to support more further analytics down the line.

      Start Making Data-Driven People Decisions Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should strategically apply people analytics to your IT talent management.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define the problem and apply the checklist

      From choosing the right data for the right problem to evaluating your progress toward data-driven people decisions, follow these steps to build your foundation to people analytics.

      • Start Making Data-Driven People Decisions – Phase 1: Define the Problem and Apply the Checklist
      • People Analytics Strategy Template
      • Talent Metrics Library
      [infographic]

      Create a Right-Sized Enterprise Architecture Governance Framework

      • Buy Link or Shortcode: {j2store}582|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $10,000 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Strategy & Operating Model
      • Parent Category Link: /strategy-and-operating-model
      • EA governance is perceived as an unnecessary layer of bureaucracy because business benefits are poorly communicated.
      • The organization doesn’t have a formalized EA practice.
      • Where an EA practice exists, employees are unsure of EA’s roles and responsibilities.

      Our Advice

      Critical Insight

      • Enterprise architecture is not a technical function – it should be business-value driven and forward looking, positioning organizational assets in favor of long-term strategy rather than short-term tactics.

      Impact and Result

      • Value-focused. Focus EA governance on helping the organization achieve business benefits. Promote EA’s contribution in realizing business value.
      • Right-sized. Re-use existing process checkpoints rather than creating new ones. Clearly define EA governance inclusion criteria for projects.
      • Defined and measured process. Define metrics to measure EA’s performance and integrate EA governance with other governance processes such as project governance. Also clearly define the EA governing bodies’ composition, domain, inputs, and outputs.
      • Strike the right balance. Adopt architecture principles that strikes the right balance between business and technology.

      Create a Right-Sized Enterprise Architecture Governance Framework Research & Tools

      Start here – read the Executive Brief

      Read our Executive Brief to find out how implementing a successful enterprise architecture governance framework can benefit your organization.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Current State of EA Governance

      Identify the organization’s standing in terms of the enterprise architecture practice, and know the gaps and what the EA practice needs to fulfill to create a good governance framework.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 1: Current State of EA Governance
      • EA Capability – Risk and Complexity Assessment Tool
      • EA Governance Assessment Tool

      2. EA Fundamentals

      Understand the EA fundamentals and then refresh them to better align the EA practice with the organization and create business benefit.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 2: EA Fundamentals
      • EA Vision and Mission Template
      • EA Goals and Measures Template
      • EA Principles Template

      3. Engagement Model

      Analyze the IT operating model and identify EA’s role at each stage; refine it to promote effective EA engagement upfront in the early stages of the IT operating model.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 3: Engagement Model
      • EA Engagement Model Template

      4. EA Governing Bodies

      Set up EA governing bodies to provide guidance and foster a collaborative environment by identifying the correct number of EA governing bodies, defining the game plan to initialize the governing bodies, and creating an architecture review process.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 4: EA Governing Bodies
      • Architecture Board Charter Template
      • Architecture Review Process Template

      5. EA Policy

      Create an EA policy to provide a set of guidelines designed to direct and constrain the architecture actions of the organization in the pursuit of its goals in order to improve architecture compliance and drive business value.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 5: EA Policy
      • EA Policy Template
      • EA Assessment Checklist Template
      • EA Compliance Waiver Process Template
      • EA Compliance Waiver Form Template

      6. Architectural Standards

      Define architecture standards to facilitate information exchange, improve collaboration, and provide stability. Develop a process to update the architectural standards to ensure relevancy and promote process transparency.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 6: Architectural Standards
      • Architecture Standards Update Process Template

      7. Communication Plan

      Craft a plan to engage the relevant stakeholders, ascertain the benefits of the initiative, and identify the various communication methods in order to maximize the chances of success.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 7: Communication Plan
      • EA Governance Communication Plan Template
      • EA Governance Framework Template
      [infographic]

      Workshop: Create a Right-Sized Enterprise Architecture Governance Framework

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Current State of EA governance (Pre-workshop)

      The Purpose

      Conduct stakeholder interviews to understand current state of EA practice and prioritize gaps for EA governance based on organizational complexity.

      Key Benefits Achieved

      Prioritized list of actions to arrive at the target state based on the complexity of the organization

      Activities

      1.1 Determine organizational complexity.

      1.2 Conduct an assessment of the EA governance components.

      1.3 Identify and prioritize gaps.

      1.4 Conduct senior management interviews.

      Outputs

      Organizational complexity score

      EA governance current state and prioritized list of EA governance component gaps

      Stakeholder perception of the EA practice

      2 EA Fundamentals and Engagement Model

      The Purpose

      Refine EA fundamentals to align the EA practice with the organization and identify EA touchpoints to provide guidance for projects.

      Key Benefits Achieved

      Alignment of EA goals and objectives with the goals and objectives of the organization

      Early involvement of EA in the IT operating model

      Activities

      2.1 Review the output of the organizational complexity and EA assessment tools.

      2.2 Craft the EA vision and mission.

      2.3 Develop the EA principles.

      2.4 Identify the EA goals.

      2.5 Identify EA engagement touchpoints within the IT operating model.

      Outputs

      EA vision and mission statement

      EA principles

      EA goals and measures

      Identified EA engagement touchpoints and EA level of involvement

      3 EA Governing Bodies

      The Purpose

      Set up EA governing bodies to provide guidance and foster a collaborative environment by identifying the correct number of EA governing bodies, defining the game plan to initialize the governing bodies and creating an architecture review process.

      Key Benefits Achieved

      Business benefits are maximized and solution design is within the options set forth by the architectural reference models while no additional layers of bureaucracy are introduced

      Activities

      3.1 Identify the number of governing bodies.

      3.2 Define the game plan to initialize the governing bodies.

      3.3 Define the architecture review process.

      Outputs

      Architecture board structure and coverage

      Identified architecture review template

      4 EA Policy

      The Purpose

      Create an EA policy to provide a set of guidelines designed to direct and constrain the architecture actions of the organization in the pursuit of its goals in order to improve architecture compliance and drive business value.

      Key Benefits Achieved

      Improved architecture compliance, which ties investments to business value and provides guidance to architecture practitioners

      Activities

      4.1 Define the scope.

      4.2 Identify the target audience.

      4.3 Determine the inclusion and exclusion criteria.

      4.4 Craft an assessment checklist.

      Outputs

      Defined scope

      Inclusion and exclusion criteria for project review

      Architecture assessment checklist

      5 Architectural Standards and Communication Plan

      The Purpose

      Define architecture standards to facilitate information exchange, improve collaboration, and provide stability.

      Craft a communication plan to implement the new EA governance framework in order to maximize the chances of success.

      Key Benefits Achieved

      Consistent development of architecture, increased information exchange between stakeholders

      Improved process transparency

      Improved stakeholder engagement

      Activities

      5.1 Identify and standardize EA work products.

      5.2 Classifying the architectural standards.

      5.3 Identifying the custodian of standards.

      5.4 Update the standards.

      5.5 List the changes identified in the EA governance initiative

      5.6 Create a communication plan.

      Outputs

      Identified set of EA work products to standardize

      Architecture information taxonomy

      Identified set of custodian of standards

      Standard update process

      List of EA governance initiatives

      Communication plan for EA governance initiatives

      Further reading

      Create a Right-Sized Enterprise Architecture Governance Framework

      Focus on process standardization, repeatability, and sustainability.

      ANALYST PERSPECTIVE

      "Enterprise architecture is not a technology concept, rather it is the foundation on which businesses orient themselves to create and capture value in the marketplace. Designing architecture is not a simple task and creating organizations for the future requires forward thinking and rigorous planning.

      Architecture processes that are supposed to help facilitate discussions and drive option analysis are often seen as an unnecessary overhead. The negative perception is due to enterprise architecture groups being overly prescriptive rather than providing a set of options that guide and constrain solutions at the same time.

      EA groups should do away with the direct and control mindset and change to a collaborate and mentor mindset. As part of the architecture governance, EA teams should provide an option set that constrains design choices, and also be open to changes to standards or best practices. "

      Gopi Bheemavarapu, Sr. Manager, CIO Advisory Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      This Research Will Help You:

      • Understand the importance of enterprise architecture (EA) governance and how to apply it to guide architectural decisions.
      • Enhance your understanding of the organization’s current EA governance and identify areas for improvement.
      • Optimize your EA engagement model to maximize value creation.
      • Learn how to set up the optimal number of governance bodies in order to avoid bureaucratizing the organization.

      This Research Will Also Assist:

      • Business Relationship Managers
      • Business Analysts
      • IT Managers
      • Project Managers
      • IT Analysts
      • Quality Assurance Leads
      • Software Developers

      This Research Will Help Them:

      • Give an overview of enterprise architecture governance
      • Clarity on the role of enterprise architecture team

      Executive summary

      Situation

      • Deployed solutions do not meet business objectives resulting in expensive and extensive rework.
      • Each department acts independently without any regular EA touchpoints.
      • Organizations practice project-level architecture as opposed to enterprise architecture.

      Complication

      • EA governance is perceived as an unnecessary layer of bureaucracy because business benefits are poorly communicated.
      • The organization doesn’t have a formalized EA practice.
      • Where an EA practice exists, employees are unsure of EA’s roles and responsibilities.

      Resolution

      • Value-focused. Focus EA governance on helping the organization achieve business benefits. Promote EA’s contribution in realizing business value.
      • Right-sized. Re-use existing process checkpoints, rather than creating new ones. Clearly define EA governance inclusion criteria for projects.
      • Defined and measured process. Define metrics to measure EA’s performance and integrate EA governance with other governance processes such as project governance. Also clearly define the EA governing bodies’ composition, domain, inputs, and outputs.
      • Strike the right balance. Adopt architecture principles that strikes the right balance between business and technology imperatives.

      Info-Tech Insight

      Enterprise architecture is critical to ensuring that an organization has the solid IT foundation it needs to efficiently enable the achievement of its current and future strategic goals rather than focusing on short-term tactical gains.

      What is enterprise architecture governance?

      An architecture governance process is the set of activities an organization executes to ensure that decisions are made and accountability is enforced during the execution of its architecture strategy. (Hopkins, “The Essential EA Toolkit.”)

      EA governance includes the following:

      • Implement a system of controls over the creation and monitoring of all architectural components.
      • Ensure effective introduction, implementation, and evolution of architectures within the organization.
      • Implement a system to ensure compliance with internal and external standards and regulatory obligations.
      • Develop practices that ensure accountability to a clearly identified stakeholder community, both inside and outside the organization.

      (TOGAF)

      IT governance sets direction through prioritization and decision making, and monitors overall IT performance.

      The image shows a circle set within a larger circle. The inner circle is connected to the bottom of the larger circle. The inner circle is labelled EA Governance and the larger circle is labelled IT Governance.

      EA governance ensures that optimal architectural design choices are being made that focus on long-term value creation.

      Harness the benefits of an optimized EA governance

      Core benefits of EA governance are seen through:

      Value creation

      Effective EA governance ensures alignment between organizational investments and corporate strategic goals and objectives.

      Cost reduction

      Architecture standards provide guidance to identify opportunities for reuse and eliminate redundancies in an organization.

      Risk optimization

      Architecture review processes and assessment checklists ensure that solutions are within the acceptable risk levels of the organization.

      EA governance is difficult to structure appropriately, but having an effective structure will allow you to:

      • Achieve business strategy through faster time-to-market innovations and capabilities.
      • Reduced transaction costs with more consistent business processes and information across business units.
      • Lower IT costs due to better traceability, faster design, and lower risk.
      • Link IT investments to organizational strategies and objectives
      • Integrate and institutionalizes IT best practices.
      • Enable the organization to take full advantage of its information, infrastructure, and hardware and software assets.
      • Support regulatory as well as best practice requirements such as auditability, security, responsibility, and accountability.

      Organizations that have implemented EA governance realize greater benefits from their EA programs

      Modern day CIOs of high-performing organizations use EA as a strategic planning discipline to improve business-IT alignment, enable innovation, and link business and IT strategies to execution.

      Recent Info-Tech research found that organizations that establish EA governance realize greater benefits from their EA initiatives.

      The image shows a bar graph, with Impact from EA on the Y-axis, and different initiatives listed on the X-axis. Each initiative has two bars connected to it, with a blue bar representing answers of No and the grey bar representing answers of Yes.

      (Info-Tech Research Group, N=89)

      Measure EA governance implementation effectiveness

      Define key operational measures for internal use by IT and EA practitioners. Also, define business value measures that communicate and demonstrate the value of EA as an “enabler” of business outcomes to senior executives.

      EA performance measures (lead, operational) EA value measures (lag)
      Application of EA management process EA’s contribution to IT performance EA’s contribution to business value

      Enterprise Architecture Management

      • Number of months since the last review of target state EA blueprints.

      IT Investment Portfolio Management

      • Percentage of projects that were identified and proposed by EA.

      Solution Development

      • Number of projects that passed EA reviews.
      • Number of building blocks reused.

      Operations Management

      • Reduction in the number of applications with overlapping functionality.

      Business Value

      • Lower non-discretionary IT spend.
      • Decreased time to production.
      • Higher satisfaction of IT-enabled services.

      An insurance provider adopts a value-focused, right-sized EA governance program

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      The insurance sector has been undergoing major changes, and as a reaction, businesses within the sector have been embracing technology to provide innovative solutions.

      The head of EA in a major insurance provider (henceforth to be referred to as “INSPRO01”) was given the mandate to ensure that solutions are architected right the first time to maximize reuse and reduce technology debt. The EA group was at a critical point – to demonstrate business value or become irrelevant.

      Complication

      The project management office had been accountable for solution architecture and had placed emphasis on short-term project cost savings at the expense of long term durability.

      There was a lack of awareness of the Enterprise Architecture group within INSPRO01, and people misunderstood the roles and responsibilities of the EA team.

      Result

      Info-Tech helped define the responsibilities of the EA team and clarify the differences between the role of a Solution Architect vs. Enterprise Architect.

      The EA team was able to make the case for change in the project management practices to ensure architectures are reviewed and approved prior to implementation.

      As a result, INSPRO01 saw substantial increases in reuse opportunities and thereby derived more value from its technology investments.

      Success factors for EA governance

      The success of any EA governance initiative revolves around adopting best practices, setting up repeatable processes, and establishing appropriate controls.

      1. Develop best practices for managing architecture policies, procedures, roles, skills, and organizational structures.
      2. Establish organizational responsibilities and structures to support the architecture governance processes.
      3. Management of criteria for the control of the architecture governance processes, dispensations, compliance assessments, and SLAs.

      Info-Tech’s approach to EA governance

      Our best-practice approach is grounded in TOGAF and enhanced by the insights and guidance from our analysts, industry experts, and our clients.

      Value-focused. Focus EA governance on helping the organization achieve business benefits. Promote EA’s contribution in realizing business value.

      Right-sized. Insert EA governance into existing process checkpoints rather than creating new ones. Clearly define EA governance inclusion criteria for projects.

      Measured. Define metrics to measure EA’s performance, and integrate EA governance with other governance processes such as project governance. Also clearly define the EA governing bodies’ composition, domain, inputs, and outputs.

      Balanced. Adopt architecture principles that strikes the right balance between business and technology.

      Info-Tech’s EA governance framework

      Info-Tech’s architectural governance framework provides a value-focused, right-sized approach with a strong emphasis on process standardization, repeatability, and sustainability.

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      Use Info-Tech’s templates to complete this project

      1. Current state of EA governance
        • EA Capability - Risk and Complexity Assessment Tool
        • EA Governance Assessment Tool
      2. EA fundamentals
        • EA Vision and Mission Template
        • EA Goals and Measures Template
        • EA Principles Template
      3. Engagement model
        • EA Engagement Model Template
      4. EA governing bodies
        • Architecture Board Charter Template
        • Architecture Review Process Template
      5. EA policy
        • EA Policy Template
        • Architecture Assessment Checklist Template
        • Compliance Waiver Process Template
        • Compliance Waiver Form Template
      6. Architectural standards
        • Architecture Standards Update Process Template
      7. Communication Plan
        • EA Governance Communication Plan Template
        • EA Governance Framework Template

      As you move through the project, capture your progress with a summary in the EA Governance Framework Template.

      Download the EA Governance Framework Template document for use throughout this project.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      EA governance framework – phase-by-phase outline (1/2)

      Current state of EA governance EA Fundamentals Engagement Model EA Governing Bodies
      Best-Practice Toolkit

      1.1 Determine organizational complexity

      1.2 Conduct an assessment of the EA governance components

      1.3 Identify and prioritize gaps

      2.1 Craft the EA vision and mission

      2.2 Develop the EA principles

      2.3 Identify the EA goals

      3.1 Build the case for EA engagement

      3.2 Identify engagement touchpoints within the IT operating model

      4.1 Identify the number of governing bodies

      4.2 Define the game plan to initialize the governing bodies

      4.3 Define the architecture review process

      Guided Implementations
      • Determine organizational complexity
      • Assess current state of EA governance
      • Develop the EA fundamentals
      • Review the EA fundamentals
      • Review the current IT operating model
      • Determine the target engagement model
      • Identify architecture boards and develop charters
      • Develop an architecture review process

      Phase 1 Results:

      • EA Capability - risk and complexity assessment
      • EA governance assessment

      Phase 2 Results:

      • EA vision and mission
      • EA goals and measures
      • EA principles

      Phase 3 Results:

      • EA engagement model

      Phase 4 Results:

      • Architecture board charter
      • Architecture review process

      EA governance framework – phase-by-phase outline (2/2)

      EA Policy Architectural Standards Communication Plan
      Best-Practice Toolkit

      5.1 Define the scope of EA policy

      5.2 Identify the target audience

      5.3 Determine the inclusion and exclusion criteria

      5.4 Craft an assessment checklist

      6.1 Identify and standardize EA work products

      6.2 Classify the architectural standards

      6.3 Identify the custodian of standards

      6.4 Update the standards

      7.1 List the changes identified in the EA governance initiative

      7.2 Identify stakeholders

      7.3 Create a communication plan

      Guided Implementations
      • EA policy, assessment checklists, and decision types
      • Compliance waivers
      • Understand architectural standards
      • EA repository and updating the standards
      • Create a communication plan
      • Review the communication plan

      Phase 5 Results:

      • EA policy
      • Architecture assessment checklist
      • Compliance waiver process
      • Compliance waiver form

      Phase 6 Results:

      • Architecture standards update process

      Phase 7 Results:

      • Communication plan
      • EA governance framework

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Pre-workshopWorkshop Day 1Workshop Day 2Workshop Day 3Workshop Day 4
      ActivitiesCurrent state of EA governance EA fundamentals and engagement model EA governing bodies EA policy Architectural standards and

      communication plan

      1.1 Determine organizational complexity

      1.2 Conduct an assessment of the EA governance components

      1.3 Identify and prioritize gaps

      1.4 Senior management interviews

      1. Review the output of the organizational complexity and EA assessment tools
      2. Craft the EA vision and mission
      3. Develop the EA principles.
      4. Identify the EA goals
      5. Identify EA engagement touchpoints within the IT operating model
      1. Identify the number of governing bodies
      2. Define the game plan to initialize the governing bodies
      3. Define the architecture review process
      1. Define the scope
      2. Identify the target audience
      3. Determine the inclusion and exclusion criteria
      4. Craft an assessment checklist
      1. Identify and standardize EA work products
      2. Classifying the architectural standards
      3. Identifying the custodian of standards
      4. Updating the standards
      5. List the changes identified in the EA governance initiative
      6. Identify stakeholders
      7. Create a communication plan
      Deliverables
      1. EA Capability - risk and complexity assessment tool
      2. EA governance assessment tool
      1. EA vision and mission template
      2. EA goals and measures template
      3. EA principles template
      4. EA engagement model template
      1. Architecture board charter template
      2. Architecture review process template
      1. EA policy template
      2. Architecture assessment checklist template
      3. Compliance waiver process template
      4. Compliance waiver form template
      1. Architecture standards update process template
      2. Communication plan template

      Phase 1

      Current State of EA Governance

      Create a Right-Sized Enterprise Architecture Governance Framework

      Current State of EA Governance

      1. Current State of EA Governance
      2. EA Fundamentals
      3. Engagement Model
      4. EA Governing Bodies
      5. EA Policy
      6. Architectural Standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Determine organizational complexity
      • Conduct an assessment of the EA governance components
      • Identify and prioritize gaps

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Prioritized list of gaps

      Info-Tech Insight

      Correlation is not causation – an apparent problem might be a symptom rather than a cause. Assess the organization’s current EA governance to discover the root cause and go beyond the symptoms.

      Phase 1 guided implementation outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Current State of EA Governance

      Proposed Time to Completion: 2 weeks

      Step 1.1: Determine organizational complexity

      Start with an analyst kick-off call:

      • Discuss how to use Info-Tech’s EA Capability – Risk and Complexity Assessment Tool.
      • Discuss how to complete the inputs on the EA Governance Assessment Tool.

      Then complete these activities…

      • Conduct an assessment of your organization to determine its complexity.
      • Assess the state of EA governance within your organization.

      With these tools & templates:

      • EA Capability – Risk and Complexity Assessment Tool
      • EA Governance Assessment Tool

      Step 1.2: Assess current state of EA governance

      Start with an analyst kick-off call:

      • Review the output of the EA governance assessment and gather feedback on your goals for the EA practice.

      Then complete these activities…

      • Discuss whether you are ready to proceed with the project.
      • Review the list of tasks and plan your next steps.

      With these tools & templates:

      • EA Governance Assessment Tool

      Right-size EA governance based on organizational complexity

      Determining organizational complexity is not rocket science. Use Info-Tech’s tool to quantify the complexity and use it, along with common sense, to determine the appropriate level of architecture governance.

      Info-Tech’s methodology uses six factors to determine the complexity of the organization:

      1. The size of the organization, which can often be denoted by the revenue, headcount, number of applications in use, and geographical diversity.
      2. The solution alignment factor helps indicate the degree to which various projects map to the organization’s strategy.
      3. The size and complexity of the IT infrastructure and networks.
      4. The portfolio of applications maintained by the IT organization.
      5. Key changes within the organization such as M&A, regulatory changes, or a change in business or technology leadership.
      6. Other negative influences that can adversely affect the organization.

      Determine your organization’s level of complexity

      1.1 2 hours

      Input

      • Group consensus on the current state of EA competencies.

      Output

      • A list of gaps that need to be addressed for EA governance competencies.

      Materials

      • Info-Tech’s EA assessment tool, a computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Capability section highlighted.

      Step 1 - Facilitate

      Download the EA Capability – Risk and Complexity Assessment Tool to facilitate a session on determining your organization’s complexity.

      Download EA Organizational - Risk and Complexity Assessment Tool

      Step 2 - Summarize

      Summarize the results in the EA governance framework document.

      Update the EA Governance Framework Template

      Understand the components of effective EA governance

      EA governance is multi-faceted and it facilitates effective use of resources to meet organizational strategic objectives through well-defined structural elements.

      EA Governance

      • Fundamentals
      • Engagement Model
      • Policy
      • Governing Bodies
      • Architectural Standards

      Components of architecture governance

      1. EA vision, mission, goals, metrics, and principles that provide a direction for the EA practice.
      2. An engagement model showing where and in what fashion EA is engaged in the IT operating model.
      3. An architecture policy formulated and enforced by the architectural governing bodies to guide and constrain architectural choices in pursuit of strategic goals.
      4. Governing bodies to assess projects for compliance and provide feedback.
      5. Architectural standards that codify the EA work products to ensure consistent development of architecture.

      Next Step: Based on the organization’s complexity, conduct a current state assessment of EA governance using Info-Tech’s EA Governance Assessment Tool.

      Assess the components of EA governance in your organization

      1.2 2 hrs

      Input

      • Group consensus on the current state of EA competencies.

      Output

      • A list of gaps that need to be addressed for EA governance competencies.

      Materials

      • Info-Tech’s EA assessment tool, a computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Governance section highlighted.

      Step 1 - Facilitate

      Download the “EA Governance Assessment Tool” to facilitate a session on identifying the best practices to be applied in your organization.

      Download Info-Tech’s EA Governance Assessment Tool

      Step 2 - Summarize

      Summarize the identified best practices in the EA governance framework document.

      Update the EA Governance Framework Template


      Conduct a current state assessment to identify limitations of the existing EA governance framework

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      INSPRO01 was planning a major transformation initiative. The organization determined that EA is a strategic function.

      The CIO had pledged support to the EA group and had given them a mandate to deliver long-term strategic architecture.

      The business leaders did not trust the EA team and believed that lack of business skills in the group put the business transformation at risk.

      Complication

      The EA group had been traditionally seen as a technology organization that helps with software design.

      The EA team lacked understanding of the business and hence there had been no common language between business and technology.

      Result

      Info-Tech helped the EA team create a set of 10 architectural principles that are business-value driven rather than technical statements.

      The team socialized the principles with the business and technology stakeholders and got their approvals.

      By applying the business focused architectural principles, the EA team was able to connect with the business leaders and gain their support.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Determine organizational complexity.
      • Conduct an assessment of the EA governance components.
      • Identify and prioritize gaps.

      Outcomes

      • Organizational complexity assessment
      • EA governance capability assessment
      • A prioritized list of capability gaps

      Phase 2

      EA Fundamentals

      Create a Right-Sized Enterprise Architecture Governance Framework

      EA Fundamentals

      1. Current State of EA Governance
      2. EA Fundamentals
      3. Engagement Model
      4. EA Governing Bodies
      5. EA Policy
      6. Architectural Standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Craft the EA vision and mission
      • Develop the EA principles.
      • Identify the EA goals

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Refined set of EA fundamentals to support the building of EA governance

      Info-Tech Insight

      A house divided against itself cannot stand – ensure that the EA fundamentals are aligned with the organization’s goals and objectives.

      Phase 2 guided implementation outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: EA Fundamentals

      Proposed Time to Completion: 3 weeks

      Step 2.1: Develop the EA fundamentals

      Review findings with analyst:

      • Discuss the importance of the EA fundamentals – vision, mission, goals, measures, and principles.
      • Understand how to align the EA vision, mission, goals, and measures to your organization’s vision, mission, goals, measures, and principles.

      Then complete these activities…

      • Develop the EA vision statements.
      • Craft the EA mission statements.
      • Define EA goals and measures.
      • Adopt EA principles.

      With these tools & templates:

      • EA Vision and Mission Template
      • EA Principles Template
      • EA Goals and Measures Template

      Step 2.2: Review the EA fundamentals

      Review findings with analyst:

      • Review the EA fundamentals in conjunction with the results of the EA governance assessment tool and gather feedback.

      Then complete these activities…

      • Refine the EA vision, mission, goals, measures, and principles.
      • Review the list of tasks and plan your next steps.

      With these tools & templates:

      • EA Vision and Mission Template
      • EA Principles Template
      • EA Goals and Measures Template

      Fundamentals of an EA organization

      Vision, mission, goals and measures, and principles form the foundation of the EA function.

      Factors to consider when developing the vision and mission statements

      The vision and mission statements provide strategic direction to the EA team. These statements should be created based on the business and technology drivers in the organization.

      Business Drivers

      • Business drivers are factors that determine, or cause, an increase in value or major improvement of a business.
      • Examples of business drivers include:
        • Increased revenue
        • Customer retention
        • Salesforce effectiveness
        • Innovation

      Technology Drivers

      • Technology drivers are factors that are vital for the continued success and growth of a business using effective technologies.
      • Examples of technology drivers include:
        • Enterprise integration
        • Information security
        • Portability
        • Interoperability

      "The very essence of leadership is [that] you have a vision. It's got to be a vision you articulate clearly and forcefully on every occasion. You can't blow an uncertain trumpet." – Theodore Hesburgh

      Develop vision, mission, goals, measures, and principles to define the EA capability direction and purpose

      EA capability vision statement

      Articulates the desired future state of EA capability expressed in the present tense.

      • What will be the role of EA capability?
      • How will EA capability be perceived?

      Example: To be recognized by both the business and IT as a trusted partner that drives [Company Name]’s effectiveness, efficiency, and agility.

      EA capability mission statement

      Articulates the fundamental purpose of the EA capability.

      • Why does EA capability exist?
      • What does EA capability do to realize its vision?
      • Who are the key customers of the EA capability?

      Example: Define target enterprise architecture for [Company Name], identify solution opportunities, inform IT investment management, and direct solution development, acquisition, and operation compliance.

      EA capability goals and measures

      EA capability goals define specific desired outcomes of an EA management process execution. EA capability measures define how to validate the achievement of the EA capability goals.

      Example:

      Goal: Improve reuse of IT assets at [Company Name].

      Measures:

      • The number of building blocks available for reuse.
      • Percent of projects that utilized existing building blocks.
      • Estimated efficiency gain (= effort to create a building block * reuse count).

      EA principles

      EA principles are shared, long-lasting beliefs that guide the use of IT in constructing, transforming, and operating the enterprise by informing and restricting target-state enterprise architecture design, solution development, and procurement decisions.

      Example:

      • EA principle name: Reuse.
      • Statement: Maximize reuse of existing assets.
      • Rationale: Reuse prevents duplication of development and support efforts, increasing efficiency, and agility.
      • Implications: Define architecture and solution building blocks and ensure their consistent application.

      EA principles guide decision making

      Policies can be seen as “the letter of the law,” whereas EA principles summarize “the spirit of the law.”

      The image shows a graphic with EA Principles listed at the top, with an arrow pointing down to Decisions on the use of IT. At the bottom are domain-specific policies, with two arrows pointing upwards: the arrow on the left is labelled direct, and the arrow on the right is labelled control. The arrow points up to the label Decisions on the use of IT. On the left, there is an arrow pointing both up and down. At the top it is labelled The spirit of the law, and at the bottom, The letter of the law. On the right, there is another arrow pointing both up and down, labelled How should decisions be made at the top and labelled Who has the accountability and authority to make decisions? at the bottom.

      Define EA capability goals and related measures that resonate with EA capability stakeholders

      EA capability goals, i.e. specific desired outcomes of an EA management process execution. Use COBIT 5, APO03 process goals, and metrics as a starting point.

      The image shows a chart titled Manage Enterprise Architecture.

      Define relevant business value measures to collect indirect evidence of EA’s contribution to business benefits

      Define key operational measures for internal use by IT and EA practitioners. Also, define business value measures that communicate and demonstrate the value of EA as an enabler of business outcomes to senior executives.

      EA performance measures (lead, operational) EA value measures (lag)
      Application of EA management process EA’s contribution to IT performance EA’s contribution to business value

      Enterprise Architecture Management

      • Number of months since the last review of target state EA blueprints.

      IT Investment Portfolio Management

      • Percentage of projects that were identified and proposed by EA.

      Solution Development

      • Number of projects that passed EA reviews.
      • Number of building blocks reused.

      Operations Management

      • Reduction in the number of applications with overlapping functionality.

      Business Value

      • Lower non-discretionary IT spend.
      • Decreased time to production.
      • Higher satisfaction of IT-enabled services.

      Refine the organization’s EA fundamentals

      2.1 2 hrs

      Input

      • Group consensus on the current state of EA competencies.

      Output

      • A list of gaps that need to be addressed for EA governance competencies.

      Materials

      • Info-Tech’s EA assessment tool, a computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the Table of Contents with four sections highlighted, beginning with EA Vision Statement and ending with EA Goals and Measures.

      Step 1 - Facilitate

      Download the three templates and hold a working session to facilitate a session on creating EA fundamentals.

      Download the EA Vision and Mission Template, the EA Principles Template, and the EA Goals and Measures Template

      Step 2 - Summarize

      Document the final vision, mission, principles, goals, and measures within the EA Governance Framework.

      Update the EA Governance Framework Template


      Ensure that the EA fundamentals are aligned to the organizational needs

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      The EA group at INSPRO01 was being pulled in multiple directions with requests ranging from architecture review to solution design to code reviews.

      Project level architecture was being practiced with no clarity on the end goal. This led to EA being viewed as just another IT function without any added benefits.

      Info-Tech recommended that the EA team ensure that the fundamentals (vision, mission, principles, goals, and measures) reflect what the team aspired to achieve before fixing any of the process concerns.

      Complication

      The EA team was mostly comprised of technical people and hence the best practices outlined were not driven by business value.

      The team had no documented vision and mission statements in place. In addition, the existing goals and measures were not tied to the business strategic objectives.

      The team had architectural principles documented, but there were too many and they were very technical in nature.

      Result

      With Info-Tech’s guidance, the team developed a vision and mission statement to succinctly communicate the purpose of the EA function.

      The team also reduced and simplified the EA principles to make sure they were value driven and communicated in business terms.

      Finally, the team proposed goals and measures to track the performance of the EA team.

      With the fundamentals in place, the team was able to show the value of EA and gain organization-wide acceptance.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Craft the EA vision and mission.
      • Develop the EA principles.
      • Identify the EA goals.

      Outcomes

      • Refined set of EA fundamentals to support the building of EA governance.

      Phase 3

      Engagement Model

      Create a Right-Sized Enterprise Architecture Governance Framework

      Engagement Model

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This step will walk you through the following activities:

      • Build the case for EA engagement
      • Engagement touchpoints within the IT operating model

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Summary of the assessment of the current EA engagement model
      • Target EA engagement model

      Info-Tech Insight

      Perform due diligence prior to decision making. Use the EA Engagement Model to promote conversations between stage gate meetings as opposed to having the conversation during the stage gate meetings.

      Phase 3 guided implementation outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: EA engagement model

      Proposed Time to Completion: 2 weeks

      Step 3.1 Review the current IT operating model

      Start with an analyst kick-off call:

      • Review Info-Tech’s IT operating model.
      • Understand how to document your organization’s IT operating model.
      • Document EA’s current role and responsibility at each stage of the IT operating model.

      Then complete these activities…

      • Document your organization’s IT operating model.

      With these tools & templates:

      • EA Engagement Model Template

      Step 3.2: Determine the target engagement model

      Review findings with analyst:

      • Review your organization’s current state IT operating model.
      • Review your EA’s role and responsibility at each stage of the IT operating model.
      • Document the role and responsibility of EA in the future state.

      Then complete these activities…

      • Document EA’s future role within each stage of your organization’s IT operating model.

      With these tools & templates:

      • EA Engagement Model Template.

      The three pillars of EA Engagement

      Effective EA engagement revolves around three basic principles – generating business benefits, creating adaptable models, and being able to replicate the process across the organization.

      Business Value Driven

      Focus on generating business value from organizational investments.

      Repeatable

      Process should be standardized, transparent, and repeatable so that it can be consistently applied across the organization.

      Flexible

      Accommodate the varying needs of projects of different sizes.

      Where these pillars meet: Advocates long-term strategic vs. short-term tactical solutions.

      EA interaction points within the IT operating model

      EA’s engagement in each stage within the plan, build, and run phases should be clearly defined and communicated.

      Plan Strategy Development Business Planning Conceptualization Portfolio Management
      Build Requirements Solution Design Application Development/ Procurement Quality Assurance
      Run Deploy Operate

      Document the organization’s current IT operating model

      3.1 2-3 hr

      Input

      • IT project lifecycle

      Output

      • Organization’s current IT operating model.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, IT department leads, business leaders.

      Instructions:

      Hold a working session with the participants to document the current IT operating model. Facilitate the activity using the following steps:

      1. Map out the IT operating model.

      1. Find a project that was just deployed within the organization and backtrack every step of the way to the strategy development that resulted in the conception of the project.
      2. Interview the personnel involved with each step of the process to get a sense of whether or not projects usually move to deployment going through these steps.
      3. Review Info-Tech’s best-practice IT operating model presented in the EA Engagement Model Template, and add or remove any steps to the existing organization’s IT operating model as necessary. Document the finalized steps of the IT operating model.

      2. Determine EA’s current role in the operating model.

      1. Interview EA personnel through each step of the process and ask them their role. This is to get a sense of the type of input that EA is having into each step of the process.
      2. Using the EA Engagement Model Template, document the current role of EA in each step of the organization’s IT operation as you complete the interviews.

      Download the EA Engagement Model Template to document the organization’s current IT operating model.

      Define RACI in every stage of the IT operating model (e.g. EA role in strategy development phase of the IT operating model is presented below)

      Strategy Development

      Also known as strategic planning, strategy development is fundamental to creating and running a business. It involves the creation of a longer-term game plan or vision that sets specific goals and objectives for a business.

      R Those in charge of performing the task. These are the people actively involved in the completion of the required work. Business VPs, EA, IT directors R
      A The one ultimately answerable for the correct and thorough completion of the deliverable or task, and the one who delegates the work to those responsible. CEO A
      C Those whose opinions are sought before a decision is made, and with whom there is two-way communication. PMO, Line managers, etc. C
      I Those who are kept up to date on progress, and with whom there is one-way communication. Development managers, etc. I

      Next Step: Similarly define the RACI for each stage of the IT operating model; refer to the activity slide for prompts.

      Best practices on the role of EA within the IT operating model

      Plan

      Strategy Development

      C

      Business Planning

      C

      Conceptualization

      A

      Portfolio Management

      C

      Build

      Requirements

      C

      Solution Design

      R

      Application Development/ Procurement

      R

      Quality Assurance

      I

      Run

      Deploy

      I

      Operate

      I

      Next Step: Define the role of EA in each stage of the IT operating model; refer to the activity slide for prompts.

      Define EA’s target role in each step of the IT operating model

      3.2 2 hrs

      Input

      • Organization’s IT operating model.

      Output

      • Organization’s EA engagement model.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business leaders, IT department leaders.

      The image shows the Table of Contents for the EA Engagement Model Template with the EA Engagement Summary section highlighted.

      Step 1 - Facilitate

      Download the EA Engagement Model Template and hold a working session to define EA’s target role in each step of the IT operating model.

      Download the EA Engagement Model Template

      Step 2 - Summarize

      Document the target state role of EA within the EA Governance Framework document.

      Update the EA Governance Framework Template


      Design an EA engagement model to formalize EA’s role within the IT operating model

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      INSPRO01 had a high IT cost structure with looming technology debt due to a preference for short-term tactical gains over long-term solutions.

      The business satisfaction with IT was at an all-time low due to expensive solutions that did not meet business needs.

      INSPRO01’s technology landscape was in disarray with many overlapping systems and interoperability issues.

      Complication

      No single team within the organization had an end-to-end perspective all the way from strategy to project execution. A lot of information was being lost in handoffs between different teams.

      This led to inconsistent design/solution patterns being applied. Investment decisions had not been grounded in reality and this often led to cost overruns.

      Result

      Info-Tech helped INSPRO01 identify opportunities for EA team engagement at different stages of the IT operating model. EA’s role within each stage was clearly defined and documented.

      With Info-Tech’s help, the EA team successfully made the case for engagement upfront during strategy development rather than during project execution.

      The increased transparency enabled the EA team to ensure that investments were aligned to organizational strategic goals and objectives.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Build the case for EA engagement.
      • Identify engagement touchpoints within the IT operating model.

      Outcomes

      • Summary of the assessment of the current EA engagement model
      • Target EA engagement model

      Phase 4

      EA Governing Bodies

      Create a Right-Sized Enterprise Architecture Governance Framework

      EA Governing Bodies

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Identify the number of governing bodies
      • Define the game plan to initialize the governing bodies
      • Define the architecture review process

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Charter definition for each EA governance board

      Info-Tech Insight

      Use architecture governance like a scalpel rather than a hatchet. Implement governing bodies to provide guidance rather than act as a police force.

      Phase 4 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Create or identify EA governing bodies

      Proposed Time to Completion: 2 weeks

      Step 4.1: Identify architecture boards and develop charters

      Start with an analyst kick-off call:

      • Understand the factors influencing the number of governing bodies required for an organization.
      • Understand the components of a governing body charter.

      Then complete these activities…

      • Identify how many governing bodies are needed.
      • Define EA governing body composition, meeting frequency, and domain of coverage.
      • Define the inputs and outputs of each EA governing body.
      • Identify mandatory inclusion criteria.

      With these tools & templates:

      • Architecture Board Charter Template

      Step 4.2: Develop an architecture review process

      Follow-up with an analyst call:

      • Review the number of boards identified for your organization and gather feedback.
      • Review the charters developed for each governing body and gather feedback.
      • Understand the various factors that impact the architecture review process.
      • Review Info-Tech’s best-practice architecture review process.

      Then complete these activities…

      • Refine the charters for governing bodies.
      • Develop the architecture review process for your organization.

      With these tools & templates:

      • Architecture Review Process Template

      Factors that determine the number of architectural boards required

      The primary purpose of architecture boards is to ensure that business benefits are maximized and solution design is within the options set forth by the architectural reference models without introducing additional layers of bureaucracy.

      The optimal number of architecture boards required in an organization is a function of the following factors:

      • EA organization model
        • Distributed
        • Federated
        • Centralized
      • Architecture domains Maturity of architecture domains
      • Project throughput

      Commonly observed architecture boards:

      • Architecture Review Board
      • Technical Architecture Committee
      • Data Architecture Review Board
      • Infrastructure Architecture Review Board
      • Security Architecture Review Board

      Info-Tech Insight

      Before building out a new governance board, start small by repurposing existing forums by adding architecture as an agenda item. As the items for review increase consider introducing dedicated governing bodies.

      EA organization model drives the architecture governance structure

      EA teams can be organized in three ways – distributed, federated, and centralized. Each model has its own strengths and weaknesses. EA governance must be structured in a way such that the strengths are harvested and the weaknesses are mitigated.

      Distributed Federated Centralized
      EA org. structure
      • No overarching EA team exists and segment architects report to line of business (LOB) executives.
      • A centralized EA team exists with segment architects reporting to LOB executives and dotted-line to head of (centralized) EA.
      • A centralized EA capability exists with enterprise architects reporting to the head of EA.
      Implications
      • Produces a fragmented and disjointed collection of architectures.
      • Economies of scale are not realized.
      • High cross-silo integration effort.
      • LOB-specific approach to EA.
      • Requires dual reporting relationships.
      • Additional effort is required to coordinate centralized EA policies and blueprints with segment EA policies and blueprints.
      • Accountabilities may be unclear.
      • Can be less responsive to individual LOB needs, because the centralized EA capability must analyze needs of multiple LOBs and various trade-off options to avoid specialized, one-off solutions.
      • May impede innovation.
      Architectural boards
      • Cross LOB working groups to create architecture standards, patterns, and common services.
      • Local boards to support responsiveness to LOB-specific needs.
      • Cross LOB working groups to create architecture standards, patterns and common services.
      • Cross-enterprise boards to ensure adherence to enterprise standards and reduce integration costs.
      • Local boards to support responsiveness to LOB specific needs.
      • Enterprise working groups to create architecture standards, patterns, and all services.
      • Central board to ensure adherence to enterprise standards.

      Architecture domains influences the number of architecture boards required

      • An architecture review board (ARB) provides direction for domain-specific boards and acts as an escalation point. The ARB must have the right mix of both business and technology stakeholders.
      • Domain-specific boards provide a platform to have focused discussions on items specific to that domain.
      • Based on project throughput and the maturity of each domain, organizations would have to pick the optimal number of boards.
      • Architecture working groups provide a platform for cross-domain conversations to establish organization wide standards.
      Level 1 Architecture Review Board IT and Business Leaders
      Level 2 Business Architecture Board Data Architecture Board Application Architecture Board Infrastructure Architecture Board Security Architecture Board IT and Business Managers
      Level 3 Architecture Working Groups Architects

      Create a game plan for the architecture boards

      • Start with a single board for each level – an architecture review board (ARB), a technical architecture committee (TAC), and architecture working groups.
      • As the organization matures and the number of requests to the TAC increase, consider creating domain-specific boards – such as business architecture, data architecture, application architecture, etc. – to handle architecture decisions pertaining to that domain.

      Start with this:

      Level 1 Architecture Review Board
      Level 2 Technical Architecture Committee
      Level 3 Architecture Working Groups

      Change to this:

      Architecture Review Board IT and Business Leaders
      Business Architecture Board Data Architecture Board Application Architecture Board Infrastructure Architecture Board Security Architecture Board IT and Business Managers
      Architecture Working Groups Architects

      Architecture boards have different objectives and activities

      The boards at each level should be set up with the correct agenda – ensure that the boards’ composition and activities reflect their objective. Use the entry criteria to communicate the agenda for their meetings.

      Architecture Review Board Technical Architecture Committee
      Objective
      • Evaluates business strategy, needs, and priorities, sets direction and acts as a decision making authority of the EA capability.
      • Directs the development of target state architecture.
      • Monitors performance and compliance of the architectural standards.
      • Monitor project solution architecture compliance to standards, regulations, EA principles, and target state EA blueprints.
      • Review EA compliance waiver requests, make recommendations, and escalate to the architecture review board (ARB).
      Composition
      • Business Leadership
      • IT Leadership
      • Head of Enterprise Architecture
      • Business Managers
      • IT Managers
      • Architects
      Activities
      • Review compliance of conceptual solution to standards.
      • Discuss the enterprise implications of the proposed solution.
      • Select and approve vendors.
      • Review detailed solution design.
      • Discuss the risks of the proposed solution.
      • Discuss the cost of the proposed solution.
      • Review and recommend vendors.
      Entry Criteria
      • Changes to IT Enterprise Technology Policy.
      • Changes to the technology management plan.
      • Approve changes to enterprise technology inventory/portfolio.
      • Ongoing operational cost impacts.
      • Detailed estimates for the solution are ready for review.
      • There are significant changes to protocols or technologies responsible for solution.
      • When the project is deviating from baselined architectures.

      Identify the number of governing bodies

      4.1 2 hrs

      Input

      • EA Vision and Mission
      • EA Engagement Model

      Output

      • A list of EA governing bodies.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business line leads, IT department leads.

      Instructions:

      Hold a working session with the participants to identify the number of governing bodies. Facilitate the activity using the following steps:

      1. Examine the EA organization models mentioned previously. Assess how your organization is structured, and identify whether your organization has a federated, distributed or centralized EA organization model.
      2. Reference the “Game plan for the architecture boards” slide. Assess the architecture domains, and define how many there are in the organization.
      3. Architecture domains:
        1. If no defined architecture domains exist, model the number of governing bodies in the organization based on the “Start with this” scenario in the “Game plan for the architecture boards” slide.
        2. If defined architecture domains do exist, model the number of governing bodies based on the “Change to this” scenario in the “Game plan for the architecture boards” slide.
      4. Name each governing body you have defined in the previous step. Download Info-Tech’s Architecture Board Charter Template for each domain you have named. Input the names into the title of each downloaded template.

      Download the Architecture Board Charter Template to document this activity.

      Defining the governing body charter

      The charter represents the agreement between the governing body and its stakeholders about the value proposition and obligations to the organization.

      1. Purpose: The reason for the existence of the governing body and its goals and objectives.
      2. Composition: The members who make up the committee and their roles and responsibilities in it.
      3. Frequency of meetings: The frequency at which the committee gathers to discuss items and make decisions.
      4. Entry/Exit Criteria: The criteria by which the committee selects items for review and items for which decisions can be taken.
      5. Inputs: Materials that are provided as inputs for review and decision making by the committee.
      6. Outputs: Materials that are provided by the committee after an item has been reviewed and the decision made.
      7. Activities: Actions undertaken by the committee to arrive at its decision.

      Define EA’s target role in each step of the IT operating model

      4.2 3 hrs

      Input

      • A list of all identified EA governing bodies.

      Output

      • Charters for each EA governing bodies.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the Table of Contents for the EA Governance Framework document, with the Architecture Board Charters highlighted.

      Step 1 Facilitate

      Hold a working session with the stakeholders to define the charter for each of the identified architecture boards.

      Download Architecture Board Charter Template

      Step 2 Summarize

      • Summarize the objectives of each board and reference the charter document within the EA Governance Framework.
      • Upload the final charter document to the team’s common repository.

      Update the EA Governance Framework document


      Considerations when creating an architecture review process

      • Ensure that architecture review happens at major milestones within the organization’s IT Operating Model such as the plan, build, and run phases.
      • In order to provide continuous engagement, make the EA group accountable for solution architecture in the plan phase. In the build phase, the EA group will be consulted while the solution architect will be responsible for the project solution architecture.

      Plan

      • Strategy Development
      • Business Planning
      • A - Conceptualization
      • Portfolio Management

      Build

      • Requirements
      • R - Solution Design
      • Application Development/ Procurement
      • Quality Assurance

      Run

      • Deploy
      • Operate

      Best-practice project architecture review process

      The best-practice model presented facilitates the creation of sound solution architecture through continuous engagement with the EA team and well-defined governance checkpoints.

      The image shows a graphic of the best-practice model. At the left, four categories are listed: Committees; EA; Project Team; LOB. At the top, three categories are listed: Plan; Build; Run. Within the area between these categories is a flow chart demonstrating the best-practice model and specific checkpoints throughout.

      Develop the architecture review process

      4.3 2 hours

      Input

      • A list of all EA governing bodies.
      • Info-Tech’s best practice architecture review process.

      Output

      • The new architecture review process.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      Hold a working session with the participants to develop the architecture review process. Facilitate the activity using the following steps:

      1. Reference Info-Tech’s best-practice architecture review process embedded within the “Architecture Review Process Template” to gain an understanding of an ideal architecture review process.
      2. Identify the stages within the plan, build, and run phases where solution architecture reviews should occur, and identify the governing bodies involved in these reviews.
      3. As you go through these stages, record your findings in the Architecture Review Process Template.
      4. Connect the various activities leading to and from the architecture creation points to outline the review process.

      Download the Architecture Review Process Template for additional guidance regarding developing an architecture review process.

      Develop the architecture review process

      4.3 2 hrs

      Input

      • A list of all identified EA governing bodies.

      Output

      • Charters for each EA governing bodies.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents, with the Architecture Review Process highlighted.

      Step 1 - Facilitate

      Download Architecture Review Process Template and facilitate a session to customize the best-practice model presented in the template.

      Download the Architecture Review Process Template

      Step 2 - Summarize

      Summarize the process changes and document the process flow in the EA Governance Framework document.

      Update the EA Governance Framework Template

      Right-size EA governing bodies to reduce the perception of red tape

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      At INSPRO01, architecture governance boards were a bottleneck. The boards fielded all project requests, ranging from simple screen label changes to complex initiatives spanning multiple applications.

      These boards were designed as forums for technology discussions without any business stakeholder involvement.

      Complication

      INSPRO01’s management never gave buy-in to the architecture governance boards since their value was uncertain.

      Additionally, architectural reviews were perceived as an item to be checked off rather than a forum for getting feedback.

      Architectural exceptions were not being followed through due to the lack of a dispensation process.

      Result

      Info-Tech has helped the team define adaptable inclusion/exclusion criteria (based on project complexity) for each of the architectural governing boards.

      The EA team was able to make the case for business participation in the architecture forums to better align business and technology investment.

      An architecture dispensation process was created and operationalized. As a result architecture reviews became more transparent with well-defined next steps.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Identify the number of governing bodies.
      • Define the game plan to initialize the governing bodies.
      • Define the architecture review process.

      Outcomes

      • Charter definition for each EA governance board

      Phase 5

      EA Policy

      Create a Right-Sized Enterprise Architecture Governance Framework

      EA Policy

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Define the EA policy scope
      • Identify the target audience
      • Determine the inclusion and exclusion criteria
      • Create an assessment checklist

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • The completed EA policy
      • Project assessment checklist
      • Defined assessment outcomes
      • Completed compliance waiver process

      Info-Tech Insight

      Use the EA policy to promote EA’s commitment to deliver value to business stakeholders through process transparency, stakeholder engagement, and compliance.

      Phase 5 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 5: EA Policy

      Proposed Time to Completion: 3 weeks

      Step 5.1–5.3: EA Policy, Assessment Checklists, and Decision Types

      Start with an analyst kick-off call:

      • Discuss the three pillars of EA policy and its purpose.
      • Review the components of an effective EA policy.
      • Understand how to develop architecture assessment checklists.
      • Understand the assessment decision types.

      Then complete these activities…

      • Define purpose, scope, and audience of the EA policy.
      • Create a project assessment checklist.
      • Define the organization’s assessment decision type.

      With these tools & templates:

      • EA Policy Template
      • EA Assessment Checklist Template

      Step 5.4: Compliance Waivers

      Review findings with analyst:

      • Review your draft EA policy and gather feedback.
      • Review your project assessment checklists and the assessment decision types.
      • Discuss the best-practice architecture compliance waiver process and how to tailor it to your organizational needs.

      Then complete these activities…

      • Refine the EA policy based on feedback gathered.
      • Create the compliance waiver process.

      With these tools & templates:

      • EA Compliance Waiver Process Template
      • EA Compliance Waiver Form Template

      Three pillars of architecture policy

      Architecture policy is a set of guidelines, formulated and enforced by the governing bodies of an organization, to guide and constrain architectural choices in pursuit of strategic goals.

      Architecture compliance – promotes compliance to organizational standards through well-defined assessment checklists across architectural domains.

      Business value – ensures that investments are tied to business value by enforcing traceability to business capabilities.

      Architectural guidance – provides guidance to architecture practitioners on the application of the business and technology standards.

      Components of EA policy

      An enterprise architecture policy is an actionable document that can be applied to projects of varying complexity across the organization.

      1. Purpose and Scope: This EA policy document clearly defines the scope and the objectives of architecture reviews within an organization.
      2. Target Audience: The intended audience of the policy such as employees and partners.
      3. Architecture Assessment Checklist: A wide range of typical questions that may be used in conducting Architecture Compliance reviews, relating to various aspects of the architecture.
      4. Assessment Outcomes: The outcome of the architecture review process that determines the conformance of a project solution to the enterprise architecture standards.
      5. Compliance Waiver: Used when a solution or segment architecture is perceived to be non-compliant with the enterprise architecture.

      Draft the purpose and scope of the EA policy

      5.1 2.5 hrs

      Input

      • A consensus on the purpose, scope, and audience for the EA policy.

      Output

      • Documented version of the purpose, scope, and audience for the EA policy.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Policy section highlighted.

      Step 1 - Facilitate

      Download the EA Policy Template and hold a working session to draft the EA policy.

      Download the EA Policy Template

      Step 2 - Summarize

      • Summarize purpose, scope, and intended audience of the policy in the EA Governance Framework document.
      • Update the EA policy document with the purpose, scope and intended audience.

      Update the EA Governance Framework Template

      Architecture assessment checklist

      Architecture assessment checklist is a list of future-looking criteria that a project will be assessed against. It provides a set of standards against which projects can be assessed in order to render a decision on whether or not the project can be greenlighted.

      Architecture checklists should be created for each EA domain since each domain provides guidance on specific aspects of the project.

      Sample Checklist Questions

      Business Architecture:

      • Is the project aligned to organizational strategic goals and objectives?
      • What are the business capabilities that the project supports? Is it creating new capabilities or supporting an existing one?

      Data Architecture:

      • What processes are in place to support data referential integrity and/or normalization?
      • What is the physical data model definition (derived from logical data models) used to design the database?

      Application Architecture:

      • Can this application be placed on an application server independent of all other applications? If not, explain the dependencies.
      • Can additional parallel application servers be easily added? If so, what is the load balancing mechanism?

      Infrastructure Architecture:

      • Does the solution provide high-availability and fault-tolerance that can recover from events within a datacenter?

      Security Architecture:

      • Have you ensured that the corporate security policies and guidelines to which you are designing are the latest versions?

      Create architectural assessment checklists

      5.2 2 hrs

      Input

      • Reference architecture models.

      Output

      • Architecture assessment checklist.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Assessment Checklist section highlighted.

      Step 1 - Facilitate

      Download the EA Assessment Checklist Template and hold a working session to create the architectural assessment checklists.

      Download the EA Assessment Checklist Template

      Step 2 - Summarize

      • Summarize the major points of the checklists in the EA Governance Framework document.
      • Update the EA policy document with the detailed architecture assessment checklists.

      Update the EA Governance Framework Template

      Architecture assessment decision types

      • As a part of the proposed solution review, the governing bodies produce a decision indicating the compliance of the solution architecture with the enterprise standards.
      • Go, No Go, or Conditional are a sample set of decision outcomes available to the governing bodies.
      • On a conditional approval, the project team must file for a compliance waiver.

      Approved

      • The solution demonstrates substantial compliance with standards.
      • Negligible risk to the organization or minimal risks with sound plans of how to mitigate them.
      • Architectural approval to proceed with delivery type of work.

      Conditional Approval

      • The significant aspects of the solution have been addressed in a satisfactory manner.
      • Yet, there are some aspects of the solution that are not compliant with standards.
      • The architectural approval is conditional upon presenting the missing evidence within a minimal period of time determined.
      • The risk level may be acceptable to the organization from an overall IT governance perspective.

      Not Approved

      • The solution is not compliant with the standards.
      • Scheduled for a follow-up review.
      • Not recommended to proceed until the solution is more compliant with the standards.

      Best-practice architecture compliance waiver process

      Waivers are not permanent. Waiver terms must be documented for each waiver specifying:

      • Time period after which the architecture in question will be compliant with the enterprise architecture.
      • The modifications necessary to the enterprise architecture to accommodate the solution.

      The image shows a flow chart, split into 4 sections: Enterprise Architect; Solution Architect; TAC; ARB. To the right of these section labels, there is a flow chart that documents the waiver process.

      Create compliance waiver process

      5.4 3-4 hrs

      Input

      • A consensus on the compliance waiver process.

      Output

      • Documented compliance waiver process and form.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the Table of Contents with the Compliance Waiver Form section highlighted.

      Step 1 - Facilitate

      Download the EA compliance waiver template and hold a working session to customize the best-practice process to your organization’s needs.

      Download the EA Compliance Waiver Process Template

      Step 2 - Summarize

      • Summarize the objectives and high-level process in the EA Governance Framework document.
      • Update the EA policy document with the compliance waiver process.
      • Upload the final policy document to the team’s common repository.

      Update the EA Governance Framework Template

      Creates an enterprise architecture policy to drive adoption

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      EA program adoption across INSPRO01 was at its lowest point due to a lack of transparency into the activities performed by the EA group.

      Often, projects ignored EA entirely as it was viewed as a nebulous and non-value-added activity that produced no measurable results.

      Complication

      There was very little documented information about the architecture assessment process and the standards against which project solution architectures were evaluated.

      Additionally, there were no well-defined outcomes for the assessment.

      Project groups were left speculating about the next steps and with little guidance on what to do after completing an assessment.

      Result

      Info-Tech helped the EA team create an EA policy containing architecture significance criteria, assessment checklists, and reference to the architecture review process.

      Additionally, the team also identified guidelines and detailed next steps for projects based on the outcome of the architecture assessment.

      These actions brought clarity to EA processes and fostered better engagement with the EA group.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Define the scope.
      • Identify the target audience.
      • Determine the inclusion and exclusion criteria.
      • Create an assessment checklist.

      Outcomes

      • The completed EA policy
      • Project assessment checklist
      • Defined assessment outcomes
      • Completed compliance waiver process

      Phase 6

      Architectural Standards

      Create a Right-Sized Enterprise Architecture Governance Framework

      Architectural Standards

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Identify and standardize EA work products
      • Classify the architectural standards
      • Identify the custodian of standards
      • Update the standards

      This step involves the following participants:

      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • A standardized set of EA work products
      • A way to categorize and store EA work products
      • A defined method of updating standards

      Info-Tech Insight

      The architecture standard is the currency that facilitates information exchange between stakeholders. The primary purpose is to minimize transaction costs by providing a balance between stability and relevancy.

      Phase 6 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 6: Architectural standards

      Proposed Time to Completion: 4 weeks

      Step 6.1: Understand Architectural Standards

      Start with an analyst kick-off call:

      • Discuss architectural standards.
      • Know how to identify and define EA work products.
      • Understand the standard content of work products.

      Then complete these activities…

      • Identify and standardize EA work products.

      Step 6.2–6.3: EA Repository and Updating the Standards

      Review with analyst:

      • Review the standardized EA work products.
      • Discuss the principles of EA repository.
      • Discuss the Info-Tech best-practice model for updating architecture standards and how to tailor them to your organizational context.

      Then complete these activities…

      • Build a folder structure for storing EA work products.
      • Use the Info-Tech best-practice architecture standards update process to develop your organization’s process for updating architecture standards.

      With these tools & templates:

      • Architecture Standards Update Process Template

      Recommended list of EA work products to standardize

      • EA work products listed below are typically produced as a part of the architecture lifecycle.
      • To ensure consistent development of architecture, the work products need to be standardized.
      • Consider standardizing both the naming conventions and the content of the work products.
      1. EA vision: A document containing the vision that provides the high-level aspiration of the capabilities and business value that EA will deliver.
      2. Statement of EA Work: The Statement of Architecture Work defines the scope and approach that will be used to complete an architecture project.
      3. Reference architectures: A reference architecture is a set of best-practice taxonomy that describes components and the conceptual structure of the model, as well as graphics, which provide a visual representation of the taxonomy to aid understanding. Reference architectures are created for each of the architecture domains.
      4. Solution proposal: The proposed project solution based on the EA guidelines and standards.
      5. Compliance assessment request: The document that contains the project solution architecture assessment details.
      6. Architecture change request: The request that initiates a change to architecture standards when existing standards can no longer meet the needs of the enterprise.
      7. Transition architecture: A transition architecture shows the enterprise at incremental states that reflect periods of transition that sit between the baseline and target architectures.
      8. Architectural roadmap: A roadmap that lists individual increments of change and lays them out on a timeline to show progression from the baseline architecture to the target architecture.
      9. EA compliance waiver request: A compliance waiver request that must be made when a solution or segment architecture is perceived to be non-compliant with the enterprise architecture.

      Standardize the content of each work product

      1. Purpose - The reason for the existence of the work product.
      2. Owner - The owner of this EA work product.
      3. Target Audience - The intended audience of the work product such as employees and partners.
      4. Naming Pattern - The pattern for the name of the work product as well as its file name.
      5. Table of Contents - The various sections of the work product.
      6. Review & Sign-Off Authority - The stakeholders who will review the work product and approve it.
      7. Repository Folder Location - The location where the work product will be stored.

      Identify and standardize work products

      6.1 3 hrs

      Input

      • List of various documents being produced by projects currently.

      Output

      • Standardized list of work products.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • A computer, and/or a whiteboard and marker.

      Instructions:

      Hold a working session with the participants to identify and standardize work products. Facilitate the activity using the steps below.

      1. Identifying EA work products:
        1. Start by reviewing the list of all architecture-related documents presently produced in the organization. Any such deliverable with the following characteristics can be standardized:
          1. If it can be broken out and made into a standalone document.
          2. If it can be made into a fill-in form completed by others.
          3. If it is repetitive and requires iterative changes.
        2. Create a list of work products that your organization would like to standardize based on the characteristics above.
      2. The content and format of standardized EA work products:
        1. For each work product your organization wishes to standardize, look at its purpose and brainstorm the content needed to fulfill that purpose.
        2. After identifying the elements that need to be included in the work product to fulfill its purpose, order them logically for presentation purposes.
        3. In each section of the work product that need to be completed, include instructions on how to complete the section.
        4. Review the seven elements presented in the previous slide and include them in the work products.

      EA repository - information taxonomy

      As the EA function begins to grow and accumulates EA work products, having a well-designed folder structure helps you find the necessary information efficiently.

      Architecture meta-model

      Describes the organizationally tailored architecture framework.

      Architecture capability

      Defines the parameters, structures, and processes that support the enterprise architecture group.

      Architecture landscape

      An architectural presentation of assets in use by the enterprise at particular points in time.

      Standards information base

      Captures the standards with which new architectures and deployed services must comply.

      Reference library

      Provides guidelines, templates, patterns, and other forms of reference material to accelerate the creation of new architectures for the enterprise.

      Governance log

      Provides a record of governance activity across the enterprise.

      Create repository folder structure

      6.2 5-6 hrs

      Input

      • List of standardized work products.

      Output

      • EA work products mapped to a repository folder.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, IT department leads.

      Instructions:

      Hold a working session with the participants to create a repository structure. Facilitate the activity using the steps below:

      1. Start with the taxonomy on the previous slide, and sort the existing work products into these six categories.
      2. Assess that the work products are sorted in a mutually exclusive and collectively exhaustive fashion. This means that a certain work product that appears in one category should not appear in another category. As well, make sure these six categories capture all the existing work products.
      3. Based on the categorization of the work products, build a folder structure that follows these categories, which will allow for the work products to be accessed quickly and easily.

      Create a process to update EA work products

      • Architectural standards are not set in stone and should be reviewed and updated periodically.
      • The Architecture Review Board is the custodian for standards.
      • Any change to the standards need to be assessed thoroughly and must be communicated to all the impacted stakeholders.

      Architectural standards update process

      Identify

      • Identify changes to the standards

      Assess

      • Review and assess the impacts of the change

      Document

      • Document the change and update the standard

      Approve

      • Distribute the updated standards to key stakeholders for approval

      Communicate

      • Communicate the approved changes to impacted stakeholders

      Create a process to continually update standards

      6.3 1.5 hrs

      Input

      • The list of work products and its owners.

      Output

      • A documented work product update process.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the screenshot of the Table of Contents with the Standards Update Process highlighted.

      Step 1 - Facilitate

      Download the standards update process template and hold a working session to customize the best practice process to your organization’s needs.

      Download the Architecture Standards Update Process Template

      Step 2 - Summarize

      Summarize the objectives and the process flow in the EA governance framework document.

      Update the EA Governance Framework Template

      Create architectural standards to minimize transaction costs

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      INSPRO01 didn’t maintain any centralized standards and each project had its own solution/design work products based on the preference of the architect on the project. This led to multiple standards across the organization.

      Lack of consistency in architectural deliverables made the information hand-offs expensive.

      Complication

      INSPRO01 didn’t maintain the architectural documents in a central repository and the information was scattered across multiple project folders.

      This caused key stakeholders to make decisions based on incomplete information and resulted in constant revisions as new information became available.

      Result

      Info-Tech recommended that the EA team identify and standardize the various EA work products so that information was collected in a consistent manner across the organization.

      The team also recommended an information taxonomy to store the architectural deliverables and other collateral.

      This resulted in increased consistency and standardization leading to efficiency gains.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Identify and standardize EA work products.
      • Classify the architectural standards.
      • Identify the custodian of standards.
      • Update the standards.

      Outcomes

      • A standardized set of EA work products
      • A way to categorize and store EA work products
      • A defined method of updating standards

      Phase 7

      Communication Plan

      Create a Right-Sized Enterprise Architecture Governance Framework

      Communication Plan

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • List the changes identified in the EA governance initiative
      • Identify stakeholders
      • Create a communication plan

      This step involves the following participants:

      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Communication Plan
      • EA Governance Framework

      Info-Tech Insight

      By failing to prepare, you are preparing to fail – maximize the likelihood of success for EA governance by engaging the relevant stakeholders and communicating the changes.

      Phase 7 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 6: Operationalize the EA governance framework

      Proposed Time to Completion: 1 week

      Step 7.1: Create a Communication Plan

      Start with an analyst kick-off call:

      • Discuss how to communicate changes to stakeholders.
      • Discuss the purposes and benefits of the EA governance framework.

      Then complete these activities…

      • Identify the stakeholders affected by the EA governance transformations.
      • List the benefits of the proposed EA governance initiative.
      • Create a plan to communicate the changes to impacted stakeholders.

      With these tools & templates:

      • EA Governance Communication Plan Template
      • EA Governance Framework Template

      Step 7.2: Review the Communication Plan

      Start with an analyst kick-off call:

      • Review the communication plan and gather feedback on the proposed stakeholders.
      • Confer about the various methods of communicating change in an organization.
      • Discuss the uses of the EA Governance Framework.

      Then complete these activities…

      • Refine your communication plan and use it to engage with stakeholders to better serve customers.
      • Create the EA Governance Framework to accompany the communication plan in engaging stakeholders to better understand the value of EA.

      With these tools & templates:

      • EA Governance Communication Plan Template
      • EA Governance Framework Template

      Communicate changes to stakeholders

      The changes made to the EA governance components need to be reviewed, approved, and communicated to all of the impacted stakeholders.

      Deliverables to be reviewed:

      • Fundamentals
        • Vision and Mission
        • Goals and Measures
        • Principles
      • Architecture review process
      • Assessment checklists
      • Policy Governing body charters
      • Architectural standards

      Deliverable Review Process:

      Step 1: Hold a meeting with stakeholders to review, refine, and agree on the changes.

      Step 2: Obtain an official approval from the stakeholders.

      Step 3: Communicate the changes to the impacted stakeholders.

      Communicate the changes by creating an EA governance framework and communication plan

      7.1 3 hrs

      Input

      • EA governance deliverables.

      Output

      • EA Governance Framework
      • Communication Plan.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business line leads, IT department leads.

      Instructions:

      Hold a working session with the participants to create the EA governance framework as well as the communication plan. Facilitate the activity using the steps below:

      1. EA Governance Framework:
        1. The EA Governance Framework is a document that will help reference and cite all the materials created from this blueprint. Follow the instructions on the framework to complete.
      2. Communication Plan:
        1. Identify the stakeholders based on the EA governance deliverables.
        2. For each stakeholder identified, complete the “Communication Matrix” section in the EA Governance Communication Plan Template. Fill out the section based on the instructions in the template.
        3. As the stakeholders are identified based on the “Communication Matrix,” use the EA Governance Framework document to communicate the changes.

      Download the EA Governance Communication Plan Template and EA Governance Framework Template for additional instructions and to document your activities in this phase.

      Maximize the likelihood of success by communicating changes

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      The EA group followed Info-Tech’s methodology to assess the current state and has identified areas for improvement.

      Best practices were adopted to fill the gaps identified.

      The team planned to communicate the changes to the technology leadership team and get approvals.

      As the EA team tried to roll out changes, they encountered resistance from various IT teams.

      Complication

      The team was not sure of how to communicate the changes to the business stakeholders.

      Result

      Info-Tech has helped the team conduct a thorough stakeholder analysis to identify all the stakeholders who would be impacted by the changes to the architecture governance framework.

      A comprehensive communication plan was developed that leveraged traditional email blasts, town hall meetings, and non-traditional methods such as team blogs.

      The team executed the communication plan and was able to manage the change effectively.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • List the changes identified in the EA governance initiative.
      • Identify stakeholders.
      • Create a communication plan.
      • Compile the materials created in the blueprint to better communicate the value of EA governance.

      Outcomes

      • Communication plan
      • EA governance framework

      Bibliography

      Government of British Columbia. “Architecture and Standards Review Board.” Government of British Columbia. 2015. Web. Jan 2016. < http://www.cio.gov.bc.ca/cio/standards/asrb.page >

      Hopkins, Brian. “The Essential EA Toolkit Part 3 – An Architecture Governance Process.” Cio.com. Oct 2010. Web. April 2016. < http://www.cio.com/article/2372450/enterprise-architecture/the-essential-ea-toolkit-part-3---an-architecture-governance-process.html >

      Kantor, Bill. “How to Design a Successful RACI Project Plan.” CIO.com. May 2012. Web. Jan 2016. < http://www.cio.com/article/2395825/project-management/how-to-design-a-successful-raci-project-plan.html >

      Sapient. “MIT Enterprise Architecture Guide.” Sapient. Sep 2004. Web. Jan 2016. < http://web.mit.edu/itag/eag/FullEnterpriseArchitectureGuide0.1.pdf >

      TOGAF. “Chapter 41: Architecture Repository.” The Open Group. 2011. Web. Jan 2016. < http://pubs.opengroup.org/architecture/togaf9-doc/arch/chap41.html >

      TOGAF. “Chapter 48: Architecture Compliance.” The Open Group. 2011. Web. Jan 2016. < http://pubs.opengroup.org/architecture/togaf9-doc/arch/chap48.html >

      TOGAF. “Version 9.1.” The Open Group. 2011. Web. Jan 2016. http://pubs.opengroup.org/architecture/togaf9-doc/arch/

      United States Secret Service. “Enterprise Architecture Review Board.” United States Secret Service. Web. Jan 2016. < http://www.archives.gov/records-mgmt/toolkit/pdf/ID191.pdf >

      Virginia Information Technologies Agency. “Enterprise Architecture Policy.” Commonwealth of Virginia. Jul 2006. Web. Jan 2016. < https://www.vita.virginia.gov/uploadedfiles/vita_main_public/library/eapolicy200-00.pdf >

      Research contributors and experts

      Alan Mitchell, Senior Manager, Global Cities Centre of Excellence, KPMG

      Alan Mitchell has held numerous consulting positions before his role in Global Cities Centre of Excellence for KPMG. As a Consultant, he has had over 10 years of experience working with enterprise architecture related engagements. Further, he worked extensively with the public sector and prides himself on his knowledge of governance and how governance can generate value for an organization.

      Ian Gilmour, Associate Partner, EA advisory services, KPMG

      Ian Gilmour is the global lead for KPMG’s enterprise architecture method and Chief Architect for the KPMG Enterprise Reference Architecture for Health and Human Services. He has over 20 years of business design experience using enterprise architecture techniques. The key service areas that Ian focuses on are business architecture, IT-enabled business transformation, application portfolio rationalization, and the development of an enterprise architecture capability within client organizations.

      Djamel Djemaoun Hamidson, Senior Enterprise Architect, CBC/Radio-Canada

      Djamel Djemaoun is the Senior Enterprise Architect for CBC/Radio-Canada. He has over 15 years of Enterprise Architecture experience. Djamel’s areas of special include service-oriented architecture, enterprise architecture integration, business process management, business analytics, data modeling and analysis, and security and risk management.

      Sterling Bjorndahl, Director of Operations, eHealth Saskatchewan

      Sterling Bjorndahl is now the Action CIO for the Sun Country Regional Health Authority, and also assisting eHealth Saskatchewan grow its customer relationship management program. Sterling’s areas of expertise include IT strategy, enterprise architecture, ITIL, and business process management. He serves as the Chair on the Board of Directors for Gardiner Park Child Care.

      Huw Morgan, IT Research Executive, Enterprise Architect

      Huw Morgan has 10+ years experience as a Vice President or Chief Technology Officer in Canadian internet companies. As well, he possesses 20+ years experience in general IT management. Huw’s areas of expertise include enterprise architecture, integration, e-commerce, and business intelligence.

      Serge Parisien, Manager, Enterprise Architecture at Canada Mortgage Housing Corporation

      Serge Parisien is a seasoned IT leader with over 25 years of experience in the field of information technology governance and systems development in both the private and public sectors. His areas of expertise include enterprise architecture, strategy, and project management.

      Alex Coleman, Chief Information Officer at Saskatchewan Workers’ Compensation Board

      Alex Coleman is a strategic, innovative, and results-driven business leader with a proven track record of 20+ years’ experience planning, developing, and implementing global business and technology solutions across multiple industries in the private, public, and not-for-profit sectors. Alex’s expertise includes program management, integration, and project management.

      L.C. (Skip) Lumley , Student of Enterprise and Business Architecture

      Skip Lumley was formerly a Senior Principle at KPMG Canada. He is now post-career and spends his time helping move enterprise business architecture practices forward. His areas of expertise include enterprise architecture program implementation and public sector enterprise architecture business development.

      Additional contributors

      • Tim Gangwish, Enterprise Architect at Elavon
      • Darryl Garmon, Senior Vice President at Elavon
      • Steve Ranaghan, EMEIA business engagement at Fujitsu

      Switching Software Vendors Overwhelmingly Drives Increased Satisfaction

      • Buy Link or Shortcode: {j2store}612|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Selection & Implementation
      • Parent Category Link: /selection-and-implementation

      Organizations risk being locked in a circular trap of inertia from auto-renewing their software. With inertia comes complacency, leading to a decrease in overall satisfaction. Indeed, organizations are uniformly choosing to renew their software – even if they don’t like the vendor!

      Our Advice

      Critical Insight

      Renewal is an opportunity cost. Switching poorly performing software substantially drives increased satisfaction, and it potentially lowers vendor costs in the process. To realize maximum gains, it’s essential to have a repeatable process in place.

      Impact and Result

      Realize the benefits of switching by using Info-Tech’s five action steps to optimize your vendor switching processes:

      1. Identify switch opportunities.
      2. Evaluate your software.
      3. Build the business case.
      4. Optimize selection method.
      5. Plan implementation.

      Switching Software Vendors Overwhelmingly Drives Increased Satisfaction Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Why you should consider switching software vendors

      Use this outline of key statistics to help make the business case for switching poorly performing software.

      • Switching Existing Software Vendors Overwhelmingly Drives Increased Satisfaction Storyboard

      2. How to optimize your software vendor switching process

      Optimize your software vendor switching processes with five action steps.

      [infographic]

      Legacy Active Directory Environment

      • Buy Link or Shortcode: {j2store}471|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Cloud Strategy
      • Parent Category Link: /cloud-strategy

      You are looking to lose your dependency on Active Directory (AD), and you need to tackle infrastructure technical debt, but there are challenges:

      • Legacy apps that are in maintenance mode cannot shed their AD dependency or have hardware upgrades made.
      • You are unaware of what processes depend on AD and how integrated they are.
      • Departments invest in apps that are integrated with AD without informing you until they ask for Domain details after purchasing.

      Our Advice

      Critical Insight

      • Remove your dependency on AD one application at a time. If you are a cloud-first organization, rethink your AD strategy to ask “why” when you add a new device to your Active Directory.
      • With the advent of hybrid work, AD is now a security risk. You need to shore up your security posture. Think of zero trust architecture.
      • Take inventory of your objects that depend on Kerberos and NTML and plan on removing that barrier through applications that don’t depend on AD.

      Impact and Result

      Don’t allow Active Directory services to dictate your enterprise innovation and modernization strategies. Determine if you can safely remove objects and move them to a cloud service where your Azure AD Domain Services can handle your authentication and manage users and groups.

      Legacy Active Directory Environment Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Legacy Active Directory Environment Deck – Legacy AD was never built for modern infrastructure. Understand the history and future of Active Directory and what alternatives are in the market.

      Build all new systems with cloud integration in mind. Many applications built in the past had built-in AD components for access, using Kerberos and NTLM. This dependency has prevented organizations from migrating away from AD. When assessing new technology and applications, consider SaaS or cloud-native apps rather than a Microsoft-dependent application with AD ingrained in the code.

      • Legacy Active Directory Environment Storyboard
      [infographic]

      Further reading

      Legacy Active Directory Environment

      Kill the technical debt of your legacy Active Directory environment.

      Analyst Perspective

      Understand what Active Directory is and why Azure Active Directory does not replace it.

      It’s about Kerberos and New Technology LAN Manager (NTLM).

      The image contains a picture of John Donovan.

      Many organizations that want to innovate and migrate from on-premises applications to software as a service (SaaS) and cloud services are held hostage by their legacy Active Directory (AD). Microsoft did a good job taking over from Novell back in the late 90s, but its hooks into businesses are so deep that many have become dependent on AD services to manage devices and users, when in fact AD falls far short of needed capabilities, restricting innovation and progress.

      Despite Microsoft’s Azure becoming prominent in the world of cloud services, Azure AD is not a replacement for on-premises AD. While Azure AD is a secure authentication store that can contain users and groups, that is where the similarities end. In fact, Microsoft itself has an architecture to mitigate the shortcomings of Azure AD by recommending organizations migrate to a hybrid model, especially for businesses that have an in-house footprint of servers and applications.

      If you are a greenfield business and intend to take advantage of software, infrastructure, and platform as a service (SaaS, IaaS, and PaaS), as well as Microsoft 365 in Azure, then Azure AD is for you and you don’t have to worry about the need for AD.

      John Donovan
      Principal Director, I&O Practice
      Info-Tech Research Group

      Insight Summary

      Legacy AD was never built for modern infrastructure

      When Microsoft built AD as a free component for the Windows Server environment to replace Windows NT before the demise of Novell Directory Services in 2001, it never meant Active Directory to work outside the corporate network with Microsoft apps and devices. While it began as a central managing system for users and PCs on Microsoft operating systems, with one user per PC, the IT ecosystem has changed dramatically over the last 20 years, with cloud adoption, SaaS, IaaS, PaaS, and everything as a service. To make matters worse, work-from-anywhere has become a serious security challenge.

      Build all new systems with cloud integration in mind

      Many applications built in the past had built-in AD components for access, using Kerberos and NTLM. This dependency has prevented organizations from migrating away from AD. When assessing new technology and applications, consider SaaS or cloud-native apps rather than a Microsoft-dependent application with AD ingrained in the code. Ensure you are engaged when the business is assessing new apps. Stop the practice of the business purchasing apps without IT’s involvement; for example, if your marketing department is asking you for your Domain credentials for a vendor when you were not informed of this purchase.

      Hybrid AD is a solution but not a long-term goal

      Economically, Microsoft has no interest in replacing AD anytime soon. Microsoft wants that revenue and has built components like Azure AD Connect to mitigate the AD dependency issue, which is basically holding your organization hostage. In fact, Microsoft has advised that a hybrid solution will remain because, as we will investigate, Azure AD is not legacy AD.

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      You are looking to lose your dependency on Active Directory, and you need to tackle infrastructure technical debt, but there are challenges.

      • Legacy apps that are in maintenance mode cannot shed their AD dependency or have hardware upgrades made.
      • You are unaware of what processes depend on AD and how integrated they are.
      • Departments invest in apps that are integrated with AD without informing you until they ask for Domain details after purchasing.
      • Legacy applications can prevent you from upgrading servers or may need to be isolated due to security concerns related to inadequate patching and upgrades.
      • You do not see any return on investment in AD maintenance.
      • Mergers and acquisitions can prevent you from migrating away from AD if one company is dependent on AD and the other is fully in the cloud. This increases technical debt.
      • Remove your dependency on AD one application at a time. If you are a cloud-first organization, rethink your AD strategy to ask “why” when you add a new device to your Active Directory.
      • With the advent of hybrid work, AD is now a security risk. You need to shore up your security posture. Think of zero trust architecture.
      • Take inventory of your objects that depend on Kerberos and NTML and plan on removing that barrier through applications that don’t depend on AD.

      Info-Tech Insight

      Don’t allow Active Directory services to dictate your enterprise innovation and modernization strategies. Determine if you can safely remove objects and move them to a cloud service where your Azure AD Domain Services can handle your authentication and manage users and groups.

      The history of Active Directory

      The evolution of your infrastructure environment

      From NT to the cloud

      AD 2001 Exchange Server 2003 SharePoint 2007 Server 2008 R2 BYOD Security Risk All in Cloud 2015
      • Active Directory replaces NT and takes over from Novell as the enterprise access and control plane.
      • With slow WAN links, no cellphones, no tablets, and very few laptops, security was not a concern in AD.
      • In 2004, email becomes business critical.
      • This puts pressure on links, increases replication and domains, and creates a need for multiple identities.
      • Collaboration becomes pervasive.
      • Cross domain authentication becomes prevalent across the enterprise.
      • SharePoint sites need to be connected to multiple Domain AD accounts. More multiple identities are required.
      • Exchange resource forest rolls out, causing the new forest functional level to be a more complex environment.
      • Fine-grained password policies have impacted multiple forests, forcing them to adhere to the new password policies.
      • There are powerful Domain controllers, strong LAN and WAN connections, and an increase in smartphones and laptops.
      • Audits and compliance become a focus, and mergers and acquisitions add complexity. Security teams are working across the board.
      • Cloud technology doesn’t work well with complicated, messy AD environment. Cloud solutions need simple, flat AD architecture.
      • Technology changes after 15+ years. AD becomes the backbone of enterprise infrastructure. Managers demand to move to cloud, building complexity again.

      Organizations depend on AD

      AD is the backbone of many organizations’ IT infrastructure

      73% of organizations say their infrastructure is built on AD.

      82% say their applications depend on AD data.

      89% say AD enables authenticated access to file servers.

      90% say AD is the main source for authentication.

      Source: Dimensions research: Active Directory Modernization :

      Info-Tech Insight

      Organizations fail to move away from AD for many reasons, including:

      • Lack of time, resources, budget, and tools.
      • Difficulty understanding what has changed.
      • Migrating from AD being a low priority.

      Active Directory components

      Physical and logical structure

      Authentication, authorization, and auditing

      The image contains a screenshot of the active directory components.

      Active Directory has its hooks in!

      AD creates infrastructure technical debt and is difficult to migrate away from.

      The image contains a screenshot of an active directory diagram.

      Info-Tech Insight

      Due to the pervasive nature of Active Directory in the IT ecosystem, IT organizations are reluctant to migrate away from AD to modernize and innovate.

      Migration to Microsoft 365 in Azure has forced IT departments’ hand, and now that they have dipped their toe in the proverbial cloud “lake,” they see a way out of the mounting technical debt.

      AD security

      Security is the biggest concern with Active Directory.

      Neglecting Active Directory security

      98% of data breaches came from external sources.

      Source: Verizon, Data Breach Report 2022

      85% of data breach took weeks or even longer to discover.

      Source: Verizon Data Breach Report, 2012

      The biggest challenge for recovery after an Active Directory security breach is identifying the source of the breach, determining the extent of the breach, and creating a safe and secure environment.

      Info-Tech Insight

      Neglecting legacy Active Directory security will lead to cyberattacks. Malicious users can steal credentials and hijack data or corrupt your systems.

      What are the security risks to legacy AD architecture?

      • It's been 22 years since AD was released by Microsoft, and it has been a foundational technology for most businesses over the years. However, while there have been many innovations over those two decades, like Amazon, Facebook, iPhones, Androids, and more, Active Directory has remained mostly unchanged. There hasn’t been a security update since 2016.
      • This lack of security innovation has led to several cyberattacks over the years, causing businesses to bolt on additional security measures and added complexity. AD is not going away any time soon, but the security dilemma can be addressed with added security features.

      AD event logs

      84% of organizations that had a breach had evidence of that breach in their event logs.

      Source: Verizon Data Breach Report, 2012

      What is the business risk

      How does AD impact innovation in your business?

      It’s widely estimated that Active Directory remains at the backbone of 90% of Global Fortune 1000 companies’ business infrastructure (Lepide, 2021), and with that comes risk. The risks include:

      • Constraints of AD and growth of your digital footprint
      • Difficulty integrating modern technologies
      • Difficulty maintaining consistent security policies
      • Inflexible central domains preventing innovation and modernization
      • Inability to move to a self-service password portal
      • Vulnerability to being hacked
      • BYOD not being AD friendly

      AD is dependent on Windows Server

      1. Even though AD is compliant with LDAP, software vendors often choose optional features of LDAP that are not supported by AD. It is possible to implement Kerberos in a Unix system and establish trust with AD, but this is a difficult process and mistakes are frequent.
      2. Restricting your software selection to Windows-based systems reduces innovation and may hamper your ability to purchase best-in-class applications.

      Azure AD is not a replacement for AD

      AD was designed for an on-premises enterprise

      The image contains a screenshot of a Azure AD diagram.

      • Despite Microsoft’s Azure becoming prominent in the world of cloud services, Azure AD is not a replacement for on-premises AD.
      • In fact, Microsoft itself has an architecture to mitigate the shortcomings of Azure AD by recommending organizations migrate to a hybrid model, especially those businesses that have an in-house footprint of servers and applications.
      • If you are a greenfield business and intend to take advantage of SaaS, IaaS, and PaaS, as well as Microsoft 365 in Azure, then Azure AD is for you and you don’t have to worry about the need for AD.

      "Azure Active Directory is not designed to be the cloud version of Active Directory. It is not a domain controller or a directory in the cloud that will provide the exact same capabilities with AD. It actually provides many more capabilities in a different way.

      That’s why there is no actual ‘migration’ path from Active Directory to Azure Active Directory. You can synchronize your on-premises directories (Active Directory or other) to Azure Active Directory but not migrate your computer accounts, group policies, OU etc."

      – Gregory Hall,
      Brand Representative for Microsoft
      (Source: Spiceworks)

      The hybrid model for AD and Azure AD

      How the model works

      The image contains a screenshot of a hybrid model for AD and Azure AD.

      Note: AD Federated Services (ADFS) is not a replacement for AD. It’s a bolt-on that requires maintenance, support, and it is not a liberating service.

      Many companies are:

      • Moving to SaaS solutions for customer relationship management, HR, collaboration, voice communication, file storage, and more.
      • Managing non-Windows devices.
      • Moving to a hybrid model of work.
      • Enabling BYOD.

      Given these trends, Active Directory is becoming obsolete in terms of identity management and permissions.

      The difference between AD Domain Services and Azure AD DS

      One of the core principles of Azure AD is that the user is the security boundary, not the network.

      Kerberos is the default authentication and authorization protocol for AD. Kerberos is involved in nearly everything from the time you log on to accessing Sysvol, which is used to deliver policy and logon scripts to domain members from the Domain Controller.

      Info-Tech Insight

      If you are struggling to get away from AD, Kerberos and NTML are to blame. Working around them is difficult. Azure AD uses SAML2.0 OpenID Connect and OAuth2.0.

      Feature Azure AD DS Self-managed AD DS
      Managed service
      Secure deployments Administrator secures the deployment
      DNS server ✓ (managed service)
      Domain or Enterprise administrator privileges
      Domain join
      Domain authentication using NTLM and Kerberos
      Kerberos-constrained delegation Resource-based Resource-based and account-based
      Custom OU structure
      Group Policy
      Schema extensions
      AD domain/forest trusts ✓ (one-way outbound forest trusts only)
      Secure LDAP (LDAPS)
      LDAP read
      LDAP write ✓ (within the managed domain)
      Geo-distributed deployments

      Source: “Compare self-managed Active Directory Domain Services...” Azure documentation, 2022

      Impact of work-from-anywhere

      How AD poses issues that impact the user experience

      IT organizations are under pressure to enable work-from-home/work-from-anywhere.

      • IT teams regard legacy infrastructure, namely Active Directory, as inadequate to securely manage remote workloads.
      • While organizations previously used VPNs to access resources through Active Directory, they now have complex webs of applications that do not reside on premises, such as AWS, G-Suite, and SaaS customer relationship management and HR management systems, among others. These resources live outside the Windows ecosystem, complicating user provisioning, management, and security.
      • The work environment has changed since the start of COVID-19, with businesses scrambling to enable work-from-home. This had a huge impact on on-premises identity management tools such as AD, exposing their limitations and challenges. IT admins are all too aware that AD does not meet the needs of work-from-home.
      • As more IT organizations move infrastructure to the cloud, they have the opportunity to move their directory services to the cloud as well.
        • JumpCloud, OneLogin, Okta, Azure AD, G2, and others can be a solution for this new way of working and free up administrators from the overloaded AD environment.
        • Identity and access management (IAM) can be moved to the cloud where the modern infrastructure lives.
        • Alternatives for printers using AD include Google Cloud Print, PrinterOn, and PrinterLogic.

      How AD can impact your migration to Microsoft 365

      The beginning of your hybrid environment

      • Businesses that have a large on-premises footprint have very few choices for setting up a hybrid environment that includes their on-premises AD and Azure AD synchronization.
      • Microsoft 365 uses Azure AD in the background to manage identities.
      • Azure AD Connect will need to be installed, along with IdFix to identify errors such as duplicates and formatting problems in your AD.
      • Password hash should be implemented to synchronize passwords from on-premises AD so users can sign in to Azure without the need for additional single sign-on infrastructure.
      • Azure AD Connect synchronizes accounts every 30 minutes and passwords within two minutes.

      Alternatives to AD

      When considering retiring Active Directory from your environment, look at alternatives that can assist with those legacy application servers, handle Kerberos and NTML, and support LDAP.

      • JumpCloud: Cloud-based directory services. JumpCloud provides LDAP-as-a-Service and RADIUS-as-a-Service. It authenticates, authorizes, and manages employees, their devices, and IT applications. However, domain name changes are not supported.
      • Apache Directory Studio Pro: Written in Java, it supports LDAP v3–certified directory services. It is certified by Eclipse-based database utilities. It also supports Kerberos, which is critical for legacy Microsoft AD apps authentication.
      • Univention Corporate Server (UCS): Open-source Linux-based solution that has a friendly user interface and gets continuous security and feature updates. It supports Kerberos V5 and LDAP, works with AD, and is easy to sync. It also supports DNS server, DHCP, multifactor authentication and single sign-on, and APIs and REST APIs. However, it has a limited English knowledgebase as it is a German tool.

      What to look for

      If you are embedded in Windows systems but looking for an alternative to AD, you need a similar solution but one that is capable of working in the cloud and on premises.

      Aside from protocols and supporting utilities, also consider additional features that can help you retire your Active Directory while maintaining highly secure access control and a strong security posture.

      These are just a few examples of the many alternatives available.

      Market drivers to modernize your infrastructure

      The business is now driving your Active Directory migration

      What IT must deal with in the modern world of work:

      • Leaner footprint for evolving tech trends
      • Disaster recovery readiness
      • Dynamic compliance requirements
      • Increased security needs
      • The need to future-proof
      • Mergers and acquisitions
      • Security extending the network beyond Windows

      Organizations are making decisions that impact Active Directory, from enabling work-from-anywhere to dealing with malicious threats such as ransomware. Mergers and acquisitions also bring complexity with multiple AD domains.
      The business is putting pressure on IT to become creative with security strategies, alternative authentication and authorization, and migration to SaaS and cloud services.

      Activity

      Build a checklist to migrate off Active Directory.

      Discovery

      Assessment

      Proof of Concept

      Migration

      Cloud Operations

      ☐ Catalog your applications.

      ☐ Define your users, groups and usage.

      ☐ Identify network interdependencies and complexity.

      ☐ Know your security and compliance regulations.

      ☐ Document your disaster recovery plan and recovery point and time objectives (RPO/RTO).

      ☐ Build a methodology for migrating apps to IaaS.

      ☐ Develop a migration team using internal resources and/or outsourcing.

      ☐ Use Microsoft resources for specific skill sets.

      ☐ Map on-premises third-party solutions to determine how easily they will migrate.

      ☐ Create a plan to retire and archive legacy data.

      ☐ Test your workload: Start small and prove value with a phased approach.

      ☐ Estimate cloud costs.

      ☐ Determine the amount and size of your compute and storage requirements.

      ☐ Understand security requirements and the need for network and security controls.

      ☐ Assess network performance.

      ☐ Qualify and test the tools and solutions needed for the migration.

      ☐ Create a blueprint of your desired cloud environment.

      ☐ Establish a rollback plan.

      ☐ Identify tools for automating migration and syncing data.

      ☐ Understand the implications of the production-day data move.

      ☐ Keep up with the pace of innovation.

      ☐ Leverage 24/7 support via skilled Azure resources.

      ☐ Stay on top of system maintenance and upgrades.

      ☐ Consider service-level agreement requirements, governance, security, compliance, performance, and uptime.

      Related Info-Tech Research

      Manage the Active Directory in the Service Desk

      • Build and maintain your Active Directory with good data.
      • Actively maintaining the Active Directory is a difficult task that only gets more difficult with issues like stale accounts and privilege creep.

      SoftwareReviews: Microsoft Azure Active Directory

      • The Azure Active Directory (Azure AD) enterprise identity service provides SSO and multifactor authentication to help protect your users from 99.9% of cybersecurity attacks

      Define Your Cloud Vision

      • Don’t think about the cloud as an inevitable next step for all workloads. The cloud is merely another tool in the toolbox, ready to be used when appropriate and put away when it’s not needed. Cloud-first isn’t always the way to go.

      Bibliography

      “2012 Data Breach Investigations Report.” Verizon, 2012. Web.
      “2022 Data Breach Investigations Report.” Verizon, 2012. Web.
      “22 Best Alternatives to Microsoft Active Directory.” The Geek Page, 16 Feb 2022. Accessed 12 Sept. 2022.
      Altieri, Matt. “Infrastructure Technical Debt.” Device 42, 20 May 2019. Accessed Sept 2022.
      “Are You Ready to Make the Move from ADFS to Azure AD?’” Steeves and Associates, 29 April 2021. Accessed 28 Sept. 2022.
      Blanton, Sean. “Can I Replace Active Directory with Azure AD? No, Here’s Why.” JumpCloud, 9 Mar 2021. Accessed Sept. 2022.
      Chai, Wesley, and Alexander S. Gillis. “What is Active Directory and how does it work?” TechTarget, June 2021. Accessed 10 Sept. 2022.
      Cogan, Sam. “Azure Active Directory is not Active Directory!” SamCogan.com, Oct 2020. Accessed Sept. 2022.
      “Compare Active Directory to Azure Active Directory.” Azure documentation, Microsoft Learn, 18 Aug. 2022. Accessed 12 Sept. 2022.
      "Compare self-managed Active Directory Domain Services, Azure Active Directory, and managed Azure Active Directory Domain Services." Azure documentation, Microsoft Learn, 23 Aug. 2022. Accessed Sept. 2022.
      “Dimensional Research, Active Directory Modernization: A Survey of IT Professionals.” Quest, 2017. Accessed Sept 2022.
      Grillenmeier, Guido. “Now’s the Time to Rethink Active Directory Security.“ Semperis, 4 Aug 2021. Accessed Oct. 2013.
      “How does your Active Directory align to today’s business?” Quest Software, 2017, accessed Sept 2022
      Lewis, Jack “On-Premises Active Directory: Can I remove it and go full cloud?” Softcat, Dec.2020. Accessed 15 Sept 2022.
      Loshin, Peter. “What is Kerberos?” TechTarget, Sept 2021. Accessed Sept 2022.
      Mann, Terry. “Why Cybersecurity Must Include Active Directory.” Lepide, 20 Sept. 2021. Accessed Sept. 2022.
      Roberts, Travis. “Azure AD without on-prem Windows Active Directory?” 4sysops, 25 Oct. 2021. Accessed Sept. 2022.
      “Understanding Active Directory® & its architecture.” ActiveReach, Jan 2022. Accessed Sept. 2022.
      “What is Active Directory Migration?” Quest Software Inc, 2022. Accessed Sept 2022.

      External Compliance

      • Buy Link or Shortcode: {j2store}39|cart{/j2store}
      • Related Products: {j2store}39|crosssells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security and Risk
      • Parent Category Link: /security-and-risk
      Take Control of Compliance Improvement to Conquer Every Audit

      Master Contract Review and Negotiation for Software Agreements

      • Buy Link or Shortcode: {j2store}170|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Internal stakeholders usually have different – and often conflicting – needs and expectations that require careful facilitation and management.
      • Vendors have well-honed negotiating strategies. Without understanding your own position and leverage points, it’s difficult to withstand their persuasive – and sometimes pushy – tactics.
      • Software – and software licensing – is constantly changing, making it difficult to acquire and retain subject matter expertise.

      Our Advice

      Critical Insight

      • Conservatively, it’s possible to save 5% of the overall IT budget through comprehensive software contract review.
      • Focus on the terms and conditions, not just the price.
      • Learning to negotiate is crucial.

      Impact and Result

      • Look at your contract holistically to find cost savings.
      • Guide communication between vendors and your organization for the duration of contract negotiations.
      • Redline the terms and conditions of your software contract.
      • Prioritize crucial terms and conditions to negotiate.

      Master Contract Review and Negotiation for Software Agreements Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to redline and negotiate your software agreement, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Gather requirements

      Build and manage your stakeholder team, then document your business use case.

      • Master Contract Review and Negotiation for Software Agreements – Phase 1: Gather Requirements
      • RASCI Chart
      • Vendor Communication Management Plan
      • Software Business Use Case Template
      • SaaS TCO Calculator

      2. Redline contract

      Redline your proposed software contract.

      • Master Contract Review and Negotiation for Software Agreements – Phase 2: Redline Contract
      • Software Terms & Conditions Evaluation Tool
      • Software Buyer's Checklist

      3. Negotiate contract

      Create a thorough negotiation plan.

      • Master Contract Review and Negotiation for Software Agreements – Phase 3: Negotiate Contract
      • Controlled Vendor Communications Letter
      • Key Vendor Fiscal Year End Calendar
      • Contract Negotiation Tactics Playbook
      [infographic]

      Workshop: Master Contract Review and Negotiation for Software Agreements

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Collect and Review Data

      The Purpose

      Assemble documentation.

      Key Benefits Achieved

      Understand current position before going forward.

      Activities

      1.1 Assemble existing contracts.

      1.2 Document their strategic and tactical objectives.

      1.3 Identify current status of the vendor relationship and any historical context.

      1.4 Clarify goals for ideal future state.

      Outputs

      Business Use Case

      2 Define Business Use Case and Build Stakeholder Team

      The Purpose

      Define business use case and build stakeholder team.

      Key Benefits Achieved

      Create business use case to document functional and nonfunctional requirements.

      Build internal cross-functional stakeholder team to negotiate contract.

      Activities

      2.1 Establish negotiation team and define roles.

      2.2 Write communication plan.

      2.3 Complete business use case.

      Outputs

      RASCI Chart

      Vendor Communication Management Plan

      SaaS TCO Calculator

      Software Business Use Case

      3 Redline Contract

      The Purpose

      Examine terms and conditions and prioritize for negotiation.

      Key Benefits Achieved

      Discover cost savings.

      Improve agreement terms.

      Prioritize terms for negotiation.

      Activities

      3.1 Review general terms and conditions.

      3.2 Review license- and application-specific terms and conditions.

      3.3 Match to business and technical requirements.

      3.4 Redline agreement.

      Outputs

      Software Terms & Conditions Evaluation Tool

      Software Buyer’s Checklist

      4 Build Negotiation Strategy

      The Purpose

      Create a negotiation strategy.

      Key Benefits Achieved

      Establish controlled communication.

      Choose negotiation tactics.

      Plot negotiation timeline.

      Activities

      4.1 Review vendor- and application-specific negotiation tactics.

      4.2 Build negotiation strategy.

      Outputs

      Contract Negotiation Tactics Playbook

      Controlled Vendor Communications Letter

      Key Vendor Fiscal Year End Calendar

      Into the Metaverse

      • Buy Link or Shortcode: {j2store}95|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Define the metaverse.
      • Understand where Meta and Microsoft are going and what their metaverse looks like today.
      • Learn about other solution providers implementing the enterprise metaverse.
      • Identify risks in deploying metaverse solutions and how to mitigate them.

      Our Advice

      Critical Insight

      • A metaverse experience must combine the three Ps: user presence is represented, the world is persistent, and data is portable.

      Impact and Result

      • Understand how Meta and Microsoft define the Metaverse and the coming challenges that enterprises will need to solve to harness this new digital capability.

      Into the Metaverse Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Into the Metaverse – A deck that examines how IT can prepare for the new digital world

      Push past the hype and understand what the metaverse really means for IT.

      • Into the Metaverse Storyboard

      Infographic

      Further reading

      Into the Metaverse

      How IT can prepare for the new digital world.

      Analyst Perspective

      The metaverse is still a vision of the future.

      Photo of Brian Jackson, Research Director, CIO, Info-Tech Research Group.

      On October 28, 2021, Mark Zuckerberg got up on stage and announced Facebook's rebranding to Meta and its intent to build out a new business line around the metaverse concept. Just a few days later, Microsoft's CEO Satya Nadella put forward his own idea of the metaverse at Microsoft Ignite. Seeing two of Silicon Valley's most influential companies pitch a vision of avatar-driven virtual reality collaboration sparked our collective curiosity. At the heart of it lies the question, "What is the metaverse, anyway?“

      If you strip back the narrative of the companies selling you the solutions, the metaverse can be viewed as technological convergence. Years of development on mixed reality, AI, immersive digital environments, and real-time communication are culminating in a totally new user experience. The metaverse makes the digital as real as the physical. At least, that's the vision.

      It will be years yet before the metaverse visions pitched to us from Silicon Valley stages are realized. In the meantime, understanding the individual technologies contributing to that vision can help CIOs realize business value today. Join me as we delve into the metaverse.

      Brian Jackson
      Research Director, CIO
      Info-Tech Research Group

      From pop culture to Silicon Valley

      Sci-fi visionaries are directly involved in creating the metaverse concept

      The term “metaverse” was coined by author Neal Stephenson in the 1992 novel “Snow Crash.” In the novel, main character Hiro Protagonist interacts with others in a digitally defined space. Twenty-five years after its release, the cult classic is influential among Silicon Valley's elite. Stephenson has played some key roles in Silicon Valley firms. He became the first employee at Blue Origin, the space venture founded by Jeff Bezos, in 2006, and later became chief futurist at augmented reality firm Magic Leap in 2014. Stephenson also popularized the Hindu concept "avatar" in his writing, paving the way for people to embody digitally rendered models to participate in the metaverse (Vanity Fair, 2017).

      Even earlier concepts of the metaverse were examined in the 1980s, with William Gibson’s “Neuromancer” exploring the same idea as cyberspace. Gibson's novel was influenced by his time in Seattle, where friend and Microsoft executive Eileen Gunn took him to hacker bars where he'd eavesdrop on "the poetics of the technological subculture" (Medium, 2022). Other visions of a virtual reality mecca were brought to life in the movies, including the 1982 Disney release “Tron,” the 1999 flick “The Matrix,” and 2018’s “Ready Player One.”

      There's a common set of traits among these sci-fi narratives that help us understand what Silicon Valley tech firms are now set to commercialize: users interact with one another in a digitally rendered virtual world, with a sense of presence provided through the use of a head-mounted display.

      Cover of the book Snow Crash by Neal Stephenson.

      Image courtesy nealstephenson.com

      Meta’s view of the metaverse

      CEO Mark Zuckerberg rebranded Facebook to make his intent clear

      Mark Zuckerberg is all in on the metaverse, announcing October 28, 2021, that Facebook would be rebranded to Meta. The new brand took effect on December 1, and Facebook began trading under the new stock ticker MVRS on certain exchanges. On February 15, 2022, Zuckerberg announced at a company meeting that his employees will be known as Metamates. The company's new values are to live in the future, build awesome things, and focus on long-term impact. Its motto is simply "Meta, Metamates, me" (“Out With the Facebookers. In With the Metamates,” The New York Times, 2022).

      Meta's Reality Labs division will be responsible for developing its metaverse product, using Meta Quest, its virtual reality head-mounted displays. Meta's early metaverse environment, Horizon Worlds, rolled out to Quest users in the US and Canada in early December 2021. This drove a growth in its monthly user base by ten times, to 300,000 people. The product includes Horizon Venues, tailored to attending live events in VR, but not Horizon Workrooms, a VR conferencing experience that remains invite-only. Horizon Worlds provides users tools to construct their own 3D digital environments and had been used to create 10,000 separate worlds by mid-February 2022 (“Meta’s Social VR Platform Horizon Hits 300,000 Users,“ The Verge, 2022).

      In the future, Meta plans to amplify the building tools in its metaverse platform with generative AI. For example, users can give speech commands to create scenes and objects in VR. Project CAIRaoke brings a voice assistant to an augmented reality headset that can help users complete tasks like cooking a stew. Zuckerberg also announced Meta is working on a universal speech translator across all languages (Reuters, 2022).

      Investment in the metaverse:
      $10 billion in 2021

      Key People:
      CEO Mark Zuckerberg
      CTO Andrew Bosworth
      Chief Product Officer Chris Cox

      (Source: “Meta Spent $10 Billion on the Metaverse in 2021, Dragging Down Profit,” The New York Times, 2022)

      Microsoft’s view of the metaverse

      CEO Satya Nadella showcased a mixed reality metaverse at Microsoft Ignite

      In March 2021 Microsoft announced Mesh, an application that allows organizations to build out a metaverse environment. Mesh is being integrated into other Microsoft hardware and software, including its head-mounted display, the HoloLens, a mixed reality device. The Mesh for HoloLens experience allows users to collaborate around digital content projected into the real world. In November, Microsoft announced a Mesh integration with Microsoft Teams. This integration brings users into an immersive experience in a fully virtual world. This VR environment makes use of AltspaceVR, a VR application Microsoft first released in May 2015 (Microsoft Innovation Stories, 2021).

      Last Fall, Microsoft also announced it is rebranding its Dynamics 365 Connected Store solution to Dynamics 365 Connected Spaces, signaling its expansion from retail to all spaces. The solution uses cognitive vision to create a digital twin of an organization’s physical space and generate analytics about people’s behavior (Microsoft Dynamics 365 Blog, 2021).

      In the future, Microsoft wants to make "holoportation" a part of its metaverse experience. Under development at Microsoft Research, the technology captures people and things in photorealistic 3D to be projected into mixed reality environments (Microsoft Research, 2022). It also has plans to offer developers AI-powered tools for avatars, session management, spatial rendering, and synchronization across multiple users. Open standards will allow Mesh to be accessed across a range of devices, from AR and VR headsets, smartphones, tablets, and PCs.

      Microsoft has been developing multi-user experiences in immersive 3D environments though its video game division for more than two decades. Its capabilities here will help advance its efforts to create metaverse environments for the enterprise.

      Investment in the metaverse:
      In January 2022, Microsoft agreed to acquire Activision Blizzard for $68.7 billion. In addition to acquiring several major gaming studios for its own gaming platforms, Microsoft said the acquisition will play a key role in the development of its metaverse.

      Key People:
      CEO Satya Nadella
      CEO of Microsoft Gaming Phil Spencer
      Microsoft Technical Research Fellow Alex Kipman

      Current state of metaverse applications from Meta and Microsoft

      Meta

      • Horizon Worlds (formerly Facebook Horizon). Requires an Oculus Rift S or Quest 2 headset to engage in an immersive 3D world complete with no-code building tools for users to construct their own environments. Users can either interact in the space designed by Meta or travel to other user-designed worlds through the plaza.
      • Horizon Workrooms (beta, invite only). An offshoot of Horizon Worlds but more tailored for business collaboration. Users can bring in their physical desks and keyboards and connect to PC screens from within the virtual setting. Integrates with Facebook’s Workplace solution.

      Microsoft

      • Dynamics 365 Connected Spaces (preview). Cognitive vision combined with surveillance cameras provide analytics on people's movement through a facility.
      • Mesh for Microsoft Teams (not released). Collaborate with your colleagues in a virtual reality space using personalized avatars. Use new 2D and 3D meeting experiences.
      • Mesh App for HoloLens (preview). Interact with colleagues virtually in a persistent digital environment that is overlaid on top of the real world.
      • AltspaceVR. A VR space accessible via headset or desktop computer that's been available since 2015. Interact through use of an avatar to participate in daily events

      Current providers of an “enterprise metaverse”

      Other providers designing mixed reality or digital twin tools may not have used the “metaverse” label but provide the same capabilities via platforms

      Logo for NVIDIA Omniverse. Logo for TeamViewer.
      NVIDIA Omniverse
      “The metaverse for engineers,” Omniverse is a developer toolset to allow organizations to build out their own unique metaverse visions.
      • Omniverse Nucleus is the platform database that allows clients to publish digital assets or subscribe to receive changes to them in real-time.
      • Omniverse Connectors are used to connect to Nucleus and publish or subscribe to individual assets and entire worlds.
      • NVIDIA’s core physics engine provides a scalable and physically accurate world simulation.
      TeamViewer’s Remote as a Service Platform
      Initially focusing on providing workers remote connectivity to work desktops, devices, and robotics, TeamViewer offers a range of software as a service products. Recent acquisitions to this platform see it connecting enterprise workflows to frontline workers using mixed reality headsets and adding more 3D visualization development tools to create digital twins. Clients include Coca-Cola and BMW.

      “The metaverse matters in the future. TeamViewer is already making the metaverse tangible in terms of the value that it brings.” (Dr. Hendrik Witt, Chief Product Officer, TeamViewer)

      The metaverse is a technological convergence

      The metaverse is a platform combining multiple technologies to enable social and economic activity in a digital world that is connected to the physical world.

      A Venn diagram with four circles intersecting and one circle unconnected on the side, 'Blockchain, Emerging'. The four circles, clock-wise from top, are 'Artificial Intelligence', 'Real-Time Communication', 'Immersive Digital Space', and 'Mixed Reality'. The two-circle crossover sections, clock-wise from top-right are AI + RTC: 'Smart Agent-Facilitated Communication', RTC + IDS: 'Avatar-Based Social Interaction', IDS + MR: 'Digital Immersive UX', and MR + AI: 'Perception AI'. There are only two three-circle crossover sections labelled, AI + RTC + MR: 'Generative Sensory Environments' and RTC + IDS + MR: 'Presence'. The main cross-section is 'METAVERSE'.

      Info-Tech Insight

      A metaverse experience must combine the three P’s: user presence is represented, the world is persistent, and data is portable.

      Mixed reality provides the user experience (UX) for the metaverse

      Both virtual and augmented reality will be part of the picture

      Mixed reality encompasses both virtual reality and augmented reality. Both involve allowing users to immerse themselves in digital content using a head-mounted device or with a smartphone for a less immersive effect. Virtual reality is a completely digital world that is constructed as separate from the physical world. VR headsets take up a user's entire field of vision and must also have a mechanism to allow the user to interact in their virtual environment. Augmented reality is a digital overlay mapped on top of the real world. These headsets are transparent, allowing the user to clearly see their real environment, and projects digital content on top of it. These headsets must have a way to map the surrounding environment in 3D in order to project digital content in the right place and at the right scale.

      Meta’s Plans

      Meta acquired virtual reality developer Oculus VR Inc. and its set of head-mounted displays in 2014. It continues to develop new hardware under the Oculus brand, most recently releasing the Oculus Quest 2. Oculus Quest hardware is required to access Meta's early metaverse platform, Horizon Worlds.

      Microsoft’s Plans

      Microsoft's HoloLens hardware is a mixed reality headset. Its visor that can project digital content into the main portion of the user's field of vision and speakers capable of spatial audio. The HoloLens has been deployed at enterprises around the world, particularly in scenarios where workers typically have their hands busy. For example, it can be used to view digital schematics of a machine while a worker is performing maintenance or to allow a remote expert to "see through the eyes" of a worker.

      Microsoft's Mesh metaverse platform, which allows for remote collaboration around digital content, was demonstrated on a HoloLens at Microsoft Ignite in November 2021. Mesh is also being integrated into AltspaceVR, an application that allows companies to hold meetings in VR with “enterprise-grade security features including secure sign-ins, session management and privacy compliance" (Microsoft Innovation Stories, 2021).

      Immersive digital environments provide context in the metaverse

      The interactive environment will be a mix of digital and physical worlds

      If you've played a video game in the past decade, you've experienced an immersive 3D environment, perhaps even in a multiplayer environment with many other users at the same time. The video game industry grew quickly during the pandemic, with users spending more time and money on video games. Massive multiplayer online games like Fortnite provide more than a gaming environment. Users socialize with their friends and attend concerts featuring famous performers. They also spend money on different appearances or gestures to express themselves in the environment. When they are not playing the game, they are often watching other players stream their experience in the game. In many ways, the consumer metaverse already exists on platforms like Fortnite. At the same time, gaming developers are improving the engines for these experiences and getting closer to approximating the real world both visually and in terms of physics.

      In the enterprise space, immersive 3D environments are also becoming more popular. Manufacturing firms are building digital twins to represent entire factories, modeling their real physical environments in digital space. For example, BMW’s “factory of the future” uses NVIDIA Omniverse to create a digital twin of its assembly system, simulated down to the detail of digital workers. BMW uses this simulation to plan reconfiguration of its factory to accommodate new car models and to train robots with synthetic data (“NVIDIA Omniverse,” NVIDIA, 2021).

      Meta’s Plans

      Horizon Workrooms is Meta's business-focused application of Horizon Worlds. It facilitates a VR workspace where colleagues can interact with others’ avatars, access their computer, use videoconferencing, and sketch out ideas on a whiteboard. With the Oculus Quest 2 headset, passthrough mode allows users to add their physical desk to the virtual environment (Oculus, 2022).

      Microsoft’s Plans

      AltspaceVR is Microsoft's early metaverse environment and it can be accessed with Oculus, HTC Vive, Windows Mixed Reality, or in desktop mode. Separately, Microsoft Studios has been developing digital 3D environments for its Xbox video game platform for yeas. In January 2022, Microsoft acquired games studio Activision Blizzard for $68.7 billion, saying the games studio would play a key role in the development of the metaverse.

      Real-time communications allow for synchronous collaboration

      Project your voice to a room full of avatars for a presentation or whisper in someone’s ear

      If the metaverse is going to be a good place to collaborate, then communication must feel as natural as it does in the real world. At the same time, it will need to have a few more controls at the users’ disposal so they can focus in on the conversation they choose. Audio will be a major part of the communication experience, augmented by expressive avatars and text.

      Mixed reality headsets come with integrated microphones and speakers to enable voice communications. Spatial audio will also be an important component of voice exchange in the metaverse. When you are in a videoconference conversation with 50 participants, every one of those people will sound as though they are sitting right next to you. In the metaverse, each person will sound louder or quieter based on how distant their avatar is from you. This will allow large groups of people to get together in one digital space and have multiple conversations happening simultaneously. In some situations, there will also be a need for groups to form a “party” as they navigate the metaverse, meaning they would stay linked through a live audio connection even if their avatars were not in the same digital space. Augmented reality headsets also allow remote users to “see through the eyes” of the person wearing the headset through a front-facing camera. This is useful for hands-on tasks where expert guidance is required.

      People will also need to communicate with people not in the metaverse. More conventional videoconference windows or chat boxes will be imported into these environments as 2D panels, allowing users to integrate them into the context of their digital space.

      Meta’s Plans

      Facebook Messenger is a text chat and video chat application that is already integrated into Facebook’s platform. Facebook also owns WhatsApp, a messaging platform that offers group chat and encrypted messaging.

      Microsoft’s Plans

      Microsoft Teams is Microsoft’s application that combines presence-based text chat and videoconferencing between individuals and groups. Dynamics 365 Remote Assist is its augmented reality application designed for HoloLens wearers or mobile device users to share their real-time view with experts.

      Generative AI will fill the metaverse with content at the command of the user

      No-code and low-code creation tools will be taken to the next level in the metaverse

      Metaverse platforms provide users with no-code and low-code options to build out their own environments. So far this looks like playing a game of Minecraft. Users in the digital environment use native tools to place geometric shapes and add textures. Other metaverse platforms allow users to design models or textures with tools outside the platform, often even programming behaviors for the objects, and then import them into the metaverse. These tools can be used effectively, but it can be a tedious way to create a customized digital space.

      Generative AI will address that by taking direction from users and quickly generating content to provide the desired metaverse setting. Generative AI can create content that’s meaningful based on natural inputs like language or visual information. For example, a user might give voice commands to a smart assistant and have a metaverse environment created or take photos of a real-world object from different angles to have its likeness digitally imported.

      Synthetic data will also play a role in the metaverse. Instead of relying only on people to create a lot of relevant data to train AI, metaverse platform providers will also use simulated data to provide context. NVIDIA’s Omniverse Replicator engine provides this capability and can be used to train self-driving cars and manipulator robots for a factory environment (NVIDIA Newsroom, 2021).

      Meta’s Plans

      Meta is planning to use generative AI to allow users to construct their VR environments. It will allow users to describe a world to a voice assistant and have it created for them. Users could also speak to each other in different languages with the aid of a universal translator. Separately, Project CAIRaoke combines cognitive vision with a voice assistant to help a user cook dinner. It keeps track of where the ingredients are in the kitchen and guides the user through the steps (Reuters, 2022).

      Microsoft’s Plans

      Microsoft Mesh includes AI resources to help create natural interactions through speech and vision learning models. HoloLens 2 already uses AI models to track users’ hands and eye movements as well as map content onto the physical world. This will be reinforced in the cloud through Microsoft Azure’s AI capabilities (Microsoft Innovation Stories, 2021).

      Blockchain will provide a way to manage digital identity and assets across metaverse platforms

      Users will want a way to own their metaverse identity and valued digital possessions

      Blockchain technology provides a decentralized digital ledger that immutably records transactions. A specific blockchain can either be permissioned, with one central party determining who gets access, or permissionless, in which anyone with the means can transact on the blockchain. The permissionless variety emerged in 2008 as the foundation of Bitcoin. It's been a disruptive force in the financial industry, with Bitcoin inspiring a long list of offshoot cryptocurrencies, and now even central banks are examining moving to a digital currency standard.

      In the past couple of years, blockchain has spurred a new economy around digital assets. Smart contracts can be used to create a token on a blockchain and bind it to a specific digital asset. These assets are called non-fungible tokens (NFTs). Owners of NFTs can prove their chain of ownership and sell their tokens to others on a variety of marketplaces.

      Blockchain could be useful in the metaverse to track digital identity, manage digital assets, and enable data portability. Users could register their own avatars as NFTs to prove they are the real person behind their digital representation. They may also want a way to verify they own a virtual plot of land or demonstrate the scarcity of the digital clothing they are wearing in the metaverse. If users want to leave a certain metaverse platform, they could export their avatar and digital assets to a digital wallet and transfer them to another platform that supports the same standards.

      In the past, centralized platforms that create economies in a virtual world were able to create digital currencies and sell specific assets to users without the need for blockchain. Second Life is a good example, with Linden Labs providing a virtual token called Linden Dollars that users can exchange to buy goods and services from each other within the virtual world. Second Life processes 345 million transactions a year for virtual goods and reports a GDP of $650 million, which would put it ahead of some countries (VentureBeat, 2022). However, the value is trapped within Second Life and can't be exported elsewhere.

      Meta’s Plans

      Meta ended its Diem project in early 2022, winding down its plan to offer a digital currency pegged to US dollars. Assets were sold to Silvergate Bank for $182 million. On February 24, blockchain developer Atmos announced it wanted to bring the project back to life. Composed of many of the original developers that created Diem while it was still a Facebook project, the firm plans to raise funds based on the pitch that the new iteration will be "Libra without Facebook“ (CoinDesk, 2022).

      Microsoft’s Plans

      Microsoft expanded its team of blockchain developers after its lead executive in this area stated the firm is closely watching cryptocurrencies and NFTs. Blockchain Director York Rhodes tweeted on November 8, 2021, that he was expanding his team and was interested to connect with candidates "obsessed with Turing complete, scarce programmable objects that you can own & transfer & link to the real world through a social contract.”

      The enterprise metaverse holds implications for IT across several functional areas

      Improve maturity in these four areas first

      • Infrastructure & Operations
        • Lay the foundation
      • Security & Risk
        • Mitigate the risks
      • Apps
        • Deploy the precursors
      • Data & BI
        • Prepare to integrate
      Info-Tech and COBIT5's IT Management & Governance Framework with processes arranged like a periodic table. Highlighted process groups are 'Infrastructure & Operations', 'Security & Risk', 'Apps', and 'Data & BI'.

      Infrastructure & Operations

      Make space for the metaverse

      Risks

      • Network congestion: Connecting more devices that will be delivering highly graphical content will put new pressures on networks. Access points will have more connections to maintain and transit pathways more bandwidth to accommodate.
      • Device fragmentation: Currently many different vendors are selling augmented reality headsets used in the enterprise, including Google, Epson, Vuzix, and RealWear. More may enter soon, creating various types of endpoints that have different capabilities and different points of failure.
      • New workflows: Enterprises will only be able to benefit from deploying mixed reality devices if they're able to make them very useful to workers. Serving up relevant information in the context of a hands-free interface will become a new competency for enterprises to master.

      Mitigations

      • Dedicated network: Some companies are avoiding the congestion issue by creating a separate network for IoT devices on different infrastructure. For example, they might complement the Wi-Fi network with a wireless network on 5G or LoRaWAN standards.
      • Partner with systems integrators: Solutions vendors bringing metaverse solutions to the enterprise are already working with systems integrator partners to overcome integration barriers. These vendors are solving the problems of delivering enterprise content to a variety of new mixed reality touchpoints and determining just the right information to expose to users, at the right time.

      Security & Risk

      Mitigate metaverse risks before they take root

      Risks

      • Broader attack surface: Adding new mixed reality devices to the enterprise network will create more potential points of ingress for a cyberattack. Previous enterprise experiences with IoT in the enterprise have seen them exploited as weak points and used to create botnets or further infiltrate company networks.
      • More data in transit: Enterprise data will be flowing between these new devices and sometimes outside the company firewall to remote connections. Data from industrial IoT could also be integrated into these solutions and exposed.
      • New fraud opportunities: When Web 1.0 was first rolling out, not every company was able to secure the rights to the URL address matching its brand. Those not quick enough on the draw saw "domain squatters" use their brand equity to negotiate for a big pay day or, worse yet, to commit fraud. With blockchain opening up similar new digital real estate in Web3, the same risk arises.

      Mitigations

      • Mobile device management (MDM): New mixed reality headsets can be secured using existing MDM solutions on the market.
      • Encryption: Encrypting data end to end as it flows between IoT devices ensures that even if it does leak, it's not likely to be useful to a hacker.
      • Stake your claim: Claiming your brand's name in new Web3 domains may seems tedious, but it is likely to be cheap and might save you a headache down the line.

      Apps

      Deploy to your existing touchpoints

      Risks

      • Learning curves: Using new metaverse applications to complete tasks and collaborate with colleagues won’t be a natural progression for everyone. New headsets, gesture-based controls, and learning how to navigate the metaverse will present hurdles for users to overcome before they can be productive.
      • Is there a dress code in the metaverse? Avatars in the metaverse won’t necessarily look like the people behind the controls. What new norms will be needed to ensure avatars are appropriate for a work setting?
      • Fragmentation: Metaverse experiences are already creating islands. Users of Horizon Worlds can’t connect with colleagues using AltspaceVR. Similar to the challenges around different videoconferencing software, users could find they are divided by applications.

      Mitigations

      • Introduce concepts over time: Ask users to experiment with meeting in a VR context in a small group before expanding to a companywide conference event. Or have them use a headset for a simple video chat before they use it to complete a task in the field.
      • Administrative controls: Ensure that employees have some boundaries when designing their avatars, enforced either through controls placed on the software or through policies from HR.
      • Explore but don’t commit: It’s early days for these metaverse applications. Explore opportunities that become available through free trials and new releases to existing software suites but maintain flexibility to pivot should the need arise.

      Data & BI

      Deploy to your existing touchpoints

      Risks

      • Interoperability: There is no established standard for digital objects or behaviors in the metaverse. Meta and Microsoft say they are committed to open standards that will ensure portability of data across platforms, but how that will be executed isn’t clear yet.
      • Privacy: Sending data to another platform carries risks that it will be exfiltrated and stored elsewhere, presenting some challenges for companies that need to be compliant with legislation such as GDPR.
      • High-fidelity models: 3D models with photorealistic textures will come with high CPU requirements to render properly. Some head-mounted displays will run into limitations.

      Mitigations

      • Adopt standard interfaces: Using open APIs will be the most common path to integrating enterprise systems to metaverse applications.
      • Maintain compliance: The current approach enterprises take to creating data lakes and presenting them to platforms will extend to the metaverse. Building good controls and anonymizing data that resides in these locations will enable firms to interact in new platforms and remain compliant.
      • Right-sized rendering: Providing enough data to a device to make it useful without overburdening the CPU will be an important consideration. For example, TeamViewer uses polygon reduction to display 3D models on lower-powered head-mounted displays.

      More Info-Tech research to explore

      CIO Priorities 2022
      Priorities to compete in the digital economy.

      Microsoft Teams Cookbook
      Recipes for best practices and use cases for Microsoft Teams.

      Run Better Meetings
      Hybrid, virtual, or in person – set meeting best practices that support your desired meeting norms.

      Double Your Organization’s Effectiveness With a Digital Twin
      Digital twin: A living, breathing reflection.

      Contributing experts

      Photo of Dr. Hendrik Witt, Chief Product Officer, TeamViewer

      Dr. Hendrik Witt
      Chief Product Officer,
      TeamViewer

      Photo of Kevin Tucker, Principal Research Director, Industry Practice, INFO-TECH RESEARCH GROUP

      Kevin Tucker
      Principal Research Director, Industry Practice,
      INFO-TECH RESEARCH GROUP

      Bibliography

      Cannavò, Alberto, and F. Lamberti. “How Blockchain, Virtual Reality and Augmented Reality Are Converging, and Why.” IEEE Consumer Electronics Magazine, vol. 10, no. 5, Sept. 2020, pp. 6-13. IEEE Xplore. Web.

      Culliford, Elizabeth. “Meta’s Zuckerberg Unveils AI Projects Aimed at Building Metaverse Future.” Reuters, 24 Feb. 2022. Web.

      Davies, Nahla. “Cybersecurity and the Metaverse: Pioneering Safely into a New Digital World.” GlobalSign Blog, 10 Dec. 2021. GlobalSign by GMO. Web.

      Doctorow, Cory. “Neuromancer Today.” Medium, 10 Feb. 2022. Web.

      Heath, Alex. “Meta’s Social VR Platform Horizon Hits 300,000 Users.” The Verge, 17 Feb. 2022. Web.

      “Holoportation™.” Microsoft Research, 22 Feb. 2022. Microsoft. Accessed 3 March 2022.

      Isaac, Mike. “Meta Spent $10 Billion on the Metaverse in 2021, Dragging down Profit.” The New York Times, 2 Feb. 2022. Web.

      Isaac, Mike, and Sheera Frenkel. “Out With the Facebookers. In With the Metamates.” The New York Times, 15 Feb. 2022. Web.

      Langston, Jennifer. “‘You Can Actually Feel like You’re in the Same Place’: Microsoft Mesh Powers Shared Experiences in Mixed Reality.” Microsoft Innovation Stories, 2 Mar. 2021. Microsoft. Web.

      “Maple Leaf Sports & Entertainment and AWS Team Up to Transform Experiences for Canadian Sports Fans.” Amazon Press Center, 23 Feb. 2022. Amazon.com. Accessed 24 Feb. 2022. Web.

      Marquez, Reynaldo. “How Microsoft Will Move To The Web 3.0, Blockchain Division To Expand.” Bitcoinist.com, 8 Nov. 2021. Web.

      Metinko, Chris. “Securing The Metaverse—What’s Needed For The Next Chapter Of The Internet.” Crunchbase News, 6 Dec. 2021. Web.

      Metz, Rachel Metz. “Why You Can’t Have Legs in Virtual Reality (Yet).” CNN, 15 Feb. 2022. Accessed 16 Feb. 2022.

      “Microsoft to Acquire Activision Blizzard to Bring the Joy and Community of Gaming to Everyone, across Every Device.” Microsoft News Center, 18 Jan. 2022. Microsoft. Web.

      Nath, Ojasvi. “Big Tech Is Betting Big on Metaverse: Should Enterprises Follow Suit?” Toolbox, 15 Feb. 2022. Accessed 24 Feb. 2022.

      “NVIDIA Announces Omniverse Replicator Synthetic-Data-Generation Engine for Training AIs.” NVIDIA Newsroom, 9 Nov. 2021. NVIDIA. Accessed 9 Mar. 2022.

      “NVIDIA Omniverse - Designing, Optimizing and Operating the Factory of the Future. 2021. YouTube, uploaded by NVIDIA, 13 April 2021. Web.

      Peters, Jay. “Disney Has Appointed a Leader for Its Metaverse Strategy.” The Verge, 15 Feb. 2022. Web.

      Robinson, Joanna. The Sci-Fi Guru Who Predicted Google Earth Explains Silicon Valley’s Latest Obsession.” Vanity Fair, 23 June 2017. Accessed 13 Feb. 2022.

      Scoble, Robert. “New Startup Mixes Reality with Computer Vision and Sets the Stage for an Entire Industry.” Scobleizer, 17 Feb. 2022. Web.

      Seward, Zack. “Ex-Meta Coders Raising $200M to Bring Diem Blockchain to Life: Sources.” CoinDesk, 24 Feb. 2022. Web.

      Shrestha, Rakesh, et al. “A New Type of Blockchain for Secure Message Exchange in VANET.” Digital Communications and Networks, vol. 6, no. 2, May 2020, pp. 177-186. ScienceDirect. Web.

      Sood, Vishal. “Gain a New Perspective with Dynamics 365 Connected Spaces.” Microsoft Dynamics 365 Blog, 2 Nov. 2021. Microsoft. Web.

      Takahashi, Dean. “Philip Rosedale’s High Fidelity Cuts Deal with Second Life Maker Linden Lab.” VentureBeat, 13 Jan. 2022 Web.

      “TeamViewer Capital Markets Day 2021.” TeamViewer, 10 Nov. 2021. Accessed 22 Feb. 2022.

      VR for Work. Oculus.com. Accessed 1 Mar. 2022.

      Wunderman Thompson Intelligence. “New Trend Report: Into the Metaverse.” Wunderman Thompson, 14 Sept. 2021. Accessed 16 Feb. 2022.

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud

      • Buy Link or Shortcode: {j2store}472|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Cloud Strategy
      • Parent Category Link: /cloud-strategy
      • The organization is planning to move resources to cloud or devise a networking strategy for their existing cloud infrastructure to harness value from cloud.
      • The right topology needs to be selected to deploy network level isolation, design the cloud for management efficiencies and provide access to shared services on cloud.
      • A perennial challenge for infrastructure on cloud is planning for governance vs flexibility which is often overlooked.

      Our Advice

      Critical Insight

      Don’t wait until the necessity arises to evaluate your networking in the cloud. Get ahead of the curve and choose the topology that optimizes benefits and supports organizational needs in the present and the future.

      Impact and Result

      • Define organizational needs and understand the pros and cons of cloud network topologies to strategize for the networking design.
      • Consider the layered complexities of addressing the governance vs. flexibility spectrum for your domains when designing your networks.

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Deck – A document to guide you through designing your network in the cloud.

      What cloud networking topology should you use? How do you provide access to shared resources in the cloud or hybrid infrastructure? What sits in the hub and what sits in the spoke?

      • Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Storyboard
      [infographic]

      Further reading

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud

      Don't revolve around a legacy design; choose a network design that evolves with the organization.

      Analyst Perspective

      Cloud adoption among organizations increases gradually across both the number of services used and the amount those services are used. However, network builders tend to overlook the vulnerabilities of network topologies, which leads to complications down the road, especially since the structures of cloud network topologies are not all of the same quality. A network design that suits current needs may not be the best solution for the future state of the organization.

      Even if on-prem network strategies were retained for ease of migration, it is important to evaluate and identify the cloud network topology that can not only elevate the performance of your infrastructure in the cloud, but also that can make it easier to manage and provision resources.

      An "as the need arises" strategy will not work efficiently since changing network designs will change the way data travels within your network, which will then need to be adopted to existing application architectures. This becomes more complicated as the number of services hosted in the cloud grows.

      Keep a network strategy in place early on and start designing your infrastructure accordingly. This gives you more control over your networks and eliminates the need for huge changes to your infrastructure down the road.

      This is a picture of Nitin Mukesh

      Nitin Mukesh
      Senior Research Analyst, Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      The organization is planning to move resources to the cloud or devise a networking strategy for their existing cloud infrastructure to harness value from the cloud.

      The right topology needs to be selected to deploy network level isolation, design the cloud for management efficiencies, and provide access to shared services in the cloud.

      A perennial challenge for infrastructure in the cloud is planning for governance vs. flexibility, which is often overlooked.

      Common Obstacles

      The choice of migration method may result in retaining existing networking patterns and only making changes when the need arises.

      Networking in the cloud is still new, and organizations new to the cloud may not be aware of the cloud network designs they can consider for their business needs.

      Info-Tech's Approach

      Define organizational needs and understand the pros and cons of cloud network topologies to strategize for the networking design.

      Consider the layered complexities of addressing the governance vs. flexibility spectrum for your domains when designing your networks.

      Insight Summary

      Don't wait until the necessity arises to evaluate your networking in the cloud. Get ahead of the curve and choose the topology that optimizes benefits and supports organizational needs in the present and future.

      Your challenge

      Selecting the right topology: Many organizations migrate to the cloud retaining a mesh networking topology from their on-prem design, or they choose to implement the mesh design leveraging peering technologies in the cloud without a strategy in place for when business needs change. While there may be many network topologies for on-prem infrastructure, the network design team may not be aware of the best approach in cloud platforms for their requirements, or a cloud networking strategy may even go overlooked during the migration.

      Finding the right cloud networking infrastructure for:

      • Management efficiencies
      • Network-level isolation of resources
      • Access to shared services

      Deciding between governance and flexibility in networking design: In the hub and spoke model, if a domain is in the hub, the greater the governance over it, and if it sits in the spoke, the higher the flexibility. Having a strategy for the most important domains is key. For example, some security belongs in the hub and some security belongs in the spoke. The tradeoff here is if it sits completely in the spoke, you give it a lot of freedom, but it becomes harder to standardize across the organization.

      Mesh network topology

      A mesh is a design where virtual private clouds (VPCs) are connected to each other individually creating a mesh network. The network traffic is fast and can be redirected since the nodes in the network are interconnected. There is no hierarchical relationship between the networks, and any two networks can connect with each other directly.

      In the cloud, this design can be implemented by setting up peering connections between any two VPCs. These VPCs can also be set up to communicate with each other internally through the cloud service provider's network without having to route the traffic via the internet.

      While this topology offers high redundancy, the number of connections grows tremendously as more networks are added, making it harder to scale a network using a mesh topology.

      Mesh Network on AWS

      This is an image of a Mesh Network on AWS

      Source: AWS, 2018

      Constraints

      The disadvantages of peering VPCs into a mesh quickly arise with:

      • Transitive connections: Transitive connections are not supported in the cloud, unlike with on-prem networking. This means that if there are two networks that need to communicate, a single peering link can be set up between them. However, if there are more than two networks and they all need to communicate, they should all be connected to each other with separate individual connections.
      • Cost of operation: The lack of transitive routing requires many connections to be set up, which adds up to a more expensive topology to operate as the number of networks grows. Cloud providers also usually limit the number of peering networks that can be set up, and this limit can be hit with as few as 100 networks.
      • Management: Mesh tends to be very complicated to set up, owing to the large number of different peering links that need to be established. While this may be manageable for small organizations with small operations, for larger organizations with robust cybersecurity practices that require multiple VPCs to be deployed and interconnected for communications, mesh opens you up to multiple points of failure.
      • Redundancy: With multiple points of failure already being a major drawback of this design, you also cannot have more than one peered connection between any two networks at the same time. This makes designing your networking systems for redundancy that much more challenging.
      Number of virtual networks 10 20 50 100
      Peering links required
      [(n-1)*n]/2
      45 190 1225 4950

      Proportional relationship of virtual networks to required peering links in a mesh topology

      Case study

      INDUSTRY: Blockchain
      SOURCE: Microsoft

      An organization with four members wants to deploy a blockchain in the cloud, with each member running their own virtual network. With only four members on the team, a mesh network can be created in the cloud with each of their networks being connected to each other, adding up to a total of 12 peering connections (four members with three connections each). While the members may all be using different cloud accounts, setting up connections between them will still be possible.

      The organization wants to expand to 15 members within the next year, with each new member being connected with their separate virtual networks. Once grown, the organization will have a total of 210 peering connections since each of the virtual networks will then need 14 peering connections. While this may still be possible to deploy, the number of connections makes it harder to manage and would be that much more difficult to deploy if the organization grows to even 30 or 40 members. The new scale of virtual connections calls for an alternative networking strategy that cloud providers offer – the hub and spoke topology.

      This is an image of the connections involved in a mesh network with four participants.

      Source: Microsoft, 2017

      Hub and spoke network topology

      In hub and spoke network design, each network is connected to a central network that facilitates intercommunication between the networks. The central network, also called the hub, can be used by multiple workloads/servers/services for hosting services and for managing external connectivity. Other networks connected to the hub through network peering are called spokes and host workloads.

      Communications between the workloads/servers/services on spokes pass in or out of the hub where they are inspected and routed. The spokes can also be centrally managed from the hub with IT rules and processes.

      A hub and spoke design enable a larger number of virtual networks to be interconnected as each network only needs one peered connection (to the hub) to be able to communicate with any other network in the system.

      Hub and Spoke Network on AWS

      This is an image of the Hub and Spoke Network on AWS

      What hub and spoke networks do better

      1. Ease of connectivity: Hub and spoke decreases the liabilities of scale that come from a growing business by providing a consistent connection that can be scaled easily. As more networks are added to an organization, each will only need to be connected once – to the hub. The number of connections is considerably lower than in a mesh topology and makes it easier to maintain and manage.
      2. Business agility and scalability: It is easier to increase the number of networks than in mesh, making it easier to grow your business into new channels with less time, investment, and risk.
      3. Data collection: With a hub and spoke design, all data flows through the hub – depending on the design, this includes all ingress and egress to and from the system. This makes it an excellent central network to collect all business data.
      4. Network-level isolation: Hub and spoke enables separation of workloads and tiers into different networks. This is particularly useful to ensure an issue affecting a network or a workload does not affect the rest.
      5. Network changes: Changes to a separated network are much easier to carry out knowing the changes made will not affect all the other connected networks. This reduces work-hours significantly when systems or applications need to be altered.
      6. Compliance: Compliance requirements such as SOC 1 and SOC 2 require separate environments for production, development, and testing, which can be done in a hub and spoke model without having to re-create security controls for all networks.

      Hub and spoke constraints

      While there are plenty of benefits to using this topology, there are still a few notable disadvantages with the design.

      Point-to-point peering

      The total number of total peered connections required might be lower than mesh, but the cost of running independent projects is cheaper on mesh as point-to-point data transfers are cheaper.

      Global access speeds with a monolithic design

      With global organizations, implementing a single monolithic hub network for network ingress and egress will slow down access to cloud services that users will require. A distributed network will ramp up the speeds for its users to access these services.

      Costs for a resilient design

      Connectivity between the spokes can fail if the hub site dies or faces major disruptions. While there are redundancy plans for cloud networks, it will be an additional cost to plan and build an environment for it.

      Leverage the hub and spoke strategy for:

      Providing access to shared services: Hub and spoke can be used to give workloads that are deployed on different networks access to shared services by placing the shared service in the hub. For example, DNS servers can be placed in the hub network, and production or host networks can be connected to the hub to access it, or if the central network is set up to host Active Directory services, then servers in other networks can act as spokes and have full access to the central VPC to send requests. This is also a great way to separate workloads that do not need to communicate with each other but all need access to the same services.

      Adding new locations: An expanding organization that needs to add additional global or domestic locations can leverage hub and spoke to connect new network locations to the main system without the need for multiple connections.

      Cost savings: Apart from having fewer connections than mesh that can save costs in the cloud, hub and spoke can also be used to centralize services such as DNS and NAT to be managed in one location rather than having to individually deploy in each network. This can bring down management efforts and costs considerably.

      Centralized security: Enterprises can deploy a center of excellence on the hub for security, and the spokes connected to it can leverage a higher level of security and increase resilience. It will also be easier to control and manage network policies and networking resources from the hub.

      Network management: Since each spoke is peered only once to the hub, detecting connectivity problems or other network issues is made simpler in hub and spoke than on mesh. A network manager deployed on the cloud can give access to network problems faster than on other topologies.

      Hub and spoke – mesh hybrid

      The advantages of using a hub and spoke model far exceed those of using a mesh topology in the cloud and go to show why most organizations ultimately end up using the hub and spoke as their networking strategy.

      However, organizations, especially large ones, are complex entities, and choosing only one model may not serve all business needs. In such cases, a hybrid approach may be the best strategy. The following slides will demonstrate the advantages and use cases for mesh, however limited they might be.

      Where it can be useful:

      An organization can have multiple network topologies where system X is a mesh and system Y is a hub and spoke. A shared system Z can be a part of both systems depending on the needs.

      An organization can have multiple networks interconnected in a mesh and some of the networks in the mesh can be a hub for a hub-spoke network. For example, a business unit that works on data analysis can deploy their services in a spoke that is connected to a central hub that can host shared services such as Active Directory or NAT. The central hub can then be connected to a regional on-prem network where data and other shared services can be hosted.

      Hub and spoke – mesh hybrid network on AWS

      This is an image of the Hub and spoke – mesh hybrid network on AWS

      Why mesh can still be useful

      Benefits Of Mesh

      Use Cases For Mesh

      Security: Setting up a peering connection between two VPCs comes with the benefit of improving security since the connection can be private between the networks and can isolate public traffic from the internet. The traffic between the networks never has to leave the cloud provider's network, which helps reduce a class of risks.

      Reduced network costs: Since the peered networks communicate internally through the cloud's internal networks, the data transfer costs are typically cheaper than over the public internet.

      Communication speed: Improved network latency is a key benefit from using mesh because the peered traffic does not have to go over the public internet but rather the internal network. The network traffic between the connections can also be quickly redirected as needed.

      Higher flexibility for backend services: Mesh networks can be desirable for back-end services if egress traffic needs to be blocked to the public internet from the deployed services/servers. This also helps avoid having to set up public IP or network address translation (NAT) configurations.

      Connecting two or more networks for full access to resources: For example, consider an organization that has separate networks for each department, which don't all need to communicate with each other. Here, a peering network can be set up only between the networks that need to communicate with full or partial access to each other such as finance to HR or accounting to IT.

      Specific security or compliance need: Mesh or VPC peering can also come in handy to serve specific security needs or logging needs that require using a network to connect to other networks directly and in private. For example, global organizations that face regulatory requirements of storing or transferring data domestically with private connections.

      Systems with very few networks that do not need internet access: Workloads deployed in networks that need to communicate with each other but do not require internet access or network address translation (NAT) can be connected using mesh especially when there are security reasons to keep them from being connected to the main system, e.g. backend services such as testing environments, labs, or sandboxes can leverage this design.

      Designing for governance vs. flexibility in hub and spoke

      Governance and flexibility in managing resources in the cloud are inversely proportional: The higher the governance, the less freedom you have to innovate.

      The complexities of designing an organization's networks grow with the organization as it becomes global and takes on more services and lines of business. Organizations that choose to deploy the hub and spoke model face a dilemma in choosing between governance and flexibility for their networks. Organizations need to find that sweet spot to find the right balance between how much they want to govern their systems, mainly for security- and cost-monitoring, and how much flexibility they want to provide for innovation and other operations, since the two usually tend to have an inverse relationship.

      This decision in hub and spoke usually means that the domains chosen for higher governance must be placed in the hub network, and the domains that need more flexibility in a spoke. The key variables in the following slide will help determine the placement of the domain and will depend entirely on the organization's context.

      The two networking patterns in the cloud have layered complexities that need to be systematically addressed.

      Designing for governance vs. flexibility in hub and spoke

      If a network has more flexibility in all or most of these domains, it may be a good candidate for a spoke-heavy design; otherwise, it may be better designed in a hub-centric pattern.

      • Function: The function the domain network is assigned to and the autonomy the function needs to be successful. For example, software R&D usually requires high flexibility to be successful.
      • Regulations: The extent of independence from both internal and external regulatory constraints the domain has. For example, a treasury reporting domain typically has high internal and external regulations to adhere to.
      • Human resources: The freedom a domain has to hire and manage its resources to perform its function. For example, production facilities in a huge organization have the freedom to manage their own resources.
      • Operations: The freedom a domain has to control its operations and manage its own spending to perform its functions. For example, governments usually have different departments and agencies, each with its own budget to perform its functions.
      • Technology: The independence and the ability a domain has to manage its selection and implementation of technology resources in the cloud. For example, you may not want a software testing team to have complete autonomy to deploy resources.

      Optimal placement of services between the hub and spoke

      Shared services and vendor management

      Resources that are shared between multiple projects or departments or even by the entire organization should be hosted on the hub network to simplify sharing these services. For example, e-learning applications that may be used by multiple business units to train their teams, Active Directory accessed by most teams, or even SAAS platforms such as O365 and Salesforce can leverage buying power and drive down the costs for the organization. Shared services should also be standardized across the organization and for that, it needs to have high governance.

      Services that are an individual need for a network and have no preexisting relationship with other networks or buying power and scale can be hosted in a spoke network. For example, specialized accounting software used exclusively by the accounting team or design software used by a single team. Although the services are still a part of the wider network, it helps separate duties from the shared services network and provides flexibility to the teams to customize and manage their services to suit their individual needs.

      Network egress and interaction

      Network connections, be they in the cloud or hybrid-cloud, are used by everyone to either connect to the internet, access cloud services, or access the organization's data center. Since this is a shared service, a centralized networking account must be placed in the hub for greater governance. Interactions between the spokes in a hub and spoke model happens through the hub, and providing internet access to the spokes through the hub can help leverage cost benefits in the cloud. The network account will perform routing duties between the spokes, on-prem assets, and egress out to the internet.

      For example, NAT gateways in the cloud that are managed services are usually charged by the hour, and deploying NAT on each spoke can be harder to manage and expensive to maintain. A NAT gateway deployed in a central networking hub can be accessed by all spokes, so centralizing it is a great option.

      Note that, in some cases, when using edge locations for data transfers, it may be cost effective to deploy a NAT in the spoke, but such cases usually do not apply to most organizational units.

      A centralized network hub can also be useful to configure network policies and network resources while organizational departments can configure non-network resources, which helps separate responsibilities for all the spokes in the system. For example, subnets and routes can be controlled from the central network hub to ensure standardized network policies across the network.

      Security

      While there needs to be security in the hub and the spokes individually, finding the balance of operation can make the systems more robust. Hub and spoke design can be an effective tool for security when a principal security hub is hosted in the hub network. The central security hub can collect data from the spokes as well as non-spoke sources such as regulatory bodies and threat intelligence providers, and then share the information with the spokes.

      Threat information sharing is a major benefit of using this design, and the hub can take actions to analyze and enrich the data before sharing it with spokes. Shared services such as threat intelligence platforms (TIP) can also benefit from being centralized when stationed in the hub. A collective defense approach between the hub and spoke can be very successful in addressing sophisticated threats.

      Compliance and regulatory requirements such as HIPAA can also be placed in the hub, and the spokes connected to it can make use of it instead of having to deploy it in each spoke individually.

      Cloud metering

      The governance vs. flexibility paradigm usually decides the placement of cloud metering, i.e. if the organization wants higher control over cloud costs, it should be in the central hub, whereas if it prioritizes innovation, the spokes should be allowed to control it. Regardless of the placement of the domain, the costs can be monitored from the central hub using cloud-native monitoring tools such as Azure Monitor or any third-party software deployed in the hub.

      For ease of governance and since resources are usually shared at a project level, most cloud service providers suggest that an individual metering service be placed in the spokes. The centralized billing system of the organization, however, can make use of scale and reserved instances to drive down the costs that the spokes can take advantage of. For example, billing and access control resources are placed in the lower levels in GCP to enable users to set up projects and perform their tasks. These billing systems in the lower levels are then controlled by a centralized billing system to decide who pays for the resources provisioned.

      Don't get stuck with your on-prem network design. Design for the cloud.

      1. Peering VPCs into a mesh design can be an easy way to get onto the cloud, but it should not be your networking strategy for the long run.
      2. Hub and spoke network design offers more benefits than any other network strategy to be adopted only when the need arises. Plan for the design early on and keep a strategy in place to deploy it as early as possible.
      3. Hybrid of mesh and hub and spoke will be very useful in connecting multiple large networks especially when they need to access the same resources without having to route the traffic over the internet.
      4. Governance vs. flexibility should be a key consideration when designing for hub and spoke to leverage the best out of your infrastructure.
      5. Distribute domains across the hub or spokes to leverage costs, security, data collection, and economies of scale, and to foster secure interactions between networks.

      Cloud network design strategy

      This is an image of the framework for developing a Cloud Network Design Strategy.

      Bibliography

      Borschel, Brett. "Azure Hub Spoke Virtual Network Design Best Practices." Acendri Solutions, 13 Jan. 2022. Web.
      Singh, Garvit. "Amazon Virtual Private Cloud Connectivity Options." AWS, January 2018. Web.
      "What Is the Hub and Spoke Information Sharing Model?" Cyware, 16 Aug. 2021. Web.
      Youseff, Lamia. "Mesh and Hub-and-Spoke Networks on Azure." Microsoft, Dec. 2017. Web.

      Prepare Your Application for PaaS

      • Buy Link or Shortcode: {j2store}181|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • The application may have been written a long time ago, and have source code, knowledge base, or design principles misplaced or lacking, which makes it difficult to understand the design and build.
      • The development team does not have a standardized practice for assessing cloud benefits and architecture, design principles for redesigning an application, or performing capacity for planning activities.

      Our Advice

      Critical Insight

      • An infrastructure-driven cloud strategy overlooks application specific complexities. Ensure that an application portfolio strategy is a precursor to determining the business value gained from an application perspective, not just an infrastructure perspective.
      • Business value assessment must be the core of your decision to migrate and justify the development effort.
      • Right-size your application to predict future usage and minimize unplanned expenses. This ensures that you are truly benefiting from the tier costing model that vendors offer.

      Impact and Result

      • Identify and evaluate what cloud benefits your application can leverage and the business value generated as a result of migrating your application to the cloud.
      • Use Info-Tech’s approach to building a robust application that can leverage scalability, availability, and performance benefits while maintaining the functions and features that the application currently supports for the business.
      • Standardize and strengthen your performance testing practices and capacity planning activities to build a strong current state assessment.
      • Use Info-Tech’s elaboration of the 12-factor app to build a clear and robust cloud profile and target state for your application.
      • Leverage Info-Tech’s cloud requirements model to assess the impact of cloud on different requirements patterns.

      Prepare Your Application for PaaS Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a right-sized, design-driven approach to moving your application to a PaaS platform, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Prepare Your Application for PaaS – Phases 1-2

      1. Create your cloud application profile

      Bring the business into the room, align your objectives for choosing certain cloud capabilities, and characterize your ideal PaaS environment as a result of your understanding of what the business is trying to achieve. Understand how to right-size your application in the cloud to maintain or improve its performance.

      • Prepare Your Application for PaaS – Phase 1: Create Your Cloud Application Profile
      • Cloud Profile Tool

      2. Evaluate design changes for your application

      Assess the application against Info-Tech’s design scorecard to evaluate the right design approach to migrating the application to PaaS. Pick the appropriate cloud path and begin the first step to migrating your app – gathering your requirements.

      • Prepare Your Application for PaaS – Phase 2: Evaluate Design Changes for Your Application
      • Cloud Design Scorecard Tool

      [infographic]

       
       

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy

      • Buy Link or Shortcode: {j2store}563|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Organizations are unaware of the capabilities of web analytics tools and unsure how to leverage these new technologies to enhance their web experience.
      • Traditional solutions offer only information and data about the activity on the website. It is difficult for organizations to understand the customer motivations and behavioral patterns using the data.
      • In addition, there is an overwhelming number of vendors offering various solutions. Understanding which solution best fits your business needs is crucial to avoid overspending.

      Our Advice

      Critical Insight

      • Understanding organizational goals and business objectives is essential in effectively leveraging web analytics.
      • It is easy to get lost in a sea of expensive web analytical tools. Choosing tools that align with the business objectives will keep the costs of customer acquisition and retention to a minimum.
      • Beyond selection and implementation, leveraging web analytic tools requires commitment from the organization to continuously monitor key KPIs to ensure good customer web experience.

      Impact and Result

      • Understand what web analytic tools are and some key trends in the market space. Learn about top advanced analytic tools that help understand user behavior.
      • Discover top vendors in the market space and some of the top-level features they offer.
      • Understand how to use the metrics to gather critical insights about the website’s use and key initiatives for successful implementation.

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Research & Tools

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Storyboard – A deck outlining the importance of web analytic tools and how they can be leveraged to meet your business needs.

      This research offers insight into web analytic tools, key trends in the market space, and an introduction to advanced web analytics techniques. Follow our five-step initiative to successfully select and implement web analytics tools and identify which baseline metrics to measure and continuously monitor for best results.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Storyboard
      [infographic]

      Further reading

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy

      Web analytics tools are the gateway to understanding customer behavior.

      EXECUTIVE BRIEF

      Analyst Perspective

      In today’s world, users want to consume concise content and information quickly. Websites have a limited time to prove their usefulness to a new user. Content needs to be as few clicks away from the user as possible. Analyzing user behavior using advanced analytics techniques can help website designers better understand their audience.

      Organizations need to implement sophisticated analytics tools to track user data from their website. However, simply extracting data is not enough to understand the user motivation. A successful implementation of a web analytics tool will comprise both understanding what a customer does on the website and why the customer does what they do.

      This research will introduce some fundamental and advanced analytics tools and provide insight into some of the vendors in the market space.

      Photo of Sai Krishna Rajaramagopalan, Research Specialist, Applications − Enterprise Applications, Info-Tech Research Group. Sai Krishna Rajaramagopalan
      Research Specialist, Applications − Enterprise Applications
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • Web analytics solutions have emerged as applications that provide extensive information and data about users visiting your webpage. However, many organizations are unaware of the capabilities of these tools and unsure how to leverage these new technologies to enhance user experience.
      Common Obstacles
      • Traditional solutions offer information and data about customers’ activity on the website but no insight into their motivations and behavioral patterns.
      • In addition, an overwhelming number of vendors are offering various solutions. Understanding which solution best fits your business needs is crucial to avoid overspending.
      Info-Tech’s Approach
      • This research is aimed to help you understand what web analytic tools are and some key trends in the market space. Learn about top advanced analytic tools that help you understand user behavior. Discover top vendors in the market space and some of the high-level features offered.
      • This research also explains techniques and metrics to gather critical insights about your website’s use and will aid in understanding users’ motivations and patterns and better predict their behavior on the website.

      Info-Tech Insight

      It is easy to get lost in a sea of expensive web analytics tools. Choose tools that align with your business objectives to keep the costs of customer acquisition and retention to a minimum.

      Ensure the success of your web analytics programs by following five simple steps

      1. ORGANIZATIONAL GOALS

      The first key step in implementing and succeeding with web analytics tools is to set clearly defined organizational goals, e.g. improving product sales.

      3. KPI METRICS

      Define key performance indicators (KPIs) that help track the organization’s performance, e.g. number of page visits, conversion rates, bounce rates.

      5. REVIEW

      Continuous improvement is essential to succeed in understanding customers. The world is a dynamic place, and you must constantly revise your organizational goals, business objectives, and KPIs to remain competitive.

      Centerpiece representing the five surrounding steps.

      2. BUSINESS OBJECTIVES

      The next step is to lay out business objectives that help to achieve the organization’s goals, e.g. to increase customer leads, increase customer transactions, increase web traffic.

      4. APPLICATION SELECTION

      Understand the web analytics tool space and which combination of tools and vendors best fits the organization’s goals.

      Web Analytics Introduction

      Understand traditional and advanced tools and their capabilities.

      Understanding web analytics

      • Web analytics is the branch of analytics that deals with the collection, reporting, and analysis of data generated by users visiting and interacting with a website.
      • The purpose of web analytics is to measure user behavior, optimize the website’s user experience and flow, and gain insights that help meet business objectives like increasing conversions and sales.
      • Web analytics allows you to see how your website is performing and how people are acting while on your website. What’s important is what you can do with this knowledge.
      • Data collected through web analytics may include traffic sources, referring sites, page views, paths taken, and conversion rates. The compiled data often forms a part of customer relationship management analytics to facilitate and streamline better business decisions.
      • Having strong web analytics is important in understanding customer behavior and fine-tuning marketing and product development approaches accordingly.
      Example of a web analytics dashboard.

      Why you should leverage web analytics

      Leveraging web analytics allows organizations to better understand their customers and achieve their business goals.

      The global web analytics market size is projected to reach US$5,156.3 million by 2026, from US$2,564 million in 2019, at a CAGR of 10.4% during 2021-2026. (Source: 360 Research Reports, 2021) Of the top 1 million websites with the highest traffic, there are over 3 million analytics technologies used. Google Analytics has the highest market share, with 50.3%. (Source: “Top 1 Million Sites,” BuiltWith, 2022)
      Of the 200 million active websites, 57.3% employ some form of web analytics tool. This trend is expected to grow as more sophisticated tools are readily available at a cheaper cost. (Source: “On the Entire Internet,” BuiltWith, 2022; Siteefy, 2022) A three-month study by Contentsquare showed a 6.9% increase in traffic, 11.8% increase in page views, 12.4% increase in transactions, and 3.6% increase in conversion rates through leveraging web analytics. (Source: Mordor Intelligence, 2022)

      Case Study

      Logo for Ryanair.
      INDUSTRY
      Aviation
      SOURCE
      AT Internet
      Web analytics

      Ryanair is a low-fare airline in Europe that receives nearly all of its bookings via its website. Unhappy with its current web analytics platform, which was difficult to understand and use, Ryanair was looking for a solution that could adapt to its requirements and provide continuous support and long-term collaboration.

      Ryanair chose AT Internet for its intuitive user interface that could effectively and easily manage all the online activity. AT was the ideal partner to work closely with the airline to strengthen strategic decision making over the long term, increase conversions in an increasingly competitive market, and increase transactions on the website.

      Results

      By using AT Internet Web Analytics to improve email campaigns and understand the behavior of website visitors, Ryanair was able to triple click-through rates, increase visitor traffic by 16%, and decrease bounce rate by 18%.

      Arrows denoting increases or decreases in certain metrics: '3x increase in click-through rates', '16% increase in visitor traffic', '18% decrease in bounce rate'.

      Use traditional web analytics tools to understand your consumer

      What does the customer do?
      • Traditional web analytics allows organizations to understand what is happening on their website and what customers are doing. These tools deliver hard data to measure the performance of a website. Some of the data measured through traditional web analytics are:
      • Visit count: The number of visits received by a webpage.
      • Bounce rate: The percentage of visitors that leave the website after only viewing the first page compared to total visitors.
      • Referrer: The previous website that sent the user traffic to a specific website.
      • CTA clicks: The number of times a user clicks on a call to action (CTA) button.
      • Conversion rate: Proportion of users that reach the final outcome of the website.
      Example of a traditional web analytics dashboard.

      Use advanced web analytics techniques to understand your consumer

      Why does the customer do what they do?
      • Traditional web analytic tools fail to explain the motivation of users. Advanced analytic techniques help organizations understand user behavior and measure user satisfaction. The techniques help answer questions like: Why did a user come to a webpage? Why did they leave? Did they find what they were looking for? Some of the advanced tools include:
      • Heatmapping: A visual representation of where the users click, scroll, and move on a webpage.
      • Recordings: A recording of the mouse movement and clicks for the entire duration of a user’s visit.
      • Feedback forms and surveys: Voice of the customer tools allowing users to give direct feedback about websites.
      • Funnel exploration: The ability to visualize the steps users take to complete tasks on your site or app.
      Example of an advanced web analytics dashboard.

      Apply industry-leading techniques to leverage web analytics

      Heatmapping
      • Heatmaps are used to visualize where users move their mouse, click, and scroll in a webpage.
      • Website heatmaps use a warm-to-cold color scheme to indicate user activity, with the warmest color indicating the highest visitor engagement and the coolest indicating the lowest visitor engagement.
      • Organizations can use this tool to evaluate the elements of the website that attract users and identify which sections require improvement to increase user engagement.
      • Website designers can make changes and compare the difference in user interaction to measure the effectiveness of the changes.
      • Scrollmaps help designers understand what the most popular scroll-depth of your webpage is – and that’s usually a prime spot for an important call to action.
      Example of a website with heatmapping overlaid.
      (Source: An example of a heatmap layered with a scrollmap from Crazy Egg, 2020)

      Apply industry-leading techniques to leverage web analytics

      Funneling

      • Funnels are graphical representations of a customer’s journey while navigating through the website.
      • Funnels help organizations identify which webpage users land on and where users drop off.
      • Organizations can capture every user step to find the unique challenges between entry and completion. Identifying what friction stands between browsing product grids and completing a transaction allows web designers to then eliminate it.
      • Designers can use A/B testing to experiment with different design philosophies to compare conversion statistics.
      • Funneling can be expanded to cross-channel analytics by incorporating referral data, cookies, and social media analytics.
      Example of a bar chart created through funneling.

      Apply industry-leading techniques to leverage web analytics

      Session recordings

      • Session recordings are playbacks of users’ interaction with the website on a single session. User interaction can vary between mouse clicks, keyboard input, and mouse scroll.
      • Recordings help organizations understand user motivation and help identify why users undertake certain tasks or actions on the webpage.
      • Playbacks can also be used to see if users are confused anywhere between the landing page and final transaction phase. This way, playbacks further help ensure visitors complete the funneling seamlessly.
      Example of a session recording featuring a line created by the mouse's journey.

      Apply industry-leading techniques to leverage web analytics

      Feedback and microsurveys

      • Feedback can be received directly from end users to help organizations improve the website.
      • Receiving feedback from users can be difficult, since not every user is willing to spend time to submit constructive and detailed feedback. Microsurveys are an excellent alternative.
      • Users can submit short feedback forms consisting of a single line or emojis or thumbs up or down.
      • Users can directly highlight sections of the page about which to submit feedback. This allows designers to quickly pinpoint areas for improvement. Additionally, web designers can play back recordings when feedback is submitted to get a clear idea about the challenges users face.
      Example of a website with a microsurvey in the corner.

      Market Overview

      Choose vendors and tools that best match your business needs.

      Top-level traditional features

      Feature Name

      Description

      Visitor Count Tracking Counts the number of visits received by a website or webpage.
      Geographic Analytics Uses location information to enable the organization to provide location-based services for various demographics.
      Conversion Tracking Measures the proportion of users that complete a certain task compared to total number of users.
      Device and Browser Analytics Captures and summarizes device and browser information.
      Bounce and Exit Tracking Calculates exit rate and bounce rate on a webpage.
      CTA Tracking Measures the number of times users click on a call to action (CTA) button.
      Audience Demographics Captures, analyzes, and displays customer demographic/firmographic data from different channels.
      Aggregate Traffic Reporting Works backward from a conversion or other key event to analyze the differences, trends, or patterns in the paths users took to get there.
      Social Media Analytics Captures information on social signals from popular services (Twitter, Facebook, LinkedIn, etc.).

      Top-level advanced features

      Feature Name

      Description

      HeatmappingShows where users have clicked on a page and how far they have scrolled down a page or displays the results of eye-tracking tests through the graphical representation of heatmaps.
      Funnel ExplorationVisualizes the steps users take to complete tasks on your site or app.
      A/B TestingEnables you to test the success of various website features.
      Customer Journey ModellingEffectively models and displays customer behaviors or journeys through multiple channels and touchpoints.
      Audience SegmentationCreates and analyzes discrete customer audience segments based on user-defined criteria or variables.
      Feedback and SurveysEnables users to give feedback and share their satisfaction and experience with website designers.
      Paid Search IntegrationIntegrates with popular search advertising services (i.e. AdWords) and can make predictive recommendations around areas like keywords.
      Search Engine OptimizationProvides targeted recommendations for improving and optimizing a page for organic search rankings (i.e. via A/B testing or multivariate testing).
      Session RecordingRecords playbacks of users scrolling, moving, u-turning, and rage clicking on your site.

      Evaluate software category leaders using SoftwareReviews’ vendor rankings and awards

      Logo for SoftwareReviews.
      Sample of SoftwareReviews' The Data Quadrant. The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

      Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.

      Sample of SoftwareReviews' The Emotional Footprint. The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

      Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

      Speak with category experts to dive deeper into the vendor landscape

      Logo for SoftwareReviews.
      Fact-based reviews of business software from IT professionals. Top-tier data quality backed by a rigorous quality assurance process. CLICK HERE to ACCESS

      Comprehensive software reviews
      to make better IT decisions

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      Product and category reports with state-of-the-art data visualization. User-experience insight that reveals the intangibles of working with a vendor.

      SoftwareReviews is powered by Info-Tech

      Technology coverage is a priority for Info-Tech and SoftwareReviews provides the most comprehensive unbiased data on today’s technology. Combined with the insight of our expert analysts, our members receive unparalleled support in their buying journey.

      Top vendors in the web analytics space

      Logo for Google Analytics. Google Analytics provides comprehensive traditional analytics tools, free of charge, to understand the customer journey and improve marketing ROI. Twenty-four percent of all web analytical tools used on the internet are provided by Google analytics.
      Logo for Hotjar. Hotjar is a behavior analytics and product experience insights service that helps you empathize with and understand your users through their feedback via tools like heatmaps, session recordings, and surveys. Hotjar complements the data and insights you get from traditional web analytics tools like Google Analytics.
      Logo for Crazy Egg. Crazy Egg is a website analytics tool that helps you optimize your site to make it more user-friendly, more engaging, and more conversion-oriented. It does this through heatmaps and A/B testing, which allow you to see how people are interacting with your site.
      Logo for Amplitude Analytics. Amplitude Analytics provides intelligent insight into customer behavior. It offers basic functionalities like measuring conversion rate and engagement metrics and also provides more advanced tools like customer journey maps and predictive analytics capabilities through AI.

      Case Study

      Logo for Miller & Smith.
      INDUSTRY
      Real Estate
      SOURCE
      Crazy Egg

      Heatmaps and playback recordings

      Challenge

      Miller & Smith had just redesigned their website, but the organization wanted to make sure it was user-friendly as well as visually appealing. They needed an analytics platform that could provide information about where visitors were coming from and measure the effectiveness of the marketing campaigns.

      Solution

      Miller & Smith turned to Crazy Egg to obtain visual insights and track user behavior. They used heatmaps and playback recordings to see user activity within webpages and pinpoint any issues with user interface. In just a few weeks, Miller & Smith gained valuable data to work with: the session recordings helped them understand how users were navigating the site, and the heatmaps allowed them to see where users were clicking – and what they were skipping.

      Results

      Detailed reports generated by the solution allowed Miller & Smith team to convince key stakeholders and implement the changes easily. They were able to pinpoint what changes needed to be made and why these changes would improve their experience.

      Within few weeks, the bounce rate improved by 7.5% and goal conversion increased by 8.5% over a similar period the previous year.

      Operationalizing Web Analytics Tools

      Execute initiatives for successful implementation.

      Ensure success of your web analytics programs by following five simple steps

      1. ORGANIZATIONAL GOALS

      The first key step in implementing and succeeding with web analytics tools is to set clearly defined organizational goals, e.g. improving product sales.

      3. KPI METRICS

      Define key performance indicators (KPIs) that help track the organization’s performance, e.g. number of page visits, conversion rates, bounce rates.

      5. REVIEW

      Continuous improvement is essential to succeed in understanding customers. The world is a dynamic place, and you must constantly revise your organizational goals, business objectives, and KPIs to remain competitive.

      Centerpiece representing the five surrounding steps.

      2. BUSINESS OBJECTIVES

      The next step is to lay out business objectives that help to achieve the organization’s goals, e.g. to increase customer leads, increase customer transactions, increase web traffic.

      4. APPLICATION SELECTION

      Understand the web analytics tool space and which combination of tools and vendors best fits the organization’s goals.

      1.1 Understand your organization’s goals

      30 minutes

      Output: Organization’s goal list

      Materials: Whiteboard, Markers

      Participants: Core project team

      1. Identify the key organizational goals for both the short term and the long term.
      2. Arrange the goals in descending order of priority.

      Example table of goals ranked by priority and labeled short or long term.

      1.2 Align business objectives with organizational goals

      30 minutes

      Output: Business objectives

      Materials: Whiteboard, Markers

      Participants: Core project team

      1. Identify the key business objectives that help attain organization goals.
      2. Match each business objective with the corresponding organizational goals it helps achieve.
      3. Arrange the objectives in descending order of priority.

      Example table of business objectives ranked by priority and which organization goal they're linked to.

      Establish baseline metrics

      Baseline metrics will be improved through:

      1. Efficiently using website elements and CTA button placement
      2. Reducing friction between the landing page and end point
      3. Leveraging direct feedback from users to continuously improve customer experience

      1.3 Establish baseline metrics that you intend to improve via your web analytics tools

      30 minutes

      Example table with metrics, each with a current state and goal state.

      Accelerate your software selection project

      Vendor selection projects often demand extensive and unnecessary documentation.

      Software Selection Insight

      Balance the effort-to-information ratio required for a business impact assessment to keep stakeholders engaged. Use documentation that captures the key data points and critical requirements without taking days to complete. Stakeholders are more receptive to formal selection processes that are friction free.

      The Software Selection Workbook

      Work through the straightforward templates that tie to each phase of the Rapid Application Selection Framework, from assessing the business impact to requirements gathering.

      Sample of the Software Selection Workbook deliverable.

      The Vendor Evaluation Workbook

      Consolidate the vendor evaluation process into a single document. Easily compare vendors as you narrow the field to finalists.

      Sample of the Vendor Evaluation Workbook deliverable.

      The Guide to Software Selection: A Business Stakeholder Manual

      Quickly explain the Rapid Application Selection Framework to your team while also highlighting its benefits to stakeholders.

      Sample of the Guide to Software Selection: A Business Stakeholder Manual deliverable.

      Revisit the metrics you identified and revise your goals

      Track the post-deployment results, compare the metrics, and set new targets for the next fiscal year.

      Example table of 'Baseline Website Performance Metrics' with the column 'Revised Target' highlighted.

      Related Info-Tech Research

      Stock image of two people going over a contract. Modernize Your Corporate Website to Drive Business Value

      Drive higher user satisfaction and value through UX-driven websites.

      Stock image of a person using the cloud on their smartphone. Select and Implement a Web Experience Management Solution

      Your website is your company’s face to the world: select a best-of-breed platform to ensure you make a rock-star impression with your prospects and customers!

      Stock image of people studying analytics. Create an Effective Web Redesign Strategy

      Ninety percent of web redesign projects, executed without an effective strategy, fail to accomplish their goals.

      Bibliography

      "11 Essential Website Data Factors and What They Mean." CivicPlus, n.d. Accessed 26 July 2022.

      “Analytics Usage Distribution in the Top 1 Million Sites.” BuiltWith, 1 Nov. 2022. Accessed 26 July 2022.

      "Analytics Usage Distribution on the Entire Internet." BuiltWith, 1 Nov. 2022. Accessed 26 July 2022.

      Bell, Erica. “How Miller and Smith Used Crazy Egg to Create an Actionable Plan to Improve Website Usability.” Crazy Egg, n.d. Accessed 26 July 2022.

      Brannon, Jordan. "User Behavior Analytics | Enhance The Customer Journey." Coalition Technologies, 8 Nov 2021. Accessed 26 July 2022.

      Cardona, Mercedes. "7 Consumer Trends That Will Define The Digital Economy In 2021." Adobe Blog, 7 Dec 2020. Accessed 26 July 2022.

      “The Finer Points.“ Analytics Features. Google Marketing Platform, 2022. Accessed 26 July 2022.

      Fitzgerald, Anna. "A Beginner’s Guide to Web Analytics." HubSpot, 21 Sept 2022. Accessed 26 July 2022.

      "Form Abandonment: How to Avoid It and Increase Your Conversion Rates." Fullstory Blog, 7 April 2022. Accessed 26 July 2022.

      Fries, Dan. "Plug Sales Funnel Gaps by Identifying and Tracking Micro-Conversions." Clicky Blog, 9 Dec 2019. Accessed 7 July 2022.

      "Funnel Metrics in Saas: What to Track and How to Improve Them?" Userpilot Blog, 23 May 2022. Accessed 26 July 2022.

      Garg, Neha. "Digital Experimentation: 3 Key Steps to Building a Culture of Testing." Contentsquare, 21 June 2021. Accessed 26 July 2022.

      “Global Web Analytics Market Size, Status and Forecast 2021-2027.” 360 Research Reports, 25 Jan. 2021. Web.

      Hamilton, Stephanie. "5 Components of Successful Web Analytics." The Daily Egg, 2011. Accessed 26 July 2022.

      "Hammond, Patrick. "Step-by-Step Guide to Cohort Analysis & Reducing Churn Rate." Amplitude, 15 July 2022. Accessed 26 July 2022.

      Hawes, Carry. "What Is Session Replay? Discover User Pain Points With Session Recordings." Dynatrace, 20 Dec 2021. Accessed 26 July 2022.

      Huss, Nick. “How Many Websites Are There in the World?” Siteefy, 8 Oct. 2022. Web.

      Nelson, Hunter. "Establish Web Analytics and Conversion Tracking Foundations Using the Google Marketing Platform.” Tortoise & Hare Software, 29 Oct 2022. Accessed 26 July 2022.

      "Product Analytics Vs Product Experience Insights: What’s the Difference?" Hotjar, 14 Sept 2021. Accessed 26 July 2022.

      “Record and watch everything your visitors do." Inspectlet, n.d. Accessed 26 July 2022.

      “Ryanair: Using Web Analytics to Manage the Site’s Performance More Effectively and Improve Profitability." AT Internet, 1 April 2020. Accessed 26 July 2022.

      Sibor, Vojtech. "Introducing Cross-Platform Analytics.” Smartlook Blog, 5 Nov 2022. Accessed 26 July 2022.

      "Visualize Visitor Journeys Through Funnels.” VWO, n.d. Accessed 26 July 2022.

      "Web Analytics Market Share – Growth, Trends, COVID-19 Impact, and Forecasts (2022-2027)." Mordor Intelligence, 2022. Accessed 26 July 2022.

      “What is the Best Heatmap Tool for Real Results?” Crazy Egg, 27 April 2020. Web.

      "What Is Visitor Behavior Analysis?" VWO, 2022. Accessed 26 July 2022.

      Zheng, Jack G., and Svetlana Peltsverger. “Web Analytics Overview.” IGI Global, 2015. Accessed 26 July 2022.

      Staff the Service Desk to Meet Demand

      • Buy Link or Shortcode: {j2store}490|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $1,900 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • With increasing complexity of support and demand on service desks, staff are often left feeling overwhelmed and struggling to keep up with ticket volume, resulting in long resolution times and frustrated end users.
      • However, it’s not as simple as hiring more staff to keep up with ticket volume. IT managers must have the data to support their case for increasing resources or even maintaining their current resources in an environment where many executives are looking to reduce headcount.
      • Without changing resources to match demand, IT managers will need to determine how to maximize the use of their resources to deliver better service.

      Our Advice

      Critical Insight

      • IT managers are stuck with the difficult task of determining the right number of service desk resources to meet demand to executives who perceive the service desk to be already effective.
      • Service desk managers often don’t have accurate historical data and metrics to justify their headcount, or don’t know where to start to find the data they need.
      • They often then fall prey to the common misperception that there is an industry standard ratio of the ideal number of service desk analysts to users. IT leaders who rely on staffing ratios or industry benchmarks fail to take into account the complexity of their own organization and may make inaccurate resourcing decisions.

      Impact and Result

      • There’s no magic, one-size-fits-all ratio to tell you how many service desk staff you need based on your user base alone. There are many factors that come into play, including the complexity of your environment, user profiles, ticket volume and trends, and maturity and efficiency of your processes.
      • If you don’t have historical data to help inform resourcing needs, start tracking ticket volume trends now so that you can forecast future needs.
      • If your data suggests you don’t need more staff, look to other ways to maximize your time and resources to deliver more efficient service.

      Staff the Service Desk to Meet Demand Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize service desk staffing, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Determine environment and operating model

      Define your business and IT environment, service desk operating model, and existing challenges to inform objectives.

      • Service Desk Staffing Stakeholder Presentation

      2. Determine staffing needs

      Understand why service desk staffing estimates should be based on your unique workload, then complete the Staffing Calculator to estimate your needs.

      • Service Desk Staffing Calculator

      3. Interpret data to plan approach

      Review workload over time to analyze trends and better inform your overall resourcing needs, then plan your next steps to optimize staffing.

      [infographic]